First published: Mon Jun 15 2020(Updated: )
Improper initialization in subsystem for Intel(R) SPS versions before SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0 may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Server Platform Services | >=sps_e3_04.00.00.000.0<sps_e3_04.01.04.109.0 | |
Intel Server Platform Services | >=sps_e3_04.08.00.000.0<sps_e3_04.08.04.070.0 | |
Intel Server Platform Services | >=sps_e5_04.00.00.000.0<sps_e5_04.01.04.380.0 | |
Intel Server Platform Services | >=sps_soc-a_04.00.00.000.0<sps_soc-a_04.00.04.211.0 | |
Intel Server Platform Services | >=sps_soc-x_04.00.00.000.0<sps_soc-x_04.00.04.128.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0586 is a vulnerability in Intel(R) SPS that may allow an authenticated user to enable escalation of privilege and/or denial of service via local access.
CVE-2020-0586 has a severity rating of 7.8 (high).
Intel Server Platform Services versions before SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0, SPS_E5_04.01.04.380.0, SPS_SOC-A_04.00.04.211.0, and SPS_SOC-X_04.00.04.128.0 are affected by CVE-2020-0586.
An authenticated user can potentially enable escalation of privilege and/or denial of service by exploiting the vulnerability via local access.
You can find more information about CVE-2020-0586 at the following references: [Reference 1](https://kc.mcafee.com/corporate/index?page=content&id=SB10321), [Reference 2](https://security.netapp.com/advisory/ntap-20200611-0004/), [Reference 3](https://support.lenovo.com/de/en/product_security/len-30041)