CVE-2020-12355

Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Configurations

Configuration 1 (hide)

cpe:2.3:o:intel:trusted_execution_engine:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:59

Type Values Removed Values Added
References () https://security.netapp.com/advisory/ntap-20201113-0005/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20201113-0005/ - Third Party Advisory
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 - Vendor Advisory () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 - Vendor Advisory

Information

Published : 2020-11-12 18:15

Updated : 2024-11-21 04:59


NVD link : CVE-2020-12355

Mitre link : CVE-2020-12355

CVE.ORG link : CVE-2020-12355


JSON object : View

Products Affected

intel

  • trusted_execution_engine
CWE
CWE-294

Authentication Bypass by Capture-replay