Improper initialization in subsystem for Intel(R) CSME versions before12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 4.0.30 Intel(R) SPS versions before E3_05.01.04.200 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20201113-0002/ | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20201113-0004/ | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20201113-0005/ | Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20201113-0002/ | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20201113-0004/ | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20201113-0005/ | Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf - Patch, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20201113-0002/ - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20201113-0004/ - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20201113-0005/ - Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 - Vendor Advisory |
19 Oct 2022, 13:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_s7-1518f-4_pn\/dp_mfp_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_s7-1518-4_pn\/dp_mfp:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_s7-1518f-4_pn\/dp_mfp:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_s7-1500_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_s7-1518-4_pn\/dp_mfp_firmware:-:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf - Patch, Third Party Advisory |
Information
Published : 2020-11-12 18:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8744
Mitre link : CVE-2020-8744
CVE.ORG link : CVE-2020-8744
JSON object : View
Products Affected
intel
- trusted_execution_engine
- server_platform_services
- converged_security_and_management_engine
siemens
- simatic_s7-1518f-4_pn\/dp_mfp_firmware
- simatic_s7-1518-4_pn\/dp_mfp_firmware
- simatic_s7-1500_firmware
- simatic_s7-1518-4_pn\/dp_mfp
- simatic_s7-1518f-4_pn\/dp_mfp
- simatic_s7-1500
CWE
CWE-665
Improper Initialization