CISA KEV 정보
| 취약점명 | Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability |
|---|---|
| 설명 | Intel products contain a vulnerability which can allow attackers to perform privilege escalation. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| 등록일 (KEV) | 2022-01-28 |
| 조치 기한 | 2022-07-28 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2017-5689 |
NVD 상세 정보
CVSS v3.1: 9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C설명: An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
CWE: CWE-269
참조
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html [Patch, Third Party Advisory]
- http://www.securityfocus.com/bid/98269 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1038385 [Broken Link, Third Party Advisory, VDB Entry]
- https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf [Third Party Advisory]
- https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf [Broken Link]
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us [Third Party Advisory]
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr [Patch, Vendor Advisory]
- https://security.netapp.com/advisory/ntap-20170509-0001/ [Third Party Advisory]
- https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf [Broken Link, Exploit, Technical Description, Third Party Advisory]
- https://www.embedi.com/news/mythbusters-cve-2017-5689 [Broken Link, Third Party Advisory]
- https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability [Technical Description, Third Party Advisory]
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html [Patch, Third Party Advisory]
- http://www.securityfocus.com/bid/98269 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1038385 [Broken Link, Third Party Advisory, VDB Entry]
- https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf [Third Party Advisory]
- ... 외 8건
This product uses the NVD API but is not endorsed or certified by the NVD.