Privilege escalation in Intel CSME, TXE and SPS



Published: 2020-11-26
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2020-8705
CWE ID CWE-665
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Converged Security and Management Engine (CSME)
Hardware solutions / Firmware

Intel Trusted Execution Engine Firmware
Hardware solutions / Firmware

Intel Server Platform Services Firmware
Web applications / Other software

Vendor Intel

Security Advisory

This security advisory describes one low risk vulnerability.

1) Improper Initialization

Risk: Low

CVSSv3: 6.2 [CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-8705

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local attacker to escalate privileges on the system.

The vulnerability exists due to improper initialization in Intel Boot Guard. An attacker with physical access can run a specially crafted application to execute arbitrary code with escalated privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Converged Security and Management Engine (CSME): before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45, 14.5.25

Intel Trusted Execution Engine Firmware: before 3.1.80, 4.0.30

Intel Server Platform Services Firmware: before E3_04.01.04.200, E3_05.01.04.200, E5_04.01.04.400, SoC-A_04.00.04.300, SoC-X_04.00.04.200

CPE External links

https://security.netapp.com/advisory/ntap-20201113-0002/
https://security.netapp.com/advisory/ntap-20201113-0004/
https://security.netapp.com/advisory/ntap-20201113-0005/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391

Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###