cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-12299,https://securityvulnerability.io/vulnerability/CVE-2020-12299,Improper Input Validation in Intel Server Board Firmware,"A vulnerability exists in the BIOS firmware for Intel Server Board Families S2600ST, S2600BP, and S2600WF due to improper input validation. This flaw can be exploited by a privileged user with local access, potentially allowing them to escalate their privileges. This highlights the importance of maintaining firmware integrity and applying necessary patches to mitigate security risks. For further details, visit Intel's advisory and security recommendations.",Intel,Intel(r) Server Board Families Advisory,8.2,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-08-13T03:26:55.000Z,0 CVE-2020-12301,https://securityvulnerability.io/vulnerability/CVE-2020-12301,Privilege Escalation Risk in Intel Server Boards,"Improper initialization in the BIOS firmware of Intel's Server Board Families, including S2600ST, S2600BP, and S2600WF, can be exploited by a privileged user with local access, potentially enabling escalation of privileges. This vulnerability allows unauthorized actions, which could impact system integrity and confidentiality. Users are advised to review their systems and assess the need for firmware updates as recommended by the vendor to mitigate associated risks.",Intel,Intel(r) Server Board Families Advisory,8.2,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-08-13T03:26:30.000Z,0 CVE-2020-12300,https://securityvulnerability.io/vulnerability/CVE-2020-12300,Privilege Escalation Vulnerability in Intel Server Board Firmware,"An uninitialized pointer vulnerability exists in the BIOS firmware for various Intel Server Board families, namely S2600CW, S2600KP, S2600TP, and S2600WT. This flaw may enable a privileged user to potentially escalate privileges via local access. Proper mitigation and updates are essential to secure affected systems.",Intel,Intel(r) Server Board Families Advisory,8.2,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-08-13T03:25:52.000Z,0