{"containers":{"cna":{"affected":[{"product":"Intel(R) AMT and Intel(R) ISM","vendor":"n/a","versions":[{"status":"affected","version":"Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39"}]}],"descriptions":[{"lang":"en","value":"Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access."}],"problemTypes":[{"descriptions":[{"description":"Escalation of Privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-09-11T12:06:34.000Z","orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20200911-0005/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2020-8758","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Intel(R) AMT and Intel(R) ISM","version":{"version_data":[{"version_value":"Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Escalation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html","refsource":"MISC","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html"},{"name":"https://security.netapp.com/advisory/ntap-20200911-0005/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20200911-0005/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T10:12:10.441Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20200911-0005/"}]}]},"cveMetadata":{"assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","assignerShortName":"intel","cveId":"CVE-2020-8758","datePublished":"2020-09-10T14:22:14.000Z","dateReserved":"2020-02-06T00:00:00.000Z","dateUpdated":"2024-08-04T10:12:10.441Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}