{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Intel Server Board de gamme S1200SP sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"les pilotes graphiques Intel (cf. section Documentation)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC (cf. section Documentation)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"les produits Intel PROSet/Wireless WiFi sur Windows 7 ou 8.1 versions ant\u00e9rieures \u00e0 21.40.5.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Mailbox Interface driver (Intel recommande de le d\u00e9sinstaller)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Board de gamme S2600WF sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Board de gamme S2600BP sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel RSTe Software RAID Driver pour Intel Server Board M10JNP2SB versions ant\u00e9rieures \u00e0 4.7.0.1119","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel PAC avec Arria 10 GX FPGA utilisant Intel Acceleration Stack versions ant\u00e9rieures \u00e0 1.2.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Board de gamme S2600TP sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server System de gammes R1000SP, LSVRP et LR1304SP sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Compute Module de gamme HNS2600TP sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Board M10JNP2SB versions ant\u00e9rieures \u00e0 7.210","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Board de gamme S2600ST sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Compute Module de gamme HNS2600BP sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Boards de gamme S2600CW sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Board de gamme S2600KP sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Compute Module de gamme HNS2600KP sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server System de gamme R1000WF et R2000WF sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel RAID Web Console 3 pour Windows versions ant\u00e9rieures \u00e0 7.012.016.000","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Computing Improvement Program versions ant\u00e9rieures \u00e0 2.4.5718","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Distribution of OpenVINO Toolkit versions ant\u00e9rieures \u00e0 2020.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server System de gammes R1000WT et R2000WT sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"les produits Intel Wireless Bluetooth (cf. section Documentation)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"d\u00e9mon Intel Wireless for Open Source versions ant\u00e9rieures \u00e0 1.5","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Boards de gamme S2600WT sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel RealSense D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.14","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel LED Manager pour NUC versions ant\u00e9rieures \u00e0 1.2.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Thunderbolt","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SSD DCT versions ant\u00e9rieures \u00e0 3.0.23","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2020-0555","url":"https://www.cve.org/CVERecord?id=CVE-2020-0555"},{"name":"CVE-2020-8731","url":"https://www.cve.org/CVERecord?id=CVE-2020-8731"},{"name":"CVE-2020-8717","url":"https://www.cve.org/CVERecord?id=CVE-2020-8717"},{"name":"CVE-2020-8710","url":"https://www.cve.org/CVERecord?id=CVE-2020-8710"},{"name":"CVE-2020-8732","url":"https://www.cve.org/CVERecord?id=CVE-2020-8732"},{"name":"CVE-2020-12287","url":"https://www.cve.org/CVERecord?id=CVE-2020-12287"},{"name":"CVE-2020-8736","url":"https://www.cve.org/CVERecord?id=CVE-2020-8736"},{"name":"CVE-2020-8719","url":"https://www.cve.org/CVERecord?id=CVE-2020-8719"},{"name":"CVE-2020-8734","url":"https://www.cve.org/CVERecord?id=CVE-2020-8734"},{"name":"CVE-2020-8683","url":"https://www.cve.org/CVERecord?id=CVE-2020-8683"},{"name":"CVE-2020-8723","url":"https://www.cve.org/CVERecord?id=CVE-2020-8723"},{"name":"CVE-2020-8742","url":"https://www.cve.org/CVERecord?id=CVE-2020-8742"},{"name":"CVE-2020-0553","url":"https://www.cve.org/CVERecord?id=CVE-2020-0553"},{"name":"CVE-2020-8685","url":"https://www.cve.org/CVERecord?id=CVE-2020-8685"},{"name":"CVE-2020-8681","url":"https://www.cve.org/CVERecord?id=CVE-2020-8681"},{"name":"CVE-2020-8716","url":"https://www.cve.org/CVERecord?id=CVE-2020-8716"},{"name":"CVE-2020-8688","url":"https://www.cve.org/CVERecord?id=CVE-2020-8688"},{"name":"CVE-2020-8689","url":"https://www.cve.org/CVERecord?id=CVE-2020-8689"},{"name":"CVE-2020-8712","url":"https://www.cve.org/CVERecord?id=CVE-2020-8712"},{"name":"CVE-2020-8711","url":"https://www.cve.org/CVERecord?id=CVE-2020-8711"},{"name":"CVE-2020-12301","url":"https://www.cve.org/CVERecord?id=CVE-2020-12301"},{"name":"CVE-2020-8682","url":"https://www.cve.org/CVERecord?id=CVE-2020-8682"},{"name":"CVE-2020-8730","url":"https://www.cve.org/CVERecord?id=CVE-2020-8730"},{"name":"CVE-2020-0512","url":"https://www.cve.org/CVERecord?id=CVE-2020-0512"},{"name":"CVE-2020-8763","url":"https://www.cve.org/CVERecord?id=CVE-2020-8763"},{"name":"CVE-2020-8684","url":"https://www.cve.org/CVERecord?id=CVE-2020-8684"},{"name":"CVE-2020-0510","url":"https://www.cve.org/CVERecord?id=CVE-2020-0510"},{"name":"CVE-2020-0554","url":"https://www.cve.org/CVERecord?id=CVE-2020-0554"},{"name":"CVE-2020-8715","url":"https://www.cve.org/CVERecord?id=CVE-2020-8715"},{"name":"CVE-2020-8718","url":"https://www.cve.org/CVERecord?id=CVE-2020-8718"},{"name":"CVE-2020-8714","url":"https://www.cve.org/CVERecord?id=CVE-2020-8714"},{"name":"CVE-2020-8720","url":"https://www.cve.org/CVERecord?id=CVE-2020-8720"},{"name":"CVE-2020-8713","url":"https://www.cve.org/CVERecord?id=CVE-2020-8713"},{"name":"CVE-2020-8729","url":"https://www.cve.org/CVERecord?id=CVE-2020-8729"},{"name":"CVE-2020-8743","url":"https://www.cve.org/CVERecord?id=CVE-2020-8743"},{"name":"CVE-2020-8722","url":"https://www.cve.org/CVERecord?id=CVE-2020-8722"},{"name":"CVE-2019-14620","url":"https://www.cve.org/CVERecord?id=CVE-2019-14620"},{"name":"CVE-2020-8680","url":"https://www.cve.org/CVERecord?id=CVE-2020-8680"},{"name":"CVE-2020-8759","url":"https://www.cve.org/CVERecord?id=CVE-2020-8759"},{"name":"CVE-2020-8721","url":"https://www.cve.org/CVERecord?id=CVE-2020-8721"},{"name":"CVE-2020-12299","url":"https://www.cve.org/CVERecord?id=CVE-2020-12299"},{"name":"CVE-2020-8706","url":"https://www.cve.org/CVERecord?id=CVE-2020-8706"},{"name":"CVE-2020-8708","url":"https://www.cve.org/CVERecord?id=CVE-2020-8708"},{"name":"CVE-2020-0559","url":"https://www.cve.org/CVERecord?id=CVE-2020-0559"},{"name":"CVE-2020-8687","url":"https://www.cve.org/CVERecord?id=CVE-2020-8687"},{"name":"CVE-2020-8679","url":"https://www.cve.org/CVERecord?id=CVE-2020-8679"},{"name":"CVE-2019-14630","url":"https://www.cve.org/CVERecord?id=CVE-2019-14630"},{"name":"CVE-2020-8733","url":"https://www.cve.org/CVERecord?id=CVE-2020-8733"},{"name":"CVE-2020-8709","url":"https://www.cve.org/CVERecord?id=CVE-2020-8709"},{"name":"CVE-2020-12300","url":"https://www.cve.org/CVERecord?id=CVE-2020-12300"},{"name":"CVE-2020-0513","url":"https://www.cve.org/CVERecord?id=CVE-2020-0513"},{"name":"CVE-2020-8707","url":"https://www.cve.org/CVERecord?id=CVE-2020-8707"}],"links":[],"reference":"CERTFR-2020-AVI-497","revisions":[{"description":"Version initiale","revision_date":"2020-08-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00411 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00411.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00375 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00375.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00387 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00386 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00386.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00379 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00379.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00376 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00376.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00378 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00378.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00396 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00396.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00377 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00377.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00337 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00337.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00369 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00392 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00392.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00355 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00384 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00394 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00394.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00399 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00399.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00406 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00406.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00367 du 11 ao\u00fbt 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00367.html"}]}
