{
  "threat_severity" : "Important",
  "public_date" : "2020-11-10T13:55:00Z",
  "bugzilla" : {
    "description" : "hardware: buffer overflow in bluetooth firmware",
    "id" : "1893914",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1893914"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-120",
  "details" : [ "Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "A flaw was found in the firmware of some Intel Bluetooth devices. This may allow an unauthenticated attacker within Bluetooth range to overflow a buffer and corrupt memory leading to a crash or privilege escalation." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2021-02-02T00:00:00Z",
    "advisory" : "RHSA-2021:0339",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "linux-firmware-0:20200421-80.git78c0348.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.7 Advanced Update Support",
    "release_date" : "2022-11-09T00:00:00Z",
    "advisory" : "RHSA-2022:7887",
    "cpe" : "cpe:/o:redhat:rhel_aus:7.7",
    "package" : "linux-firmware-0:20190429-73.gitddde598.el7_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.7 Telco Extended Update Support",
    "release_date" : "2022-11-09T00:00:00Z",
    "advisory" : "RHSA-2022:7887",
    "cpe" : "cpe:/o:redhat:rhel_tus:7.7",
    "package" : "linux-firmware-0:20190429-73.gitddde598.el7_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions",
    "release_date" : "2022-11-09T00:00:00Z",
    "advisory" : "RHSA-2022:7887",
    "cpe" : "cpe:/o:redhat:rhel_e4s:7.7",
    "package" : "linux-firmware-0:20190429-73.gitddde598.el7_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2020-12-15T00:00:00Z",
    "advisory" : "RHSA-2020:5479",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "linux-firmware-0:20200619-101.git3890db36.el8_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.1 Extended Update Support",
    "release_date" : "2021-01-19T00:00:00Z",
    "advisory" : "RHSA-2021:0183",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.1",
    "package" : "linux-firmware-0:20190516-96.git711d3297.el8_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Extended Update Support",
    "release_date" : "2020-12-15T00:00:00Z",
    "advisory" : "RHSA-2020:5416",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.2",
    "package" : "linux-firmware-0:20191202-99.gite8a0f4c9.el8_2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-12321\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-12321\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00403.html" ],
  "name" : "CVE-2020-12321",
  "mitigation" : {
    "value" : "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
    "lang" : "en:us"
  },
  "csaw" : false
}