Enhancement: cves/2017/CVE-2017-5689.yaml by md

patch-1
MostInterestingBotInTheWorld 2023-04-03 15:11:10 -04:00
parent 423060fda6
commit 314753f516
1 changed files with 5 additions and 2 deletions

View File

@ -1,16 +1,17 @@
id: CVE-2017-5689
info:
name: Intel Active Management Technology - Authentication Bypass
name: Intel Active Management - Authentication Bypass
author: pdteam
severity: critical
description: |
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
Intel Active Management platforms are susceptible to authentication bypass. A non-privileged network attacker can gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability. A non-privileged local attacker can provision manageability features, gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology. The issue has been observed in versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 for all three platforms. Versions before 6 and after 11.6 are not impacted.
reference:
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
- https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability
- https://www.embedi.com/news/mythbusters-cve-2017-5689
- https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf
- https://nvd.nist.gov/vuln/detail/cve-2017-5689
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
@ -44,3 +45,5 @@ requests:
- type: status
status:
- 200
# Enhanced by md on 2023/04/03