Security News > 2020 > March > Intel Patches 27 Vulnerabilities Across Product Portfolio

Intel Patches 27 Vulnerabilities Across Product Portfolio
2020-03-11 20:18

Intel this week released patches for more than two dozen vulnerabilities impacting graphics drivers, FPGA, processors, NUC, BlueZ, and other products.

The chip maker patched a total of 17 vulnerabilities in its graphics drivers, the most important of which is a buffer overflow that could result in denial of service.

Ten of the remaining vulnerabilities are considered medium severity and could result in escalation of privilege, denial of service, or information disclosure.

Tracked as CVE-2020-0530 and CVE-2020-0526, the vulnerabilities are considered high severity, featuring CVSS scores of 7.8 and 7.7, respectively.

All of these vulnerabilities could be exploited by authenticated users via local access, Intel says.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/N4YtStF3hss/intel-patches-27-vulnerabilities-across-product-portfolio

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-03-12 CVE-2020-0526 Improper Input Validation vulnerability in Intel products
Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access.
local
low complexity
intel CWE-20
6.7
2020-03-12 CVE-2020-0530 Classic Buffer Overflow vulnerability in Intel products
Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.
local
low complexity
intel CWE-120
7.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Intel 6314 31 755 708 45 1539