CVE编号
CVE-2019-11090利用情况
暂无补丁情况
N/A披露时间
2019-12-19漏洞描述
版本11.8.70、11.11.70、11.22.70、12.0.45、13.0.0和14.0.10之前的Intel(R)PTT子系统中的加密计时条件;英特尔®TXE 3.1.70和4.0.20;版本SPS_E5_04.01.04.305.0,SPS_SoC-X_04.00.04.108.0,SPS_SoC-A_04.00.04.191.0,SPS_E3_04.01.04.086.0,SPS_E3_04.08.04.047.0之前的英特尔(R)SPS可能允许未经身份验证的用户潜在地启用信息公开通过网络访问。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html
参考链接 |
|
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | intel | platform_trust_technology_firmware | * |
From (including) 11.0 |
Up to (including) 11.8.70 |
||||
运行在以下环境 | |||||||||
系统 | intel | platform_trust_technology_firmware | * |
From (including) 11.10 |
Up to (excluding) 11.11.70 |
||||
运行在以下环境 | |||||||||
系统 | intel | platform_trust_technology_firmware | * |
From (including) 11.20 |
Up to (excluding) 11.22.70 |
||||
运行在以下环境 | |||||||||
系统 | intel | platform_trust_technology_firmware | * |
From (including) 12.0 |
Up to (excluding) 12.0.45 |
||||
运行在以下环境 | |||||||||
系统 | intel | platform_trust_technology_firmware | * |
From (including) 13.0 |
Up to (excluding) 13.0.0 |
||||
运行在以下环境 | |||||||||
系统 | intel | platform_trust_technology_firmware | * |
From (including) 14.0.0 |
Up to (excluding) 14.0.10 |
||||
运行在以下环境 | |||||||||
系统 | intel | server_platform_services_firmware | * | - | |||||
运行在以下环境 | |||||||||
系统 | intel | server_platform_services_firmware | * |
From (including) sps_e3_04.01.00.000.0 |
Up to (excluding) sps_e3_04.01.04.086.0 |
||||
运行在以下环境 | |||||||||
系统 | intel | server_platform_services_firmware | * |
From (including) sps_e5_04.00.00.000.0 |
Up to (excluding) sps_e5_04.01.04.305.0 |
||||
运行在以下环境 | |||||||||
系统 | intel | server_platform_services_firmware | * |
From (including) sps_soc-a_04.00.00.000.0 |
Up to (excluding) sps_soc-a_04.00.04.191.0 |
||||
运行在以下环境 | |||||||||
系统 | intel | server_platform_services_firmware | * |
From (including) sps_soc-x_04.00.00.000.0 |
Up to (excluding) sps_soc-x_04.00.04.108.0 |
||||
运行在以下环境 | |||||||||
系统 | intel | trusted_execution_engine_firmware | * |
From (including) 3.0 |
Up to (excluding) 3.1.70 |
||||
运行在以下环境 | |||||||||
系统 | intel | trusted_execution_engine_firmware | * |
From (including) 4.0 |
Up to (excluding) 4.0.20 |
||||
- 攻击路径 网络
- 攻击复杂度 高
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 无
还没有评论,来说两句吧...