
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN020
_____________________________________________________________________

DATE                : 15/01/2020

HARDWARE PLATFORM(S): Intel®.

OPERATING SYSTEM(S): Windows running Intel® RWC 3 versions prior to
                                   7.010.009.000.

=====================================================================
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00308.html
_____________________________________________________________________

Intel® RWC 3 for Windows* Advisory
Intel ID:                INTEL-SA-00308
Advisory Category:       Software
Impact of vulnerability: Escalation of Privilege, Denial of Service,
                         Information Disclosure
Severity rating:         MEDIUM
Original release:        01/14/2020
Last revised:            01/14/2020


Summary:

A potential security vulnerability in the Intel® RAID Web Console (RWC)
3 for Windows* may allow escalation of privilege.  Intel is releasing
software updates to mitigate this potential vulnerability.


Vulnerability Details:

CVEID: CVE-2019-14601

Description: Improper permissions in the installer for Intel(R) RWC 3
for Windows before version 7.010.009.000 may allow an authenticated user
to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.7 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H


Affected Products:

Intel® RWC 3 for Windows* before version 7.010.009.000.


Recommendations:

Intel recommends updating RWC 3 for Windows* to version 7.010.009.000 or
later.

Updates are available for download at this location:
https://downloadcenter.intel.com/download/29210/Intel-RAID-Web-Console-3-for-Windows-


Acknowledgements:

Intel would like to thank SaifAllah benMassaoud for reporting this
issue.

Intel, and nearly the entire technology industry, follows a disclosure
practice called Coordinated Disclosure, under which a cybersecurity
vulnerability is generally publicly disclosed only after mitigations
are available.


Revision History

Revision      Date              Description
1.0           01/14/2020        Initial Release


Legal Notices and Disclaimers

Intel provides these materials as-is, with no express or implied
warranties.

All products, dates, and figures specified are preliminary based on
current expectations, and are subject to change without notice.

Intel, processors, chipsets, and desktop boards may contain design
defects or errors known as errata, which may cause the product to
deviate from published specifications. Current characterized errata are
available on request.

Intel technologies’ features and benefits depend on system configuration
and may require enabled hardware, software or service activation.
Performance varies depending on system configuration. No computer system
can be absolutely secure. Check with your system manufacturer or
retailer or learn more at https://intel.com.

Some results have been estimated or simulated using internal Intel
analysis or architecture simulation or modeling, and provided to you
for informational purposes. Any differences in your system hardware,
software or configuration may affect your actual performance.

Intel and the Intel logo are trademarks of Intel Corporation in the
United States and other countries.

*Other names and brands may be claimed as the property of others.


Copyright © Intel Corporation 2019


=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================



