{"api_version":"1","generated_at":"2026-04-23T06:19:20+00:00","cve":"CVE-2020-8705","urls":{"html":"https://cve.report/CVE-2020-8705","api":"https://cve.report/api/cve/CVE-2020-8705.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-8705","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-8705"},"summary":{"title":"CVE-2020-8705","description":"Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access.","state":"PUBLIC","assigner":"secure@intel.com","published_at":"2020-11-12 18:15:00","updated_at":"2020-11-30 14:40:00"},"problem_types":["CWE-1188"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20201113-0005/","name":"https://security.netapp.com/advisory/ntap-20201113-0005/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Intel SA-00391 Intel TXE Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20201113-0002/","name":"https://security.netapp.com/advisory/ntap-20201113-0002/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Intel SA-00391 CSME Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391","refsource":"MISC","tags":["Vendor Advisory"],"title":"INTEL-SA-00391","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20201113-0004/","name":"https://security.netapp.com/advisory/ntap-20201113-0004/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Intel SA-00391 SPS Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-8705","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8705","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"converged_security_and_manageability_engine","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"converged_security_and_manageability_engine","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"server_platform_services","cpe6":"sps_e3_04.01.04.200","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"server_platform_services","cpe6":"sps_e5_04.01.04.400","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"server_platform_services","cpe6":"sps_soc-a_04.00.04.300","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"server_platform_services","cpe6":"sps_soc-x_04.00.04.200","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"server_platform_services","cpe6":"sps_e3_04.01.04.200","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"server_platform_services","cpe6":"sps_e5_04.01.04.400","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"server_platform_services","cpe6":"sps_soc-a_04.00.04.300","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"server_platform_services","cpe6":"sps_soc-x_04.00.04.200","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"trusted_execution_technology","cpe6":"3.1.80","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"trusted_execution_technology","cpe6":"4.0.30","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"trusted_execution_technology","cpe6":"3.1.80","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8705","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"trusted_execution_technology","cpe6":"4.0.30","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-8705","ASSIGNER":"secure@intel.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Intel(R) Boot Guard, Intel(R) CSME, Intel(R) TXE, Intel(R) SPS","version":{"version_data":[{"version_value":"Intel CSME(R) versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"escalation of privileges"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20201113-0004/","url":"https://security.netapp.com/advisory/ntap-20201113-0004/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20201113-0005/","url":"https://security.netapp.com/advisory/ntap-20201113-0005/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20201113-0002/","url":"https://security.netapp.com/advisory/ntap-20201113-0002/"}]},"description":{"description_data":[{"lang":"eng","value":"Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access."}]}},"nvd":{"publishedDate":"2020-11-12 18:15:00","lastModifiedDate":"2020-11-30 14:40:00","problem_types":["CWE-1188"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.6},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionEndExcluding":"11.8.80","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"11.12.0","versionEndExcluding":"11.12.80","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"11.22.0","versionEndExcluding":"11.22.80","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.0.70","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.0.45","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"13.30.0","versionEndExcluding":"13.30.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.0.40","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:trusted_execution_technology:3.1.80:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:trusted_execution_technology:4.0.30:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:server_platform_services:sps_soc-a_04.00.04.300:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:server_platform_services:sps_soc-x_04.00.04.200:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:server_platform_services:sps_e3_04.01.04.200:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:server_platform_services:sps_e5_04.01.04.400:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"8705","Ordinal":"169046","Title":"CVE-2020-8705","CVE":"CVE-2020-8705","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"8705","Ordinal":"1","NoteData":"Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"8705","Ordinal":"2","NoteData":"2020-11-12","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"8705","Ordinal":"3","NoteData":"2020-11-13","Type":"Other","Title":"Modified"}]}}}