Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-12300


Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 8.2, requiring local system access to exploit with relatively low complexity without requiring user interaction . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 46 products from intel, from intel, from intel and 43 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2020, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2020-08-13T04:15:13.053

Last Modified

2024-11-21T04:59:28.590

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.2 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-824

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System intel s2600cw2_firmware < 01.01.0029 Yes
Hardware intel s2600cw2 - No
Operating System intel s2600cw2s_firmware < 01.01.0029 Yes
Hardware intel s2600cw2s - No
Operating System intel s2600cwt_firmware < 01.01.0029 Yes
Hardware intel s2600cwt - No
Operating System intel s2600cwts_firmware < 01.01.0029 Yes
Hardware intel s2600cwts - No
Operating System intel s2600cw2r_firmware < 01.01.0029 Yes
Hardware intel s2600cw2r - No
Operating System intel s2600cw2sr_firmware < 01.01.0029 Yes
Hardware intel s2600cw2sr - No
Operating System intel s2600cwtr_firmware < 01.01.0029 Yes
Hardware intel s2600cwtr - No
Operating System intel s2600cwtsr_firmware < 01.01.0029 Yes
Hardware intel s2600cwtsr - No
Operating System intel s2600kp_firmware < 01.01.0029 Yes
Hardware intel s2600kp - No
Operating System intel s2600kpf_firmware < 01.01.0029 Yes
Hardware intel s2600kpf - No
Operating System intel s2600kpr_firmware < 01.01.0029 Yes
Hardware intel s2600kpr - No
Operating System intel s2600kpfr_firmware < 01.01.0029 Yes
Hardware intel s2600kpfr - No
Operating System intel s2600kptr_firmware < 01.01.0029 Yes
Hardware intel s2600kptr - No
Operating System intel s2600tp_firmware < 01.01.0029 Yes
Hardware intel s2600tp - No
Operating System intel s2600tpf_firmware < 01.01.0029 Yes
Hardware intel s2600tpf - No
Operating System intel s2600tpfr_firmware < 01.01.0029 Yes
Hardware intel s2600tpfr - No
Operating System intel s2600tpnr_firmware < 01.01.0029 Yes
Hardware intel s2600tpnr - No
Operating System intel s2600tpr_firmware < 01.01.0029 Yes
Hardware intel s2600tpr - No
Operating System intel s2600wt2_firmware < 01.01.0029 Yes
Hardware intel s2600wt2 - No
Operating System intel s2600wtt_firmware < 01.01.0029 Yes
Hardware intel s2600wtt - No
Operating System intel s2600wttr_firmware < 01.01.0029 Yes
Hardware intel s2600wttr - No
Operating System intel s2600wt2r_firmware < 01.01.0029 Yes
Hardware intel s2600wt2r - No
Operating System intel s2600wtts1r_firmware < 01.01.0029 Yes
Hardware intel s2600wtts1r - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For intel's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.