Intel Standard Manageability vulnerabilities

4 known vulnerabilities affecting intel/standard_manageability.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH2

Vulnerabilities

Page 1 of 1
CVE-2020-8752CRITICALCVSS 9.8fixed in 11.8.80≥ 11.12.0, < 11.12.80+3 more2020-11-12
CVE-2020-8752 [CRITICAL] CWE-787 CVE-2020-8752: Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12. Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
nvd
CVE-2020-8753HIGHCVSS 7.5fixed in 11.8.80≥ 11.12.0, < 11.12.80+3 more2020-11-12
CVE-2020-8753 [HIGH] CWE-125 CVE-2020-8753: Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.8 Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
nvd
CVE-2020-8754HIGHCVSS 7.5fixed in 11.8.80≥ 11.12.0, < 11.12.80+3 more2020-11-12
CVE-2020-8754 [HIGH] CWE-125 CVE-2020-8754: Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11 Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
nvd
CVE-2020-8758CRITICALCVSS 9.8≥ 11.8, < 11.8.79≥ 11.12, < 11.12.79+3 more2020-09-10
CVE-2020-8758 [CRITICAL] CVE-2020-8758: Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versi Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via
nvd