{"vulnerability": "CVE-2020-1232", "sightings": [{"uuid": "de1a186f-c0ba-479e-a9b3-7f6a6888e281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12321", "type": "seen", "source": "https://t.me/CyberGovIL/928", "content": "\u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u05e9\u05dc Intel - \u05e0\u05d5\u05d1\u05de\u05d1\u05e8 2020 | Com1528\n\n\u05d1\u05de\u05e1\u05d2\u05e8\u05ea \u05e2\u05d3\u05db\u05d5\u05df \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d7\u05d5\u05d3\u05e9\u05d9 \u05e9\u05dc\u05d4, \u05d7\u05d1\u05e8\u05ea \u05d0\u05d9\u05e0\u05d8\u05dc \u05e4\u05e8\u05e1\u05de\u05d4 40 \u05d4\u05ea\u05e8\u05e2\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4 \u05e2\u05d1\u05d5\u05e8 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05e9\u05d4\u05ea\u05d2\u05dc\u05d5 \u05d1\u05de\u05d5\u05e6\u05e8\u05d9\u05d4, \u05d0\u05e9\u05e8 \u05e9\u05ea\u05d9\u05d9\u05dd \u05de\u05d4\u05df \u05d3\u05d5\u05e8\u05d2\u05d5 \u05db\u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea.\n\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d4\u05e8\u05d0\u05e9\u05d5\u05e0\u05d4 (CVE-2020-8752) \u05d4\u05ea\u05d2\u05dc\u05ea\u05d4 \u05d1\u05de\u05d5\u05e6\u05e8\u05d9\u05dd Intel AMT \u05d5-Intel Standard Manageability (ISM), \u05d5\u05e2\u05dc\u05d5\u05dc\u05d4 \u05dc\u05d0\u05e4\u05e9\u05e8 \u05d4\u05e2\u05dc\u05d0\u05ea \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea (Escalation of privilege) \u05e2\u05dc-\u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e3 \u05d1\u05e2\u05dc \u05e0\u05d2\u05d9\u05e9\u05d5\u05ea \u05e8\u05e9\u05ea\u05d9\u05ea \u05dc\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9\u05dd \u05d0\u05dc\u05d5.\n\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d4\u05e9\u05e0\u05d9\u05d9\u05d4 (CVE-2020-12321) \u05d4\u05ea\u05d2\u05dc\u05ea\u05d4 \u05d1\u05de\u05d5\u05e6\u05e8\u05d9 Wireless Bluetooth \u05de\u05e1\u05d5\u05d9\u05de\u05d9\u05dd \u05e9\u05dc \u05d4\u05d7\u05d1\u05e8\u05d4, \u05d5\u05e2\u05dc\u05d5\u05dc\u05d4 \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e3 \u05d4\u05e2\u05dc\u05d0\u05ea \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea \u05e0\u05d2\u05d9\u05e9\u05d5\u05ea \u05e4\u05d9\u05d6\u05d9\u05ea \u05dc\u05e8\u05e9\u05ea \u05d0\u05dc\u05d7\u05d5\u05d8\u05d9\u05ea \u05de\u05e9\u05d5\u05ea\u05e4\u05ea \u05e2\u05dd \u05d9\u05e2\u05d3 \u05d4\u05ea\u05e7\u05d9\u05e4\u05d4.", "creation_timestamp": "2020-11-12T12:17:00.000000Z"}, {"uuid": "22876ab5-4ef8-4c04-b226-0e3c357507a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12321", "type": "seen", "source": "https://t.me/cibsecurity/16242", "content": "\u203c CVE-2020-12321 \u203c\n\nImproper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-12T20:37:54.000000Z"}, {"uuid": "2b4ceb53-3f99-4043-afaf-6f1954aa3b49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12326", "type": "seen", "source": "https://t.me/cibsecurity/16259", "content": "\u203c CVE-2020-12326 \u203c\n\nImproper initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable information disclosure via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-12T22:32:05.000000Z"}, {"uuid": "f0f0ac34-421e-4328-a17b-0eccea5322be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12323", "type": "seen", "source": "https://t.me/cibsecurity/16254", "content": "\u203c CVE-2020-12323 \u203c\n\nImproper input validation in the Intel(R) ADAS IE before version ADAS_IE_1.0.766 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-12T22:31:59.000000Z"}]}