First published: Thu Nov 12 2020(Updated: )
Use after free in Kernel Mode Driver for Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Trusted Execution Engine | <3.1.80 | |
Intel Trusted Execution Engine | >=4.0<4.0.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8750 has a severity rating that allows an authenticated user to escalate privileges under certain conditions.
To fix CVE-2020-8750, update the Intel Trusted Execution Engine to version 3.1.80 or later, or to version 4.0.30 or later.
CVE-2020-8750 affects Intel Trusted Execution Engine versions prior to 3.1.80 and versions between 4.0.0 and 4.0.30.
Authenticated users with local access may be at risk of privilege escalation due to CVE-2020-8750.
CVE-2020-8750 exploits a use after free vulnerability in the Kernel Mode Driver for Intel Trusted Execution Engine.