Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-0583


Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel® Smart Sound Technology before versions: 10th Generation Intel® Core™ i7 Processors, version 3431 and 8th Generation Intel® Core™ Processors, version 3349.


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 8.8, requiring local system access to exploit with relatively low complexity without requiring user interaction requiring only low-level privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 6 products from intel, from intel, from intel and 3 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2020, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2020-03-12T22:15:15.217

Last Modified

2024-11-21T04:53:47.963

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application intel smart_sound_technology 3431 Yes
Hardware intel core_i7 1060g7 No
Hardware intel core_i7 1065g7 No
Hardware intel core_i7 10510u No
Hardware intel core_i7 10510y No
Hardware intel core_i7 10710u No
Application intel smart_sound_technology 3349 Yes
Hardware intel core_i3 8100 No
Hardware intel core_i3 8100b No
Hardware intel core_i3 8100h No
Hardware intel core_i3 8100t No
Hardware intel core_i3 8109u No
Hardware intel core_i3 8130u No
Hardware intel core_i3 8145u No
Hardware intel core_i3 8145ue No
Hardware intel core_i3 8300 No
Hardware intel core_i3 8300t No
Hardware intel core_i3 8350k No
Hardware intel core_i5 8200y No
Hardware intel core_i5 8210y No
Hardware intel core_i5 8250u No
Hardware intel core_i5 8257u No
Hardware intel core_i5 8259u No
Hardware intel core_i5 8265u No
Hardware intel core_i5 8269u No
Hardware intel core_i5 8300h No
Hardware intel core_i5 8305g No
Hardware intel core_i5 8350u No
Hardware intel core_i5 8365u No
Hardware intel core_i5 8365ue No
Hardware intel core_i5 8400 No
Hardware intel core_i5 8400b No
Hardware intel core_i5 8400h No
Hardware intel core_i5 8400t No
Hardware intel core_i5 8500 No
Hardware intel core_i5 8500b No
Hardware intel core_i5 8500t No
Hardware intel core_i5 8600 No
Hardware intel core_i5 8600k No
Hardware intel core_i5 8600t No
Hardware intel core_i7 8086k No
Hardware intel core_i7 8500y No
Hardware intel core_i7 8550u No
Hardware intel core_i7 8557u No
Hardware intel core_i7 8559u No
Hardware intel core_i7 8565u No
Hardware intel core_i7 8569u No
Hardware intel core_i7 8650u No
Hardware intel core_i7 8665u No
Hardware intel core_i7 8665ue No
Hardware intel core_i7 8700 No
Hardware intel core_i7 8700b No
Hardware intel core_i7 8700k No
Hardware intel core_i7 8700t No
Hardware intel core_i7 8705g No
Hardware intel core_i7 8706g No
Hardware intel core_i7 8709g No
Hardware intel core_i7 8750h No
Hardware intel core_i7 8809g No
Hardware intel core_i7 8850h No
Hardware intel core_i9 8950hk No
Hardware intel core_m3 8100y No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For intel's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.