First published: Fri May 17 2019(Updated: )
Improper data sanitization vulnerability in subsystem in Intel(R) SPS before versions SPS_E5_04.00.04.381.0, SPS_E3_04.01.04.054.0, SPS_SoC-A_04.00.04.181.0, and SPS_SoC-X_04.00.04.086.0 may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Server Platform Services | <sps_e5_04.00.04.381.0 | |
Intel Server Platform Services | <sps_e3_04.01.04.054.0 | |
Intel Server Platform Services | <sps_soc-a_04.00.04.181.0 | |
Intel Server Platform Services | <sps_soc-x_04.00.04.086.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-0089.
The severity of CVE-2019-0089 is medium.
CVE-2019-0089 may allow a privileged user to potentially enable escalation of privilege via local access in Intel SPS before certain versions.
Versions SPS_E5_04.00.04.381.0, SPS_E3_04.01.04.054.0, SPS_SoC-A_04.00.04.181.0, and SPS_SoC-X_04.00.04.086.0 of Intel Server Platform Services are affected by CVE-2019-0089.
To fix CVE-2019-0089, update Intel SPS to versions SPS_E5_04.00.04.381.0, SPS_E3_04.01.04.054.0, SPS_SoC-A_04.00.04.181.0, or SPS_SoC-X_04.00.04.086.0.