Intel AMT up to 11.8.76/11.12.76/11.22.76/12.0.63 Subsystem input validation

entryeditHistoryDiffjsonxmlCTI

A vulnerability was found in Intel AMT up to 11.8.76/11.12.76/11.22.76/12.0.63 and classified as problematic. This issue affects an unknown code of the component Subsystem. Upgrading to version 11.8.77, 11.12.77, 11.22.77 or 12.0.64 eliminates this vulnerability.

Field06/16/2020 07:52 AM06/16/2020 07:57 AM10/24/2020 03:17 PM
vendorIntelIntelIntel
nameAMTAMTAMT
version<=11.8.76/11.12.76/11.22.76/12.0.63<=11.8.76/11.12.76/11.22.76/12.0.63<=11.8.76/11.12.76/11.22.76/12.0.63
componentSubsystemSubsystemSubsystem
risk111
cvss2_vuldb_basescore4.34.34.3
cvss2_vuldb_tempscore3.73.73.7
cvss2_vuldb_avNNN
cvss2_vuldb_acMMM
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiNNN
cvss2_vuldb_aiPPP
cvss3_meta_basescore5.15.15.1
cvss3_meta_tempscore4.94.94.9
cvss3_vuldb_basescore5.35.35.3
cvss3_vuldb_tempscore5.15.15.1
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iNNN
cvss3_vuldb_aLLL
date1592179200 (06/15/2020)1592179200 (06/15/2020)1592179200 (06/15/2020)
urlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html
price_0day$5k-$25k$5k-$25k$5k-$25k
nameUpgradeUpgradeUpgrade
upgrade_version11.8.77/11.12.77/11.22.77/12.0.6411.8.77/11.12.77/11.22.77/12.0.6411.8.77/11.12.77/11.22.77/12.0.64
cveCVE-2020-0537CVE-2020-0537CVE-2020-0537
seealso156707 156708 156709 156710 156711 156712 156714 156715 156716 156717 156718 156720 156721 156722 156723 156724 156725 156726 156771156707 156708 156709 156710 156711 156712 156714 156715 156716 156717 156718 156720 156721 156722 156723 156724 156725 156726 156771156707 156708 156709 156710 156711 156712 156714 156715 156716 156717 156718 156720 156721 156722 156723 156724 156725 156726 156771
locationWebsiteWebsiteWebsite
cvss2_vuldb_eNDNDND
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_rcNDNDND
cvss3_vuldb_eXXX
cvss3_vuldb_rlOOO
cvss3_vuldb_rcXXX
cvss3_nvd_basescore4.94.94.9
cwe020 (privilege escalation)20 (privilege escalation)
cvss2_nvd_avNN
cvss2_nvd_acLL
cvss2_nvd_auSS
cvss2_nvd_ciNN
cvss2_nvd_iiNN
cvss2_nvd_aiPP
cvss3_nvd_avNN
cvss3_nvd_acLL
cvss3_nvd_prHH
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cNN
cvss3_nvd_iNN
cvss3_nvd_aHH
cve_assigned15722208001572220800
cve_nvd_summaryImproper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.
confirm_urlhttps://security.netapp.com/advisory/ntap-20200611-0007/

Interested in the pricing of exploits?

See the underground prices here!