Language:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844056
http://www.nessus.org/u?42c4e444
https://www.debian.org/lts/security/2023/dla-3380
https://security-tracker.debian.org/tracker/CVE-2020-12362
https://security-tracker.debian.org/tracker/CVE-2020-12363
https://security-tracker.debian.org/tracker/CVE-2020-12364
https://security-tracker.debian.org/tracker/CVE-2020-24586
https://security-tracker.debian.org/tracker/CVE-2020-24587
https://security-tracker.debian.org/tracker/CVE-2020-24588
https://security-tracker.debian.org/tracker/CVE-2021-23168
https://security-tracker.debian.org/tracker/CVE-2021-23223
https://security-tracker.debian.org/tracker/CVE-2021-37409
https://security-tracker.debian.org/tracker/CVE-2021-44545
Severity: High
ID: 173776
File Name: debian_DLA-3380.nasl
Version: 1.2
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 4/2/2023
Updated: 4/19/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Medium
Base Score: 4.6
Temporal Score: 3.8
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2020-12362
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.2
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2022-21181
CPE: p-cpe:/a:debian:debian_linux:firmware-cavium, p-cpe:/a:debian:debian_linux:firmware-qlogic, p-cpe:/a:debian:debian_linux:firmware-ivtv, p-cpe:/a:debian:debian_linux:firmware-myricom, p-cpe:/a:debian:debian_linux:firmware-adi, p-cpe:/a:debian:debian_linux:firmware-amd-graphics, p-cpe:/a:debian:debian_linux:firmware-netronome, p-cpe:/a:debian:debian_linux:firmware-linux, p-cpe:/a:debian:debian_linux:firmware-ipw2x00, p-cpe:/a:debian:debian_linux:firmware-brcm80211, p-cpe:/a:debian:debian_linux:firmware-siano, p-cpe:/a:debian:debian_linux:firmware-libertas, cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:firmware-iwlwifi, p-cpe:/a:debian:debian_linux:firmware-bnx2x, p-cpe:/a:debian:debian_linux:firmware-qcom-media, p-cpe:/a:debian:debian_linux:firmware-linux-nonfree, p-cpe:/a:debian:debian_linux:firmware-ralink, p-cpe:/a:debian:debian_linux:firmware-samsung, p-cpe:/a:debian:debian_linux:firmware-intelwimax, p-cpe:/a:debian:debian_linux:firmware-ti-connectivity, p-cpe:/a:debian:debian_linux:firmware-atheros, p-cpe:/a:debian:debian_linux:firmware-misc-nonfree, p-cpe:/a:debian:debian_linux:firmware-netxen, p-cpe:/a:debian:debian_linux:firmware-bnx2, p-cpe:/a:debian:debian_linux:firmware-realtek, p-cpe:/a:debian:debian_linux:firmware-intel-sound
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/1/2023
Vulnerability Publication Date: 2/17/2021
CVE: CVE-2020-12362, CVE-2020-12363, CVE-2020-12364, CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2021-23168, CVE-2021-23223, CVE-2021-37409, CVE-2021-44545, CVE-2022-21181