Description
Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Published: 2020-11-12
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-4667 Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
History

Tue, 04 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Subscriptions

Intel Trusted Execution Engine
cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2025-11-04T19:12:06.172Z

Reserved: 2020-04-28T00:00:00.000Z

Link: CVE-2020-12355

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-12T18:15:14.737

Modified: 2025-11-04T20:15:56.643

Link: CVE-2020-12355

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses