{"api_version":"1","generated_at":"2026-04-23T10:40:32+00:00","cve":"CVE-2018-12208","urls":{"html":"https://cve.report/CVE-2018-12208","api":"https://cve.report/api/cve/CVE-2018-12208.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-12208","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-12208"},"summary":{"title":"CVE-2018-12208","description":"Buffer overflow in HECI subsystem in Intel(R) CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel(R) TXE version before 3.1.60 or 4.0.10, or Intel(R) Server Platform Services before version 5.00.04.012 may allow an unauthenticated user to potentially execute arbitrary code via physical access.","state":"PUBLIC","assigner":"secure@intel.com","published_at":"2019-03-14 20:29:00","updated_at":"2019-04-04 22:29:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html","name":"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"INTEL-SA-00185","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03914en_us","name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03914en_us","refsource":"CONFIRM","tags":[],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20190318-0001/","name":"https://security.netapp.com/advisory/ntap-20190318-0001/","refsource":"CONFIRM","tags":[],"title":"Intel SA-00185 CSME-SPS-TXE-AMT Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-12208","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12208","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"12208","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"converged_security_management_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12208","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"converged_security_management_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12208","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"server_platform_services_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12208","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"server_platform_services_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12208","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"trusted_execution_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"12208","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"trusted_execution_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","DATE_PUBLIC":"2019-03-12T00:00:00","ID":"CVE-2018-12208","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology","version":{"version_data":[{"version_value":"Multiple versions."}]}}]},"vendor_name":"Intel Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in HECI subsystem in Intel(R) CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel(R) TXE version before 3.1.60 or 4.0.10, or Intel(R) Server Platform Services before version 5.00.04.012 may allow an unauthenticated user to potentially execute arbitrary code via physical access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Escalation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html","refsource":"CONFIRM","url":"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20190318-0001/","url":"https://security.netapp.com/advisory/ntap-20190318-0001/"},{"refsource":"CONFIRM","name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03914en_us","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03914en_us"}]}},"nvd":{"publishedDate":"2019-03-14 20:29:00","lastModifiedDate":"2019-04-04 22:29:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.6,"baseSeverity":"HIGH"},"exploitabilityScore":0.9,"impactScore":6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.6},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"5.00.04.012","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.8.60","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.10","versionEndExcluding":"11.11.60","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.20","versionEndExcluding":"11.22.60","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.0.20","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.1.60","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","versionEndExcluding":"4.0.10","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"12208","Ordinal":"128721","Title":"CVE-2018-12208","CVE":"CVE-2018-12208","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"12208","Ordinal":"1","NoteData":"Buffer overflow in HECI subsystem in Intel(R) CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel(R) TXE version before 3.1.60 or 4.0.10, or Intel(R) Server Platform Services before version 5.00.04.012 may allow an unauthenticated user to potentially execute arbitrary code via physical access.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"12208","Ordinal":"2","NoteData":"2019-03-14","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"12208","Ordinal":"3","NoteData":"2019-04-04","Type":"Other","Title":"Modified"}]}}}