Weakness Name | Source | |
---|---|---|
Observable Discrepancy The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not. |
Metric | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V3.0 | 6.4 | MEDIUM |
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
More informations
Base: Exploitabilty MetricsThe Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component. Attack VectorThis metric reflects the context by which vulnerability exploitation is possible. Local A vulnerability exploitable with Local access means that the vulnerable component is not bound to the network stack, and the attacker's path is via read/write/execute capabilities. In some cases, the attacker may be logged in locally in order to exploit the vulnerability, otherwise, she may rely on User Interaction to execute a malicious file. Attack ComplexityThis metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability. High A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected. Privileges RequiredThis metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. Low The attacker is authorized with (i.e. requires) privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges may have the ability to cause an impact only to non-sensitive resources. User InteractionThis metric captures the requirement for a user, other than the attacker, to participate in the successful compromise of the vulnerable component. None The vulnerable system can be exploited without interaction from any user. Base: Scope MetricsAn important property captured by CVSS v3.0 is the ability for a vulnerability in one software component to impact resources beyond its means, or privileges. ScopeFormally, Scope refers to the collection of privileges defined by a computing authority (e.g. an application, an operating system, or a sandbox environment) when granting access to computing resources (e.g. files, CPU, memory, etc). These privileges are assigned based on some method of identification and authorization. In some cases, the authorization may be simple or loosely controlled based upon predefined rules or standards. For example, in the case of Ethernet traffic sent to a network switch, the switch accepts traffic that arrives on its ports and is an authority that controls the traffic flow to other switch ports. Changed An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different. Base: Impact MetricsThe Impact metrics refer to the properties of the impacted component. Confidentiality ImpactThis metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. High There is total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server. Integrity ImpactThis metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Low Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is constrained. The data modification does not have a direct, serious impact on the impacted component. Availability ImpactThis metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. None There is no impact to availability within the impacted component. Temporal MetricsThe Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence that one has in the description of a vulnerability. Environmental Metrics |
[email protected] |
V2 | 5.4 | AV:L/AC:M/Au:N/C:C/I:P/A:N | [email protected] |
Intel>>Core_i3 >> Version 6006u
Intel>>Core_i3 >> Version 6098p
Intel>>Core_i3 >> Version 6100
Intel>>Core_i3 >> Version 6100e
Intel>>Core_i3 >> Version 6100h
Intel>>Core_i3 >> Version 6100t
Intel>>Core_i3 >> Version 6100te
Intel>>Core_i3 >> Version 6100u
Intel>>Core_i3 >> Version 6102e
Intel>>Core_i3 >> Version 6157u
Intel>>Core_i3 >> Version 6167u
Intel>>Core_i3 >> Version 6300
Intel>>Core_i3 >> Version 6300t
Intel>>Core_i3 >> Version 6320
Intel>>Core_i5 >> Version 650
Intel>>Core_i5 >> Version 655k
Intel>>Core_i5 >> Version 660
Intel>>Core_i5 >> Version 661
Intel>>Core_i5 >> Version 670
Intel>>Core_i5 >> Version 680
Intel>>Core_i5 >> Version 6200u
Intel>>Core_i5 >> Version 6260u
Intel>>Core_i5 >> Version 6267u
Intel>>Core_i5 >> Version 6287u
Intel>>Core_i5 >> Version 6300hq
Intel>>Core_i5 >> Version 6300u
Intel>>Core_i5 >> Version 6350hq
Intel>>Core_i5 >> Version 6360u
Intel>>Core_i5 >> Version 6400
Intel>>Core_i5 >> Version 6400t
Intel>>Core_i5 >> Version 6402p
Intel>>Core_i5 >> Version 6440eq
Intel>>Core_i5 >> Version 6440hq
Intel>>Core_i5 >> Version 6442eq
Intel>>Core_i5 >> Version 6500
Intel>>Core_i5 >> Version 6500t
Intel>>Core_i5 >> Version 6500te
Intel>>Core_i5 >> Version 6585r
Intel>>Core_i5 >> Version 6600
Intel>>Core_i5 >> Version 6600k
Intel>>Core_i5 >> Version 6600t
Intel>>Core_i5 >> Version 6685r
Intel>>Core_i7 >> Version 610e
Intel>>Core_i7 >> Version 620le
Intel>>Core_i7 >> Version 620lm
Intel>>Core_i7 >> Version 620m
Intel>>Core_i7 >> Version 620ue
Intel>>Core_i7 >> Version 620um
Intel>>Core_i7 >> Version 640lm
Intel>>Core_i7 >> Version 640m
Intel>>Core_i7 >> Version 640um
Intel>>Core_i7 >> Version 660lm
Intel>>Core_i7 >> Version 660ue
Intel>>Core_i7 >> Version 660um
Intel>>Core_i7 >> Version 680um
Intel>>Core_i5 >> Version 750
Intel>>Core_i5 >> Version 750s
Intel>>Core_i5 >> Version 760
Intel>>Core_i7 >> Version 7y75
Intel>>Core_i7 >> Version 720qm
Intel>>Core_i7 >> Version 740qm
Intel>>Core_i7 >> Version 7500u
Intel>>Core_i7 >> Version 7560u
Intel>>Core_i7 >> Version 7567u
Intel>>Core_i7 >> Version 7600u
Intel>>Core_i7 >> Version 7660u
Intel>>Core_i7 >> Version 7700
Intel>>Core_i7 >> Version 7700hq
Intel>>Core_i7 >> Version 7700k
Intel>>Core_i7 >> Version 7700t
Intel>>Core_i7 >> Version 7820eq
Intel>>Core_i7 >> Version 7820hk
Intel>>Core_i7 >> Version 7820hq
Intel>>Core_i7 >> Version 7920hq
Intel>>Core_i3 >> Version 8100
Intel>>Core_i3 >> Version 8350k
Intel>>Core_i5 >> Version 8250u
Intel>>Core_i5 >> Version 8350u
Intel>>Core_i5 >> Version 8400
Intel>>Core_i5 >> Version 8600k
Intel>>Core_i7 >> Version 820qm
Intel>>Core_i7 >> Version 840qm
Intel>>Core_i7 >> Version 860
Intel>>Core_i7 >> Version 860s
Intel>>Core_i7 >> Version 870
Intel>>Core_i7 >> Version 870s
Intel>>Core_i7 >> Version 875k
Intel>>Core_i7 >> Version 880
Intel>>Core_i7 >> Version 8550u
Intel>>Core_i7 >> Version 8650u
Intel>>Core_i7 >> Version 8700
Intel>>Core_i7 >> Version 8700k
Intel>>Xeon_e3 >> Version 1515m_v5
Intel>>Xeon_e3 >> Version 1535m_v5
Intel>>Xeon_e3 >> Version 1545m_v5
Intel>>Xeon_e3 >> Version 1558l_v5
Intel>>Xeon_e3 >> Version 1565l_v5
Intel>>Xeon_e3 >> Version 1575m_v5
Intel>>Xeon_e3 >> Version 1578l_v5
Intel>>Xeon_e3 >> Version 1585_v5
Intel>>Xeon_e3 >> Version 1585l_v5
Intel>>Xeon_e3_1220_v5 >> Version -
Intel>>Xeon_e3_1225_v5 >> Version -
Intel>>Xeon_e3_1230_v5 >> Version -
Intel>>Xeon_e3_1235l_v5 >> Version -
Intel>>Xeon_e3_1240_v5 >> Version -
Intel>>Xeon_e3_1240l_v5 >> Version -
Intel>>Xeon_e3_1245_v5 >> Version -
Intel>>Xeon_e3_1260l_v5 >> Version -
Intel>>Xeon_e3_1268l_v5 >> Version -
Intel>>Xeon_e3_1270_v5 >> Version -
Intel>>Xeon_e3_1275_v5 >> Version -
Intel>>Xeon_e3_1280_v5 >> Version -
Intel>>Xeon_e3_1505l_v5 >> Version -
Intel>>Xeon_e3_1505m_v5 >> Version -
Intel>>Xeon_e3 >> Version 1505m_v6
Intel>>Xeon_e3 >> Version 1535m_v6
Intel>>Xeon_e3_1220_v6 >> Version -
Intel>>Xeon_e3_1225_v6 >> Version -
Intel>>Xeon_e3_1230_v6 >> Version -
Intel>>Xeon_e3_1240_v6 >> Version -
Intel>>Xeon_e3_1245_v6 >> Version -
Intel>>Xeon_e3_1270_v6 >> Version -
Intel>>Xeon_e3_1275_v6 >> Version -
Intel>>Xeon_e3_1280_v6 >> Version -
Intel>>Xeon_e3_1285_v6 >> Version -
Intel>>Xeon_e3_1501l_v6 >> Version -
Intel>>Xeon_e3_1501m_v6 >> Version -
Intel>>Xeon_e3_1505l_v6 >> Version -