Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.144117
Category:General
Title:Intel Active Management Technology Multiple Vulnerabilities (INTEL-SA-00295)
Summary:Multiple vulnerabilities in Intel Active Management Technology; (AMT) may allow escalation of privilege, denial of service (DoS) or information disclosure.
Description:Summary:
Multiple vulnerabilities in Intel Active Management Technology
(AMT) may allow escalation of privilege, denial of service (DoS) or information disclosure.

Vulnerability Insight:
The following vulnerabilities exist:

- CVE-2020-0531: Improper input validation may allow an authenticated user to potentially enable
information disclosure via network access

- CVE-2020-0532: Improper input validation may allow an unauthenticated user to potentially
enable denial of service or information disclosure via adjacent access

- CVE-2020-0537: Improper input validation may allow a privileged user to potentially enable
denial of service via network access

- CVE-2020-0538: Improper input validation may allow an unauthenticated user to potentially
enable denial of service via network access

- CVE-2020-0540: Insufficiently protected credentials may allow an unauthenticated user to
potentially enable information disclosure via network access

- CVE-2020-0594, CVE-2020-11899: Out-of-bounds read in IPv6 subsystem may allow an
unauthenticated user to potentially enable escalation of privilege via network access

- CVE-2020-0595, CVE-2020-11900: Use after free in IPv6 subsystem may allow an unauthenticated
user to potentially enable escalation of privilege via network access

- CVE-2020-0596: Improper input validation in DHCPv6 subsystem may allow an unauthenticated user
to potentially enable information disclosure via network access

Note: CVE-2020-0594 and CVE-2020-0595 as assigned by Intel correspond to a subset of the CVEs
disclosed in the linked 'Treck IP stacks contain multiple vulnerabilities' advisory (covering the
'Ripple20' called vulnerabilities) and are matching CVE-2020-11899 and CVE-2020-11900.

Affected Software/OS:
Intel Active Management Technology versions 11.0 through
11.8.76, 11.10 through 11.11.76, 11.20 through 11.22.76 and 12.0 through 12.0.63.

Solution:
Update to version 11.8.77, 11.11.77, 11.22.77, 12.0.64 or
later.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-0531
https://support.lenovo.com/de/en/product_security/len-30041
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-0532
Common Vulnerability Exposure (CVE) ID: CVE-2020-0537
Common Vulnerability Exposure (CVE) ID: CVE-2020-0538
Common Vulnerability Exposure (CVE) ID: CVE-2020-0540
Common Vulnerability Exposure (CVE) ID: CVE-2020-0594
CERT/CC vulnerability note: VU#257161
https://www.kb.cert.org/vuls/id/257161
Common Vulnerability Exposure (CVE) ID: CVE-2020-0595
Common Vulnerability Exposure (CVE) ID: CVE-2020-0596
Common Vulnerability Exposure (CVE) ID: CVE-2020-11899
Cisco Security Advisory: 20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
https://cwe.mitre.org/data/definitions/125.html
https://jsof-tech.com/vulnerability-disclosure-policy/
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
https://www.jsof-tech.com/ripple20/
https://www.kb.cert.org/vuls/id/257161/
https://www.treck.com
Common Vulnerability Exposure (CVE) ID: CVE-2020-11900
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
CopyrightCopyright (C) 2020 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.