Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA64E7EE-8977-4427-9FF9-DD9FE80F02C6", "versionEndExcluding": "11.8.80", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DDDD0D3-CE11-49C7-93F7-F2AA1053DD86", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A5C4B3E-3C68-4D2B-A181-18A71378362E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB22E6F2-D34F-4A05-9CC2-BCAF3E84F54E", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "94D40FF5-8E0A-4591-9CE4-2E671C8E4F2E", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B323721-380E-4222-AB7A-9993BF8DA653", "versionEndExcluding": "14.5.25", "versionStartIncluding": "14.5.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:intel:trusted_execution_technology:3.1.80:*:*:*:*:*:*:*", "matchCriteriaId": "F77A0250-5C61-4087-9ED0-315D64FDA70B", "vulnerable": true}, {"criteria": "cpe:2.3:a:intel:trusted_execution_technology:4.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "D9417CE8-97BF-4BB6-AF2A-1FC8C2B4A05B", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Use after free in DAL subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access."}, {"lang": "es", "value": "Un uso de la memoria previamente liberada en el subsistema DAL para Intel\u00ae CSME versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 y 14.5.25, Intel\u00ae TXE versiones 3.1.80, 4.0.30 puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local"}], "id": "CVE-2020-12303", "lastModified": "2024-11-21T04:59:28.930", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-11-12T18:15:13.517", "references": [{"source": "secure@intel.com", "tags": ["Third Party Advisory"], "url": "https://security.netapp.com/advisory/ntap-20201113-0002/"}, {"source": "secure@intel.com", "tags": ["Third Party Advisory"], "url": "https://security.netapp.com/advisory/ntap-20201113-0005/"}, {"source": "secure@intel.com", "tags": ["Vendor Advisory"], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://security.netapp.com/advisory/ntap-20201113-0002/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://security.netapp.com/advisory/ntap-20201113-0005/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391"}], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-416"}], "source": "nvd@nist.gov", "type": "Primary"}]}