cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-8755,https://securityvulnerability.io/vulnerability/CVE-2020-8755,Race Condition Vulnerability in Intel CSME and SPS Products,"A race condition exists in the Intel CSME and SPS subsystems that may allow an unauthenticated user with physical access to escalate their privileges. Affected versions of these products could potentially be exploited, resulting in significant security risks. Organizations should review the Intel security advisories for mitigation strategies and updates to prevent exploitation.",Intel,"Intel(r) Csme, Intel(r) Sps",6.4,MEDIUM,0.0012100000167265534,false,,false,false,false,,,false,false,,2020-11-12T18:09:17.000Z,0 CVE-2020-8705,https://securityvulnerability.io/vulnerability/CVE-2020-8705,Insecure Initialization in Intel Boot Guard and Management Engine,"This vulnerability involves insecure default initialization in Intel's Boot Guard and various CSME versions. It may allow an unauthenticated individual with physical access to potentially escalate privileges, posing a significant security risk. Versions prior to specified releases are at risk, underlining the importance of timely software updates to mitigate potential threats.",Intel,"Intel(r) Boot Guard, Intel(r) Csme, Intel(r) Txe, Intel(r) Sps",6.8,MEDIUM,0.0020000000949949026,false,,false,false,false,,,false,false,,2020-11-12T18:06:24.000Z,0 CVE-2020-8744,https://securityvulnerability.io/vulnerability/CVE-2020-8744,Improper Initialization in Intel CSME and TXE Products,"An improper initialization vulnerability exists in the Intel Common Smart Management Engine (CSME) and Intel Trusted Execution Engine (TXE) versions. This flaw may allow a privileged local user to potentially escalate their privileges, leading to unauthorized actions within the affected systems. It is crucial for users and administrators to understand the implications of this vulnerability and apply the necessary updates to mitigate risks. Reference links provide further details for remediation strategies.",Intel,"Intel(r) Csme Versions, Intel(r) Txe, Intel(r) Sps",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2020-11-12T18:06:17.000Z,0 CVE-2020-0545,https://securityvulnerability.io/vulnerability/CVE-2020-0545,"Integer Overflow Vulnerability in Intel CSME, TXE, and Server Platform Services","An integer overflow vulnerability exists in the subsystem of Intel's CSME, TXE, and Server Platform Services. This flaw may be exploited by a privileged user with local access to potentially enable a denial of service condition, affecting the stability and performance of systems reliant on these products. Proper patching is crucial to mitigate the risk posed by this vulnerability.",Intel,"Intel(r) Csme, Intel(r) Txe, And Intel(r) Sps",4.4,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2020-06-15T14:00:40.000Z,0 CVE-2019-0090,https://securityvulnerability.io/vulnerability/CVE-2019-0090,Insufficient Access Control in Intel(R) CSME and Server Platform Services,"An insufficient access control vulnerability exists in the Intel(R) CSME, TXE, and Server Platform Services prior to specific versions. This flaw could allow an unauthenticated user with physical access to exploit the vulnerability and potentially escalate privileges, posing significant security risks to affected systems.",Intel,"Intel(r) Converged Security & Management Engine (csme), Intel(r) Server Platform Services (sps)",7.1,HIGH,0.0007699999841861427,false,,false,false,false,,,false,false,,2019-05-17T15:41:38.000Z,0 CVE-2019-0093,https://securityvulnerability.io/vulnerability/CVE-2019-0093,Insufficient Data Sanitization Vulnerability in Intel CSME and SPS Systems,"A significant vulnerability in the Intel HECI subsystem affects the CSME and SPS products, due to insufficient data sanitization. This flaw allows a privileged user to potentially disclose sensitive information through local access. Users operating under these affected versions are urged to evaluate their systems and apply necessary updates to safeguard against potential exploits.",Intel,"Intel(r) Converged Security & Management Engine (csme), Intel(r) Server Platform Services (sps)",4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-05-17T15:41:38.000Z,0