{"api_version":"1","generated_at":"2026-04-23T10:40:37+00:00","cve":"CVE-2018-12191","urls":{"html":"https://cve.report/CVE-2018-12191","api":"https://cve.report/api/cve/CVE-2018-12191.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-12191","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-12191"},"summary":{"title":"CVE-2018-12191","description":"Bounds check in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before versions 4.00.04.383 or SPS 4.01.02.174, or Intel(R) TXE before versions 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially execute arbitrary code via physical access.","state":"PUBLIC","assigner":"secure@intel.com","published_at":"2019-03-14 20:29:00","updated_at":"2020-09-10 13:19:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html","name":"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"INTEL-SA-00185","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03914en_us","name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03914en_us","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20190318-0001/","name":"https://security.netapp.com/advisory/ntap-20190318-0001/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Intel SA-00185 CSME-SPS-TXE-AMT Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-12191","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12191","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"12191","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"converged_security_management_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12191","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"converged_security_management_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12191","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"server_platform_services_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12191","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"server_platform_services_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12191","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"trusted_execution_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12191","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"trusted_execution_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","DATE_PUBLIC":"2019-03-12T00:00:00","ID":"CVE-2018-12191","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology","version":{"version_data":[{"version_value":"Multiple versions."}]}}]},"vendor_name":"Intel Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Bounds check in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before versions 4.00.04.383 or SPS 4.01.02.174, or Intel(R) TXE before versions 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially execute arbitrary code via physical access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Escalation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html","refsource":"CONFIRM","url":"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20190318-0001/","url":"https://security.netapp.com/advisory/ntap-20190318-0001/"},{"refsource":"CONFIRM","name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03914en_us","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03914en_us"}]}},"nvd":{"publishedDate":"2019-03-14 20:29:00","lastModifiedDate":"2020-09-10 13:19:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.6,"baseSeverity":"HIGH"},"exploitabilityScore":0.9,"impactScore":6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.8.60","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.10","versionEndExcluding":"11.11.60","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.20","versionEndExcluding":"11.22.60","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.0.20","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.1.60","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","versionEndExcluding":"4.0.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.01.00.152.0","versionEndExcluding":"4.01.02.174","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.00.04.367","versionEndExcluding":"4.00.04.383","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"12191","Ordinal":"128704","Title":"CVE-2018-12191","CVE":"CVE-2018-12191","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"12191","Ordinal":"1","NoteData":"Bounds check in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before versions 4.00.04.383 or SPS 4.01.02.174, or Intel(R) TXE before versions 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially execute arbitrary code via physical access.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"12191","Ordinal":"2","NoteData":"2019-03-14","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"12191","Ordinal":"3","NoteData":"2019-04-04","Type":"Other","Title":"Modified"}]}}}