Vulnerability in Intel Ethernet Controller Firmware of network adapters
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2020-043 | CVE-2020-0524 | 11/27/2020 | medium | v1 |
Vulnerability details
Improper default permissions in the firmware for the Intel(R) I210 Controller series of network adapters before version 3.30.
May allow a privileged local user to potentially enable a denial of service via local access.
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | medium | SNS is impacted |
Revisions
Version | Date | Description |
---|---|---|
v1 | 11/27/2020 | Initial release |
v2 | 03/24/2023 | Public release |
Stormshield Network Security |
CVSS v3.1 Overall Score: 5.7 |
Analysis |
Impacted version |
This vulnerability could allow an attacker with a local access and privileges (ability to run on SNS his own code or script) to the appliance to potentialy enable denial of service. This vulnerability is useless for an attacker who already have administrator access because an administrator is the highest privileges on the appliance. As this vulnerability can only be exploited locally, it can not provide an external attacker access to an SNS appliance.
The following models are impacted :
|
All SNS version prior to 4.4.0 The following models are impacted :
|
Workaround solution |
Solution |
In order to mitigate the risk of exploitation keep your appliance updated. |
As stated in the analysis, this vulnerability can only be exploited locally. On SNS, local access are only granted to user with the highest privileges. Therefore an exploitation of this vulnerability is useless to a SNS local user. Nevertheless, a fix for this vulnerability will be delivered in the version 4.4.0. |
Attack Vector | Attack Complexity | Privileges Required | User Interaction | Scope | Confidentiality Impact | Integrity Impact | Availability impact |
---|---|---|---|---|---|---|---|
Local | Low | Low | None | Changed | None | Low | Low |
CVSS Base score: 5.2 | CVSS Vector: (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L) |
Exploit Code Maturity | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 4.5 | CVSS Vector: (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L/E:U/RL:O/RC:C) |
Confidentiality Requirement | Integrity Requirement | Availability Requirement |
---|---|---|
High | High | High |
CVSS Environmental score: 5.7 | CVSS Vector: (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L/E:U/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X) |