Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Trusted_execution_engine
(Intel)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-11-12 | CVE-2020-8744 | Improper initialization in subsystem for Intel(R) CSME versions before12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 4.0.30 Intel(R) SPS versions before E3_05.01.04.200 may allow a privileged user to potentially enable escalation of privilege via local access. | Converged_security_and_management_engine, Server_platform_services, Trusted_execution_engine, Simatic_s7\-1500_firmware, Simatic_s7\-1518\-4_pn\/dp_mfp_firmware, Simatic_s7\-1518f\-4_pn\/dp_mfp_firmware | 7.8 | ||
2020-11-12 | CVE-2020-8750 | Use after free in Kernel Mode Driver for Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an authenticated user to potentially enable escalation of privilege via local access. | Trusted_execution_engine | 7.8 | ||
2020-11-12 | CVE-2020-12355 | Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | Trusted_execution_engine | 6.8 | ||
2020-06-15 | CVE-2020-0545 | Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access. | Converged_security_management_engine_firmware, Server_platform_services, Trusted_execution_engine | N/A |