{"api_version":"1","generated_at":"2026-04-23T02:58:16+00:00","cve":"CVE-2020-12297","urls":{"html":"https://cve.report/CVE-2020-12297","api":"https://cve.report/api/cve/CVE-2020-12297.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-12297","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-12297"},"summary":{"title":"CVE-2020-12297","description":"Improper access control in Installer for Intel(R) CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.","state":"PUBLIC","assigner":"secure@intel.com","published_at":"2020-11-12 18:15:00","updated_at":"2021-07-21 11:39:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20201113-0005/","name":"https://security.netapp.com/advisory/ntap-20201113-0005/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Intel SA-00391 Intel TXE Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20201113-0002/","name":"https://security.netapp.com/advisory/ntap-20201113-0002/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Intel SA-00391 CSME Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391","refsource":"MISC","tags":["Vendor Advisory"],"title":"INTEL-SA-00391","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-12297","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12297","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"12297","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"converged_security_and_manageability_engine","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"12297","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"converged_security_and_manageability_engine","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"12297","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"trusted_execution_technology","cpe6":"3.1.80","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"12297","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"trusted_execution_technology","cpe6":"4.0.30","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"12297","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"trusted_execution_technology","cpe6":"3.1.80","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"12297","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"trusted_execution_technology","cpe6":"4.0.30","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-12297","ASSIGNER":"secure@intel.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Intel(R) CSME, Intel TXE","version":{"version_data":[{"version_value":"versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"escalation of privileges"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20201113-0005/","url":"https://security.netapp.com/advisory/ntap-20201113-0005/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20201113-0002/","url":"https://security.netapp.com/advisory/ntap-20201113-0002/"}]},"description":{"description_data":[{"lang":"eng","value":"Improper access control in Installer for Intel(R) CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access."}]}},"nvd":{"publishedDate":"2020-11-12 18:15:00","lastModifiedDate":"2021-07-21 11:39:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.6},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionEndExcluding":"11.8.80","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"11.12.0","versionEndExcluding":"11.12.80","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"11.22.0","versionEndExcluding":"11.22.80","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.0.70","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.0.45","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"14.5.0","versionEndExcluding":"14.5.25","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:trusted_execution_technology:3.1.80:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:trusted_execution_technology:4.0.30:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"12297","Ordinal":"173457","Title":"CVE-2020-12297","CVE":"CVE-2020-12297","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"12297","Ordinal":"1","NoteData":"Improper access control in Installer for Intel(R) CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"12297","Ordinal":"2","NoteData":"2020-11-12","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"12297","Ordinal":"3","NoteData":"2020-11-13","Type":"Other","Title":"Modified"}]}}}