cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-8751,https://securityvulnerability.io/vulnerability/CVE-2020-8751,Insufficient Control Flow Management in Intel CSME and TXE Products,"The vulnerability arises from insufficient control flow management in the Intel CSME and TXE subsystems. This flaw potentially allows an unauthenticated user to gain access to sensitive information through physical access, posing a security risk for systems utilizing affected versions of these technologies. It is essential for users and organizations to ensure they are running the latest firmware updates to mitigate any potential risks.",Intel,"Intel(r) Csme, Intel(r) Txe",4.6,MEDIUM,0.0010600000387057662,false,,false,false,false,,,false,false,,2020-11-12T18:08:23.000Z,0 CVE-2020-12303,https://securityvulnerability.io/vulnerability/CVE-2020-12303,Use After Free Vulnerability in Intel CSME and TXE Products,"A use after free vulnerability in the Data Access Layer (DAL) subsystem of Intel's CSME and TXE products could potentially allow an authenticated user to escalate their privileges through local access. This issue affects multiple versions of CSME and TXE, making it crucial for users to ensure they are operating on supported and updated versions to mitigate the risks associated with this vulnerability.",Intel,"Intel(r) Csme, Intel(r) Txe",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-11-12T18:07:22.000Z,0 CVE-2020-8705,https://securityvulnerability.io/vulnerability/CVE-2020-8705,Insecure Initialization in Intel Boot Guard and Management Engine,"This vulnerability involves insecure default initialization in Intel's Boot Guard and various CSME versions. It may allow an unauthenticated individual with physical access to potentially escalate privileges, posing a significant security risk. Versions prior to specified releases are at risk, underlining the importance of timely software updates to mitigate potential threats.",Intel,"Intel(r) Boot Guard, Intel(r) Csme, Intel(r) Txe, Intel(r) Sps",6.8,MEDIUM,0.0020000000949949026,false,,false,false,false,,,false,false,,2020-11-12T18:06:24.000Z,0 CVE-2020-8744,https://securityvulnerability.io/vulnerability/CVE-2020-8744,Improper Initialization in Intel CSME and TXE Products,"An improper initialization vulnerability exists in the Intel Common Smart Management Engine (CSME) and Intel Trusted Execution Engine (TXE) versions. This flaw may allow a privileged local user to potentially escalate their privileges, leading to unauthorized actions within the affected systems. It is crucial for users and administrators to understand the implications of this vulnerability and apply the necessary updates to mitigate risks. Reference links provide further details for remediation strategies.",Intel,"Intel(r) Csme Versions, Intel(r) Txe, Intel(r) Sps",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2020-11-12T18:06:17.000Z,0 CVE-2020-8745,https://securityvulnerability.io/vulnerability/CVE-2020-8745,Insufficient Control Flow Management in Intel CSME and TXE Products,"This vulnerability arises from insufficient control flow management in Intel's CSME and TXE subsystems. An unauthenticated user with physical access could potentially exploit this weakness to escalate privileges, thereby gaining unauthorized control over the system. Effective mitigation requires upgrading to the recommended versions specified by Intel to ensure protection against potential exploitation.",Intel,"Intel(r) Csme, Intel(r) Txe",6.8,MEDIUM,0.0011699999449774623,false,,false,false,false,,,false,false,,2020-11-12T18:06:09.000Z,0 CVE-2020-12297,https://securityvulnerability.io/vulnerability/CVE-2020-12297,Improper Access Control in Intel CSME Driver for Windows Software,"The vulnerability in the Installer for Intel CSME Driver for Windows stems from improper access control, allowing an authenticated user to potentially escalate privileges through local access. Affected versions span across various iterations of the driver, urging users to apply the recommended updates to mitigate potential local exploits. For further technical details, refer to Intel's security advisory.",Intel,"Intel(r) Csme, Intel Txe",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-11-12T18:05:39.000Z,0 CVE-2020-0545,https://securityvulnerability.io/vulnerability/CVE-2020-0545,"Integer Overflow Vulnerability in Intel CSME, TXE, and Server Platform Services","An integer overflow vulnerability exists in the subsystem of Intel's CSME, TXE, and Server Platform Services. This flaw may be exploited by a privileged user with local access to potentially enable a denial of service condition, affecting the stability and performance of systems reliant on these products. Proper patching is crucial to mitigate the risk posed by this vulnerability.",Intel,"Intel(r) Csme, Intel(r) Txe, And Intel(r) Sps",4.4,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2020-06-15T14:00:40.000Z,0 CVE-2019-11110,https://securityvulnerability.io/vulnerability/CVE-2019-11110,Authentication Bypass in Intel CSME and TXE Products,"An authentication bypass vulnerability exists in Intel's CSME and TXE subsystems, which could allow a privileged user to potentially escalate privileges through local access. This issue impacts various versions of Intel CSME and TXE, resulting in potential security risks where unauthorized elevation of privileges may occur. It is recommended to upgrade to the latest versions to mitigate this vulnerability.",Intel,"Intel(r) Csme, Intel(r) Txe",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-12-18T21:10:03.000Z,0 CVE-2019-11101,https://securityvulnerability.io/vulnerability/CVE-2019-11101,Insufficient Input Validation Issue in Intel CSME and TXE,"Insufficient input validation in the Intel CSME and TXE subsystems may allow a privileged user to exploit this weakness. This vulnerability enables the potential for information disclosure if local access is obtained, emphasizing the need for prompt updates to affected versions to mitigate the risks.",Intel,"Intel(r) Csme, Intel(r) Txe",4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-12-18T21:09:13.000Z,0 CVE-2019-11087,https://securityvulnerability.io/vulnerability/CVE-2019-11087,Insufficient Input Validation in Intel CSME and TXE Products,"Insufficient input validation in Intel's CSME and TXE subsystems may allow local privileged users to exploit the flaw, potentially leading to privilege escalation, unauthorized information disclosure, or denial of service. This vulnerability affects multiple versions of the software, making it critical for users to update to the latest versions to ensure system security.",Intel,"Intel(r) Csme, Intel(r) Txe",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-12-18T21:09:04.000Z,0 CVE-2019-0168,https://securityvulnerability.io/vulnerability/CVE-2019-0168,Insufficient Input Validation in Intel CSME and TXE Products,"The identified vulnerability in Intel's CSME and TXE products stems from insufficient input validation within the subsystem. This issue can potentially allow a privileged user, with local access, to exploit the flaw and enable unauthorized information disclosure. It's essential for users of affected versions to apply the latest updates to mitigate this risk.",Intel,"Intel(r) Csme, Intel(r) Txe",4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-12-18T21:08:56.000Z,0 CVE-2019-0091,https://securityvulnerability.io/vulnerability/CVE-2019-0091,Code Injection Vulnerability in Intel CSME and TXE Products,"A code injection vulnerability exists in the installer for Intel CSME and Intel TXE, which may enable an unprivileged user to escalate their privileges through local access. Affected versions include CSME versions earlier than 11.8.65, 11.11.65, 11.22.65, and 12.0.35, as well as TXE versions prior to 3.1.65 and 4.0.15. Users are advised to update to the latest versions to mitigate this risk.",Intel,"Intel(r) Converged Security & Management Engine (csme), Intel (r) Trusted Execution Engine Interface (txe)",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-05-17T15:41:38.000Z,0 CVE-2019-0086,https://securityvulnerability.io/vulnerability/CVE-2019-0086,Insufficient Access Control in Intel Dynamic Application Loader Software,"An insufficient access control vulnerability exists in the Dynamic Application Loader for Intel software. Unprivileged users may exploit this vulnerability to escalate their privileges through local access, potentially compromising system integrity. The affected versions include Intel CSME prior to 11.8.65 and certain releases thereafter, as well as specific versions of Intel TXE.",Intel,"Intel(r) Converged Security & Management Engine (csme) Dynamic Application Loader, Intel (r) Trusted Execution Engine Interface (txe)",7.8,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2019-05-17T15:41:38.000Z,0 CVE-2019-0098,https://securityvulnerability.io/vulnerability/CVE-2019-0098,Logic Bug Vulnerability in Intel CSME and TXE Products,"A logic bug has been identified in the Intel CSME before version 12.0.35 and Intel TXE before versions 3.1.65 and 4.0.15. This vulnerability allows an unauthenticated user with physical access to potentially escalate privileges, posing a significant security threat. Organizations using affected products should consider mitigations and updates to safeguard their systems from unauthorized access.",Intel,"Intel(r) Converged Security & Management Engine (csme), Intel (r) Trusted Execution Engine Interface (txe)",6.8,MEDIUM,0.0007399999885819852,false,,false,false,false,,,false,false,,2019-05-17T15:41:38.000Z,0