All the vulnerabilites related to siemens - simatic_drive_controller_firmware
cve-2020-24513
Vulnerability from cvelistv5
Published
2021-06-09 18:54
Modified
2024-08-04 15:12
Severity ?
Summary
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:08.752Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
          },
          {
            "name": "DSA-4934",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4934"
          },
          {
            "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel Atom(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-10T11:06:29",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
        },
        {
          "name": "DSA-4934",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4934"
        },
        {
          "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24513",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel Atom(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
            },
            {
              "name": "DSA-4934",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4934"
            },
            {
              "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24513",
    "datePublished": "2021-06-09T18:54:08",
    "dateReserved": "2020-08-19T00:00:00",
    "dateUpdated": "2024-08-04T15:12:08.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8745
Vulnerability from cvelistv5
Published
2020-11-12 18:06
Modified
2024-08-04 10:12
Severity ?
Summary
Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.559Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20201113-0005/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20201113-0002/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME, Intel(R) TXE",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-11T12:06:31",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20201113-0005/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20201113-0002/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8745",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME, Intel(R) TXE",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20201113-0005/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20201113-0005/"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20201113-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20201113-0002/"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8745",
    "datePublished": "2020-11-12T18:06:09",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.559Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Summary
Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Impacted products
Vendor Product Version
intel converged_security_and_manageability_engine *
intel converged_security_and_manageability_engine *
intel converged_security_and_manageability_engine *
intel converged_security_and_manageability_engine *
intel converged_security_and_manageability_engine *
intel converged_security_and_manageability_engine *
intel trusted_execution_technology *
intel trusted_execution_technology *
siemens simatic_drive_controller_firmware *
siemens simatic_drive_controller -
siemens simatic_et200sp_1515sp_pc2_firmware *
siemens simatic_et200sp_1515sp_pc2 -
siemens simatic_field_pg_m5_firmware *
siemens simatic_field_pg_m5 -
siemens simatic_field_pg_m6_firmware -
siemens simatic_field_pg_m6 -
siemens simatic_ipc127e_firmware *
siemens simatic_ipc127e -
siemens simatic_ipc427e_firmware *
siemens simatic_ipc427e -
siemens simatic_ipc477e_firmware *
siemens simatic_ipc477e -
siemens simatic_ipc477e_pro -
siemens simatic_ipc527g_firmware *
siemens simatic_ipc527g -
siemens simatic_ipc547g_firmware *
siemens simatic_ipc547g -
siemens simatic_ipc627e_firmware *
siemens simatic_ipc627e -
siemens simatic_ipc647e_firmware *
siemens simatic_ipc647e -
siemens simatic_ipc667e_firmware *
siemens simatic_ipc667e -
siemens simatic_ipc847e_firmware *
siemens simatic_ipc847e -
siemens simatic_itp1000_firmware *
siemens simatic_itp1000 -
siemens sinumerik_828d_hw_pu.4_firmware *
siemens sinumerik_828d_hw_pu.4 -
siemens sinumerik_mc_mcu_1720_firmware *
siemens sinumerik_mc_mcu_1720 -
siemens sinumerik_one_firmware -
siemens sinumerik_one -
siemens sinumerik_840d_sl_ht_10_firmware -
siemens sinumerik_840d_sl_ht_10 -
siemens sinumerik_one_ncu_1740_firmware *
siemens sinumerik_one_ncu_1740 -
siemens sinumerik_one_ppu_1740_firmware *
siemens sinumerik_one_ppu_1740 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA64E7EE-8977-4427-9FF9-DD9FE80F02C6",
              "versionEndExcluding": "11.8.80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DDDD0D3-CE11-49C7-93F7-F2AA1053DD86",
              "versionEndExcluding": "11.12.80",
              "versionStartIncluding": "11.12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5C4B3E-3C68-4D2B-A181-18A71378362E",
              "versionEndExcluding": "11.22.80",
              "versionStartIncluding": "11.22.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB22E6F2-D34F-4A05-9CC2-BCAF3E84F54E",
              "versionEndExcluding": "12.0.70",
              "versionStartIncluding": "12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D40FF5-8E0A-4591-9CE4-2E671C8E4F2E",
              "versionEndExcluding": "14.0.45",
              "versionStartIncluding": "14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B323721-380E-4222-AB7A-9993BF8DA653",
              "versionEndExcluding": "14.5.25",
              "versionStartIncluding": "14.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1D6613-FA0F-4859-B45C-A0F86BCF1CF8",
              "versionEndExcluding": "3.1.80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA87F2-F5DE-44A1-B81A-CE1DB5EAFEFA",
              "versionEndExcluding": "4.0.30",
              "versionStartIncluding": "4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_drive_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA19F1AE-18D4-43F6-BBAB-225B241042BC",
              "versionEndExcluding": "05.00.01.00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_drive_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0137C77B-D587-47D6-AEBE-462D00546FD7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_et200sp_1515sp_pc2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FC1D3E4-0B86-4464-96BE-D938B379FDAE",
              "versionEndExcluding": "0209.0105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_et200sp_1515sp_pc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CA8F936-9C3B-46C0-9623-0AF16A4B0294",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5320759-AAAB-4FEA-99AB-51A7F7EE9F58",
              "versionEndExcluding": "22.01.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC5341D-9982-4F18-9C8D-2912DDB8EF9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "161DFB8B-6B7B-4F6D-9452-EF43A70BBE50",
              "versionEndExcluding": "27.01.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA71050F-CCED-4885-A483-79CC43F6AEC9",
              "versionEndExcluding": "27.01.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3CD5B0A-D4B1-41D2-8709-D49D927982FA",
              "versionEndExcluding": "27.01.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65A6E7CD-4AEA-465D-89B3-6EF66E4F17B6",
              "versionEndExcluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55156889-E9DA-4F04-B894-339DC39CA942",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA68927-4910-4DF3-A16B-7187099CC063",
              "versionEndExcluding": "r1.30.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6779ADD8-298D-4FF4-8AD3-82E995B2E144",
              "versionEndExcluding": "25.02.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3BECCA-5783-4B3C-B659-21160B4D2726",
              "versionEndExcluding": "25.02.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc667e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6822E36B-D635-498B-9A64-BE427DC798EA",
              "versionEndExcluding": "25.02.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc667e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BC195-47BB-48A7-8D73-F800B4C11599",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C5CB316-59B9-4DDB-A8B8-14D8BCD991CE",
              "versionEndExcluding": "25.02.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ABF49D4-34CE-4DEA-AA2E-A40A53472D1F",
              "versionEndExcluding": "23.01.08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:sinumerik_828d_hw_pu.4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC13F580-5446-437D-9982-280C80EAE2D3",
              "versionEndExcluding": "08.00.00.00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:sinumerik_828d_hw_pu.4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C594847-596D-4FA2-B56C-745D0A84EBC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:sinumerik_mc_mcu_1720_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3A945B-078B-45C6-9BA3-3C52650095F1",
              "versionEndExcluding": "05.00.00.00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:sinumerik_mc_mcu_1720:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF61B283-76B7-42BB-B88A-EE12EA5AA905",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:sinumerik_one_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FADF6B2-FFE7-4C4E-BF93-61CAA9368285",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:sinumerik_one:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE30FFDF-5494-400D-8F88-954A6B1503B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:sinumerik_840d_sl_ht_10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD5F035E-5F72-4E15-BF13-294C3A833BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:sinumerik_840d_sl_ht_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14CED950-F0AB-48D1-9ED8-3357E02AEADE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:sinumerik_one_ncu_1740_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE992410-C477-4901-8B18-8AB866BF11A6",
              "versionEndExcluding": "04.00.00.00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:sinumerik_one_ncu_1740:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0BCDA32-9100-4D88-A304-CE989A16A06D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:sinumerik_one_ppu_1740_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A4EDCE-6363-43EB-9CE8-11C0BA40E696",
              "versionEndExcluding": "06.00.00.00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:sinumerik_one_ppu_1740:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75815DC0-5782-4BD6-A9DD-F0BE33D2F5FD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access."
    },
    {
      "lang": "es",
      "value": "Una administraci\u00f3n de flujo de control insuficiente en el subsistema para Intel\u00ae CSME versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 y 14.5.25, Intel\u00ae TXE versiones anteriores a 3.1.80 y 4.0.30, pueden habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso f\u00edsico"
    }
  ],
  "id": "CVE-2020-8745",
  "lastModified": "2024-11-21T05:39:22.207",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-11-12T18:15:17.300",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20201113-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20201113-0005/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20201113-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20201113-0005/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-09 19:15
Modified
2024-11-21 05:14
Summary
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
intel atom_c3308 -
intel atom_c3336 -
intel atom_c3338 -
intel atom_c3338r -
intel atom_c3436l -
intel atom_c3508 -
intel atom_c3538 -
intel atom_c3558 -
intel atom_c3558r -
intel atom_c3558rc -
intel atom_c3708 -
intel atom_c3750 -
intel atom_c3758 -
intel atom_c3758r -
intel atom_c3808 -
intel atom_c3830 -
intel atom_c3850 -
intel atom_c3858 -
intel atom_c3950 -
intel atom_c3955 -
intel atom_c3958 -
intel atom_p5942b -
intel atom_x5-a3930 -
intel atom_x5-a3940 -
intel atom_x5-a3950 -
intel atom_x5-a3960 -
intel atom_x6200fe -
intel atom_x6211e -
intel atom_x6212re -
intel atom_x6413e -
intel atom_x6425e -
intel atom_x6425re -
intel atom_x6427fe -
intel celeron_j3355 -
intel celeron_j3355e -
intel celeron_j3455 -
intel celeron_j3455e -
intel celeron_j4005 -
intel celeron_j4025 -
intel celeron_j4105 -
intel celeron_j4125 -
intel celeron_j6413 -
intel celeron_n3350 -
intel celeron_n3350e -
intel celeron_n3450 -
intel celeron_n4000 -
intel celeron_n4020 -
intel celeron_n4100 -
intel celeron_n4120 -
intel celeron_n6211 -
intel core_i3-l13g4 -
intel core_i5-l16g7 -
intel p5921b -
intel p5931b -
intel p5962b -
intel pentium_j4205 -
intel pentium_j6425 -
intel pentium_n4200 -
intel pentium_n4200e -
intel pentium_n6415 -
intel pentium_silver_j5005 -
intel pentium_silver_j5040 -
intel pentium_silver_n5000 -
intel pentium_silver_n5030 -
debian debian_linux 9.0
debian debian_linux 10.0
siemens simatic_drive_controller_firmware *
siemens simatic_drive_controller -
siemens simatic_et_200sp_open_controller_firmware *
siemens simatic_et_200sp_open_controller -
siemens simatic_ipc127e_firmware *
siemens simatic_ipc127e -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E18B9E2-0659-4A50-88F6-D3D429EC5F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "158C116D-5E24-4593-A283-F6810E424B5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEE5F25C-8092-4A74-B265-4BB720DA1A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C58BF4A8-2B69-49B7-9113-554D61CE9FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C5EF68-F91F-4395-BDC6-CD3B7348C45C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A33FC1CB-7983-48B9-AF3C-E3CF958B5FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF500096-2B4A-476B-BBCA-1FEE100ABC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F17C3AB-AC03-427F-B0A9-9EACD2A231C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2951F904-97AA-4AE6-B227-0A0D282369ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3558rc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70C31407-B78D-4406-B3B8-49BD89E674ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4058BBB2-268F-47E6-BE5A-992C5F460BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F191949-2674-4968-90CC-030D6E8901D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6893581C-5447-4FAD-BFCB-41727FAB4CF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E89FF1-C329-4975-9706-75FD84FDD5C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42737F96-25B8-4E3E-AED2-47FA27075A23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D397ED37-60EE-49F0-95F0-2C6F666E9368",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65F731F9-59EB-4161-AB8B-506BC336B987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F35B073-EA5F-4746-AB8B-674C9EAFDC3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA6C3DB-8E6D-4CF8-BD52-B362C83DF4A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6107B3F-C7FE-46EF-A80E-1A4DD55F9306",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E7FA68-B62B-4EEF-B8EA-665026E1E3F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D860FEC-BA79-4FEE-A79C-88AA857358E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E374730D-0311-47F5-9EE3-ECD205693167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-a3940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45765887-0882-4D33-9D32-675581C35BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-a3950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B2D4F4B-6DB7-414D-A41F-DA17D7C1AA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-a3960:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EB4891F-358E-4A6E-A3D4-C83F8E45B19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:p5921b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E51393D-0855-41EA-9A57-090B47F84838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:p5931b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E5668AC-EF49-43CF-8CE4-CCE3AA999F6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:p5962b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69383613-C04B-4C0F-8589-6F3EF6D45797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D97C7A90-D8C6-4901-BCA1-E40DA173AA9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF16D51-5662-47C3-8911-0FACEEDB9D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC4430E-E4B1-454F-8C95-6412D34454C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_drive_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "143C062B-4DFB-4570-BE8F-7873B67A4BA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_drive_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0137C77B-D587-47D6-AEBE-462D00546FD7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_et_200sp_open_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE9938FA-DE0B-4A60-A931-CE48CEB7F635",
              "versionEndExcluding": "0209_0105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_et_200sp_open_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5B5313D-48E9-47F5-BF59-C71A255D9831",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "466CDD7A-1B83-46C4-AC57-78E02811FFE0",
              "versionEndExcluding": "21.01.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la ejecuci\u00f3n transitoria de omisi\u00f3n de dominios en algunos procesadores Intel Atom\u00ae puede permitir a un usuario autenticado permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-24513",
  "lastModified": "2024-11-21T05:14:56.957",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-09T19:15:08.963",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4934"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4934"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}