Vulnerability Details : CVE-2017-5689
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
CVE-2017-5689
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageabilit
CISA required action:
Apply updates per vendor instructions.
CISA description:
Intel products contain a vulnerability which can allow attackers to perform privilege escalation.
Added on
2022-01-28
Action due date
2022-07-28
Exploit prediction scoring system (EPSS) score for CVE-2017-5689
Probability of exploitation activity in the next 30 days: 97.42%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2017-5689
-
Intel AMT Digest Authentication Bypass Scanner
Disclosure Date : 2017-05-05auxiliary/scanner/http/intel_amt_digest_bypassThis module scans for Intel Active Management Technology endpoints and attempts to bypass authentication using a blank HTTP digest (CVE-2017-5689). This service can be found on ports 16992, 16993 (tls), 623, and 624 (tls). Authors: - hdm <[email protected]>
CVSS scores for CVE-2017-5689
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
[email protected] |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
[email protected] |
References for CVE-2017-5689
-
https://security.netapp.com/advisory/ntap-20170509-0001/
Third Party Advisory
-
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us
Third Party Advisory
-
http://www.securityfocus.com/bid/98269
Third Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1038385
Third Party Advisory;VDB Entry
-
https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf
Broken Link
-
https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability
Technical Description;Third Party Advisory
-
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
Patch;Vendor Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf
Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Patch;Third Party Advisory
Products affected by CVE-2017-5689
- cpe:2.3:o:intel:active_management_technology_firmware:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:9.5:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:11.6:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:11.5:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:intel:active_management_technology_firmware:8.1:*:*:*:*:*:*:*