Show plain JSON{"id": "CVE-2020-0539", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.5, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 1.8}]}, "published": "2020-06-15T14:15:10.970", "references": [{"url": "https://security.netapp.com/advisory/ntap-20200611-0006/", "source": "secure@intel.com"}, {"url": "https://support.lenovo.com/de/en/product_security/len-30041", "source": "secure@intel.com"}, {"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "tags": ["Vendor Advisory"], "source": "secure@intel.com"}, {"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "tags": ["Vendor Advisory"], "source": "secure@intel.com"}, {"url": "https://security.netapp.com/advisory/ntap-20200611-0006/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.lenovo.com/de/en/product_security/len-30041", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions before 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local access."}, {"lang": "es", "value": "Un salto de ruta en el subsistema para el software Intel\u00ae DAL para Intel\u00ae CSME versiones anteriores a 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 e Intel\u00ae TXE versiones anteriores 3.1.75, 4.0.25, puede permitir a un usuario poco privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"}], "lastModified": "2024-11-21T04:53:41.967", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CA2E306-9AEC-4767-9738-3EF0B833F896", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0"}, {"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "299E26BE-7DB3-4D58-9C86-7634ACA11324", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10"}, {"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E62CE07C-7068-4FE3-9268-0A551D397597", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20"}, {"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:undefined", "vulnerable": true, "matchCriteriaId": "7A86A849-7161-4EA0-B1CF-4E74A55D2E67", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0"}, {"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51B0E191-66BD-49B1-B745-F63006AD2A6F", "versionEndExcluding": "13.0.32", "versionStartIncluding": "13.0"}, {"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "004EE62A-979B-4D9B-928D-B2558CE79B4E", "versionEndExcluding": "14.0.33", "versionStartIncluding": "14.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2ADFD0F7-45EE-4639-AB9D-CA36F7F18181", "versionEndExcluding": "3.1.75", "versionStartIncluding": "3.0"}, {"criteria": "cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D84402A-0018-4632-984C-78F4D85609C3", "versionEndExcluding": "4.0.25", "versionStartIncluding": "4.0"}], "operator": "OR"}]}], "sourceIdentifier": "secure@intel.com"}