Intel AMT up to 11.8.76/11.12.76/11.22.76/12.0.63 Subsystem input validation

entryeditHistoryDiffjsonxmlCTI

A vulnerability classified as critical has been found in Intel AMT up to 11.8.76/11.12.76/11.22.76/12.0.63. Affected is some unknown processing of the component Subsystem. Upgrading to version 11.8.77, 11.12.77, 11.22.77 or 12.0.64 eliminates this vulnerability.

Field06/16/2020 07:03 AM06/16/2020 07:08 AM10/24/2020 02:51 PM
vendorIntelIntelIntel
nameAMTAMTAMT
version<=11.8.76/11.12.76/11.22.76/12.0.63<=11.8.76/11.12.76/11.22.76/12.0.63<=11.8.76/11.12.76/11.22.76/12.0.63
componentSubsystemSubsystemSubsystem
risk222
historic000
cvss2_vuldb_basescore5.45.45.4
cvss2_vuldb_tempscore4.74.74.7
cvss2_vuldb_avAAA
cvss2_vuldb_acMMM
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss3_meta_basescore6.76.76.7
cvss3_meta_tempscore6.46.46.4
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore6.06.06.0
cvss3_vuldb_avAAA
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
date1592179200 (06/15/2020)1592179200 (06/15/2020)1592179200 (06/15/2020)
urlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html
price_0day$5k-$25k$5k-$25k$5k-$25k
nameUpgradeUpgradeUpgrade
upgrade_version11.8.77/11.12.77/11.22.77/12.0.6411.8.77/11.12.77/11.22.77/12.0.6411.8.77/11.12.77/11.22.77/12.0.64
cveCVE-2020-0532CVE-2020-0532CVE-2020-0532
seealso156707 156709 156710 156711 156712 156713 156714 156715 156716 156717 156718 156720 156721 156722 156723 156724 156725 156726 156771156707 156709 156710 156711 156712 156713 156714 156715 156716 156717 156718 156720 156721 156722 156723 156724 156725 156726 156771156707 156709 156710 156711 156712 156713 156714 156715 156716 156717 156718 156720 156721 156722 156723 156724 156725 156726 156771
locationWebsiteWebsiteWebsite
cvss2_vuldb_eNDNDND
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_rcNDNDND
cvss3_vuldb_eXXX
cvss3_vuldb_rlOOO
cvss3_vuldb_rcXXX
cvss3_nvd_basescore7.17.17.1
cwe020 (privilege escalation)20 (privilege escalation)
cvss2_nvd_avAA
cvss2_nvd_acLL
cvss2_nvd_auNN
cvss2_nvd_ciPP
cvss2_nvd_iiNN
cvss2_nvd_aiPP
cvss3_nvd_avAA
cvss3_nvd_acLL
cvss3_nvd_prNN
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cLL
cvss3_nvd_iNN
cvss3_nvd_aHH
cve_assigned15722208001572220800
cve_nvd_summaryImproper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
confirm_urlhttps://security.netapp.com/advisory/ntap-20200611-0007/

Do you want to use VulDB in your project?

Use the official API to access entries easily!