Intel Server Platform Services prior SPS_E3_04.01.04.109.0/SPS_E3_04.08.04.070.0 Subsystem initialization

entryeditHistoryDiffjsonxmlCTI

A vulnerability was found in Intel Server Platform Services and classified as critical. Affected by this issue is some unknown processing of the component Subsystem. Upgrading to version SPS_E3_04.01.04.109.0 or SPS_E3_04.08.04.070.0 eliminates this vulnerability.

Field06/16/2020 08:30 AM06/16/2020 08:35 AM10/24/2020 04:21 PM
vendorIntelIntelIntel
nameServer Platform ServicesServer Platform ServicesServer Platform Services
componentSubsystemSubsystemSubsystem
risk222
historic000
cvss2_vuldb_basescore4.14.14.1
cvss2_vuldb_tempscore3.63.63.6
cvss2_vuldb_avLLL
cvss2_vuldb_acMMM
cvss2_vuldb_auSSS
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss3_meta_basescore6.56.56.5
cvss3_meta_tempscore6.36.36.3
cvss3_vuldb_basescore5.35.35.3
cvss3_vuldb_tempscore5.15.15.1
cvss3_vuldb_avLLL
cvss3_vuldb_acLLL
cvss3_vuldb_prLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
date1592179200 (06/15/2020)1592179200 (06/15/2020)1592179200 (06/15/2020)
urlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html
price_0day$5k-$25k$5k-$25k$5k-$25k
nameUpgradeUpgradeUpgrade
upgrade_versionSPS_E3_04.01.04.109.0/SPS_E3_04.08.04.070.0SPS_E3_04.01.04.109.0/SPS_E3_04.08.04.070.0SPS_E3_04.01.04.109.0/SPS_E3_04.08.04.070.0
cveCVE-2020-0586CVE-2020-0586CVE-2020-0586
seealso156707 156708 156709 156710 156711 156712 156713 156714 156715 156716 156717 156718 156720 156721 156723 156724 156725 156726 156771156707 156708 156709 156710 156711 156712 156713 156714 156715 156716 156717 156718 156720 156721 156723 156724 156725 156726 156771156707 156708 156709 156710 156711 156712 156713 156714 156715 156716 156717 156718 156720 156721 156723 156724 156725 156726 156771
locationWebsiteWebsiteWebsite
cvss2_vuldb_eNDNDND
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_rcNDNDND
cvss3_vuldb_eXXX
cvss3_vuldb_rlOOO
cvss3_vuldb_rcXXX
cvss3_nvd_basescore7.87.87.8
cwe0665665
cvss2_nvd_avLL
cvss2_nvd_acLL
cvss2_nvd_auNN
cvss2_nvd_ciPP
cvss2_nvd_iiPP
cvss2_nvd_aiPP
cvss3_nvd_avLL
cvss3_nvd_acLL
cvss3_nvd_prLL
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cHH
cvss3_nvd_iHH
cvss3_nvd_aHH
cve_assigned15722208001572220800
cve_nvd_summaryImproper initialization in subsystem for Intel(R) SPS versions before SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0 may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.Improper initialization in subsystem for Intel(R) SPS versions before SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0 may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.
confirm_urlhttps://kc.mcafee.com/corporate/index?page=content&id=SB10321

Do you want to use VulDB in your project?

Use the official API to access entries easily!