U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2020-8705

Change History

Initial Analysis by NIST 11/30/2020 9:40:19 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:* versions up to (excluding) 11.8.80
     *cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:* versions from (including) 11.12.0 up to (excluding) 11.12.80
     *cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:* versions from (including) 11.22.0 up to (excluding) 11.22.80
     *cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:* versions from (including) 12.0 up to (excluding) 12.0.70
     *cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.0.40
     *cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:* versions from (including) 13.30.0 up to (excluding) 13.30.10
     *cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.0.45
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:intel:server_platform_services:sps_e3_04.01.04.200:*:*:*:*:*:*:*
     *cpe:2.3:a:intel:server_platform_services:sps_e5_04.01.04.400:*:*:*:*:*:*:*
     *cpe:2.3:a:intel:server_platform_services:sps_soc-a_04.00.04.300:*:*:*:*:*:*:*
     *cpe:2.3:a:intel:server_platform_services:sps_soc-x_04.00.04.200:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:intel:trusted_execution_technology:3.1.80:*:*:*:*:*:*:*
     *cpe:2.3:a:intel:trusted_execution_technology:4.0.30:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3.1

								
							
							
						
NIST AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-1188
Changed Reference Type
https://security.netapp.com/advisory/ntap-20201113-0002/ No Types Assigned
https://security.netapp.com/advisory/ntap-20201113-0002/ Third Party Advisory
Changed Reference Type
https://security.netapp.com/advisory/ntap-20201113-0004/ No Types Assigned
https://security.netapp.com/advisory/ntap-20201113-0004/ Third Party Advisory
Changed Reference Type
https://security.netapp.com/advisory/ntap-20201113-0005/ No Types Assigned
https://security.netapp.com/advisory/ntap-20201113-0005/ Third Party Advisory
Changed Reference Type
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 No Types Assigned
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 Vendor Advisory