ID CVE-2020-0533
Summary Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.
References
Vulnerable Configurations
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.50:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.50:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.55:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.55:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.60:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.60:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.65:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.65:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.70:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.8.70:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.10:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.10:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.50:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.50:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.55:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.55:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.60:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.60:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.65:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.65:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.70:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.70:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.77:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.77:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.79:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.11.79:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.20:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.20:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.21.51:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.21.51:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.22.0:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.22.0:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.22.60:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.22.60:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.22.65:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.22.65:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:converged_security_management_engine_firmware:11.22.70:*:*:*:*:*:*:*
    cpe:2.3:o:intel:converged_security_management_engine_firmware:11.22.70:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 21-07-2021 - 11:39)
Impact:
Exploitability:
CWE CWE-916
CAPEC
  • Rainbow Table Password Cracking
    An attacker gets access to the database table where hashes of passwords are stored. He then uses a rainbow table of pre-computed hash chains to attempt to look up the original password. Once the original password corresponding to the hash is obtained, the attacker uses the original password to gain access to the system. A password rainbow table stores hash chains for various passwords. A password chain is computed, starting from the original password, P, via a reduce(compression) function R and a hash function H. A recurrence relation exists where Xi+1 = R(H(Xi)), X0 = P. Then the hash chain of length n for the original password P can be formed: X1, X2, X3, ... , Xn-2, Xn-1, Xn, H(Xn). P and H(Xn) are then stored together in the rainbow table. Constructing the rainbow tables takes a very long time and is computationally expensive. A separate table needs to be constructed for the various hash algorithms (e.g. SHA1, MD5, etc.). However, once a rainbow table is computed, it can be very effective in cracking the passwords that have been hashed without the use of salt.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm
misc
Last major update 21-07-2021 - 11:39
Published 15-06-2020 - 14:15
Last modified 21-07-2021 - 11:39
Back to Top