{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T09:06:23.804","vulnerabilities":[{"cve":{"id":"CVE-2019-11090","sourceIdentifier":"secure@intel.com","published":"2019-12-18T22:15:12.237","lastModified":"2024-11-21T04:20:31.127","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cryptographic timing conditions in the subsystem for Intel(R) PTT before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.0 and 14.0.10; Intel(R) TXE 3.1.70 and 4.0.20; Intel(R) SPS before versions SPS_E5_04.01.04.305.0, SPS_SoC-X_04.00.04.108.0, SPS_SoC-A_04.00.04.191.0, SPS_E3_04.01.04.086.0, SPS_E3_04.08.04.047.0 may allow an unauthenticated user to potentially enable information disclosure via network access."},{"lang":"es","value":"Condiciones de sincronización criptográfica en el subsistema para Intel® PTT versiones anteriores a 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.0 y 14.0.10; Intel® TXE 3.1.70 y 4.0.20; Intel® SPS versiones anteriores a SPS_E5_04.01.04.305.0, SPS_SoC-X_04.00.04.108.0, SPS_SoC-A_04.00.04.191.0, SPS_E3_04.01.04.086.0, SPS_E3_04.08.04.047.0, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-362"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intel:platform_trust_technology_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndIncluding":"11.8.70","matchCriteriaId":"6D4CEA4B-F303-4C74-9B21-633C23BC788F"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:platform_trust_technology_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.10","versionEndExcluding":"11.11.70","matchCriteriaId":"4BA65B9B-A05A-46A1-AB54-0C7956FAE3CE"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:platform_trust_technology_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.20","versionEndExcluding":"11.22.70","matchCriteriaId":"11B431B3-4508-4DEC-A85E-B236B33AF98A"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:platform_trust_technology_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.0.45","matchCriteriaId":"43C456C2-693A-4CA2-A991-3FE56D33262C"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:platform_trust_technology_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.0.0","matchCriteriaId":"45B73401-94D9-4264-A96D-F0AB91F7084A"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:platform_trust_technology_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.10","matchCriteriaId":"B9A13E75-2312-403D-A961-0BEE49AF7FFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"90C558D4-B158-4BD3-B215-C28BF647718F"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"sps_e3_04.01.00.000.0","versionEndExcluding":"sps_e3_04.01.04.086.0","matchCriteriaId":"19E8B458-4B69-40D3-9B92-76E6ECA214DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"sps_e5_04.00.00.000.0","versionEndExcluding":"sps_e5_04.01.04.305.0","matchCriteriaId":"EA8854B3-4BBC-4FEB-872B-574972F3D95B"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"sps_soc-a_04.00.00.000.0","versionEndExcluding":"sps_soc-a_04.00.04.191.0","matchCriteriaId":"5DFD2B64-3374-4419-B102-42745E051F14"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"sps_soc-x_04.00.00.000.0","versionEndExcluding":"sps_soc-x_04.00.04.108.0","matchCriteriaId":"E8932FAF-2F02-4D8F-B930-86A2F939F0CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.1.70","matchCriteriaId":"AD17A8EA-F595-4E4E-B694-FE07544E7945"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","versionEndExcluding":"4.0.20","matchCriteriaId":"3BCB9B3C-C83A-4563-80F6-3AA50C16A118"}]}]}],"references":[{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html","source":"secure@intel.com","tags":["Vendor Advisory"]},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}