CVE-2020-8744
📋 TL;DR
This vulnerability allows a privileged user with local access to potentially escalate privileges on affected Intel systems due to improper initialization in the Converged Security and Manageability Engine (CSME), Trusted Execution Engine (TXE), and Server Platform Services (SPS). It affects systems with specific vulnerable firmware versions before the patched releases. Attackers could gain higher privileges than intended on the local system.
💻 Affected Systems
- Intel CSME
- Intel TXE
- Intel SPS
📦 What is this software?
Converged Security And Management Engine by Intel
View all CVEs affecting Converged Security And Management Engine →
Converged Security And Management Engine by Intel
View all CVEs affecting Converged Security And Management Engine →
Converged Security And Management Engine by Intel
View all CVEs affecting Converged Security And Management Engine →
Converged Security And Management Engine by Intel
View all CVEs affecting Converged Security And Management Engine →
Converged Security And Management Engine by Intel
View all CVEs affecting Converged Security And Management Engine →
Simatic S7 1518 4 Pn\/dp Mfp Firmware by Siemens
View all CVEs affecting Simatic S7 1518 4 Pn\/dp Mfp Firmware →
⚠️ Risk & Real-World Impact
Worst Case
A privileged attacker could achieve full system compromise, bypass security controls, install persistent malware, or access protected data and credentials.
Likely Case
Local privilege escalation allowing attackers to gain administrative/system-level access on compromised machines.
If Mitigated
Limited impact with proper access controls, but still allows privilege escalation within the compromised system.
🎯 Exploit Status
Requires local access and privileged user credentials. Exploitation details not publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: CSME 12.0.70, 13.0.40, 13.30.10, 14.0.45, 14.5.25; TXE 4.0.30; SPS E3_05.01.04.200
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391
Restart Required: Yes
Instructions:
1. Check current firmware version using manufacturer tools. 2. Download firmware update from Intel or OEM vendor. 3. Apply firmware update following manufacturer instructions. 4. Reboot system to complete installation.
🧯 If You Can't Patch
- Restrict physical access to affected systems
- Implement strict access controls and privilege separation to limit initial compromise
🔍 How to Verify
Check if Vulnerable:
Check firmware version using Intel System Support Utility, OEM vendor tools, or BIOS/UEFI settings.
Check Version:
Windows: wmic bios get smbiosbiosversion; Linux: dmidecode -t bios
Verify Fix Applied:
Verify firmware version matches or exceeds patched versions after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual firmware access attempts
- Privilege escalation events
- Unexpected system reboots for firmware updates
Network Indicators:
- No network-based indicators as this is a local exploit
SIEM Query:
EventID=6008 (Unexpected shutdown) OR suspicious local privilege escalation patterns
🔗 References
- https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf
- https://security.netapp.com/advisory/ntap-20201113-0002/
- https://security.netapp.com/advisory/ntap-20201113-0004/
- https://security.netapp.com/advisory/ntap-20201113-0005/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391
- https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf
- https://security.netapp.com/advisory/ntap-20201113-0002/
- https://security.netapp.com/advisory/ntap-20201113-0004/
- https://security.netapp.com/advisory/ntap-20201113-0005/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391