cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-26021,https://securityvulnerability.io/vulnerability/CVE-2024-26021,Improper Initialization in Intel AMT and Standard Manageability Firmware,"The vulnerability arises from improper initialization in the firmware of specific Intel AMT and Intel Standard Manageability products, which could allow a privileged user to access sensitive information through local access. This flaw highlights the potential risk for data exposure if exploited, emphasizing the need for users to update their firmware and reinforce security protocols.",Intel,Intel(r) Amt And Intel(r) Standard Manageability,4.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:22.506Z,0 CVE-2024-38307,https://securityvulnerability.io/vulnerability/CVE-2024-38307,Improper Input Validation in Intel Manageability Firmware,"The firmware for certain versions of Intel AMT and Intel Standard Manageability is susceptible to an improper input validation issue. This vulnerability may allow an authenticated user to exploit the system, potentially leading to a denial of service through network access. It is crucial for users to apply any recommended updates to mitigate this risk effectively.",Intel,Intel(r) Amt And Intel(r) Standard Manageability,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:19.293Z,0 CVE-2023-38655,https://securityvulnerability.io/vulnerability/CVE-2023-38655,Potential Denial of Service Vulnerability in Intel Firmware,"The vulnerability identified stems from improper buffer restrictions within the firmware of Intel's Active Management Technology (AMT) and Intel Standard Manageability. This flaw allows a privileged user to exploit the system, potentially leading to a denial of service condition through network access. Organizations utilizing these technologies should assess their exposure to this weakness and apply necessary mitigations as outlined by Intel's security advisory.",Intel(R),Intel(r) Amt And Intel(r) Standard Manageability,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:43.058Z,0 CVE-2022-36392,https://securityvulnerability.io/vulnerability/CVE-2022-36392,Improper Input Validation in Intel AMT and Standard Manageability Firmware,"The vulnerability arises from improper input validation present in specific firmware versions for Intel(R) AMT and Intel(R) Standard Manageability. This flaw may allow an unauthenticated user to perform actions that could result in a denial of service via network access, potentially disrupting the functionality of affected systems. Users and administrators should ensure their firmware is updated to the latest versions to mitigate this risk and maintain secure operations.",Intel,Intel(r) Amt And Intel(r) Standard Manageability In Intel (r) Csme,8.6,HIGH,0.001069999998435378,false,,false,false,false,,,false,false,,2023-08-11T02:36:55.653Z,0 CVE-2021-33159,https://securityvulnerability.io/vulnerability/CVE-2021-33159,Improper Authentication in Intel AMT Subsystem,"The vulnerability in Intel Active Management Technology (AMT) arises from improper authentication, which could allow a privileged user to gain elevated access. This flaw affects multiple versions of AMT, enabling potential escalation of privilege through local access. Users and organizations utilizing Intel AMT should review their systems against the listed affected versions and take necessary precautions to mitigate risks. For detailed information, refer to Intel's security advisory.",Intel,Intel(r) Amt,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-11T15:48:36.704Z,0 CVE-2022-29893,https://securityvulnerability.io/vulnerability/CVE-2022-29893,Improper Authentication in Intel AMT Firmware Leading to Potential Privilege Escalation,"The Intel AMT firmware contains an improper authentication vulnerability that could allow an authenticated user to exploit the system via unauthorized network access, potentially enabling escalation of privileges. This issue affects multiple versions of Intel AMT firmware, posing a significant risk to system security and integrity, especially in environments where sensitive data is at stake.",Intel,Intel(r) Amt,8.8,HIGH,0.0007699999841861427,false,,false,false,false,,,false,false,,2022-11-11T15:48:36.224Z,0 CVE-2022-27497,https://securityvulnerability.io/vulnerability/CVE-2022-27497,Null Pointer Dereference in Intel AMT Firmware,"A null pointer dereference vulnerability exists in the firmware for Intel Active Management Technology (AMT) prior to specified versions. This flaw allows an unauthenticated attacker to induce a denial of service condition through network access, potentially compromising the availability of impacted devices. Users are advised to update their firmware to the latest versions to mitigate this risk.",Intel,Intel(r) Amt,7.5,HIGH,0.0009399999980814755,false,,false,false,false,,,false,false,,2022-11-11T15:48:35.754Z,0 CVE-2022-26845,https://securityvulnerability.io/vulnerability/CVE-2022-26845,Improper Authentication Vulnerability in Intel AMT Firmware,"This vulnerability stems from improper authentication within the firmware of Intel AMT, impacting various versions. An attacker could exploit this flaw to gain unauthorized network access, potentially leading to escalated privileges without the need for valid credentials. Users are strongly advised to update their firmware to the latest versions to mitigate this risk and protect their systems from potential exploits.",Intel,Intel(r) Amt,9.8,CRITICAL,0.0014199999859556556,false,,false,false,false,,,false,false,,2022-11-11T15:48:35.294Z,0 CVE-2022-26341,https://securityvulnerability.io/vulnerability/CVE-2022-26341,"Insufficiently Protected Credentials in Intel AMT SDK, EMA, and MC Products","The vulnerability relates to insufficiently protected credentials in Intel AMT SDK, Intel EMA, and Intel MC software. These affected products prior to their respective versions may allow an authenticated user to exploit network access to potentially escalate privileges, presenting a significant risk if left unaddressed. Users and administrators are encouraged to assess their systems and apply the necessary updates to mitigate this vulnerability.",Intel,"Intel(r) Amt Sdk, Intel(r) Ema And Intel(r) Mc",8.8,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-11-11T15:47:12.330Z,0 CVE-2022-30601,https://securityvulnerability.io/vulnerability/CVE-2022-30601,Insufficient Credential Protection in Intel AMT and Standard Manageability,"The vulnerability in Intel AMT and Intel Standard Manageability arises from insufficient protection of user credentials, granting unauthenticated users potential network access. This situation can lead to unauthorized information disclosure and privilege escalation, posing security risks for users. It is crucial for organizations using these products to assess their security measures and implement recommended patches.",Intel,Intel(r) Amt And Intel(r) Standard Manageability,9.8,CRITICAL,0.001990000018849969,false,,false,false,false,,,false,false,,2022-08-18T00:00:00.000Z,0 CVE-2022-28697,https://securityvulnerability.io/vulnerability/CVE-2022-28697,Improper Access Control in Intel AMT and Intel Standard Manageability,An improper access control issue exists in the firmware for Intel AMT and Intel Standard Manageability. This vulnerability can potentially allow an unauthenticated user to escalate privileges by gaining physical access to the affected devices. It emphasizes the importance of securing physical access to systems utilizing these technologies to mitigate potential threats.,Intel,Intel(r) Amt And Intel(r) Standard Manageability,6.8,MEDIUM,0.0006799999973736703,false,,false,false,false,,,false,false,,2022-08-18T00:00:00.000Z,0 CVE-2022-30944,https://securityvulnerability.io/vulnerability/CVE-2022-30944,Insufficiently Protected Credentials in Intel Management Products,The vulnerability in Intel's Active Management Technology (AMT) and Standard Manageability arises from inadequate protection of user credentials. This shortcoming could allow a privileged user to access sensitive information locally. Users working with affected versions must take immediate action to assess their security configurations and apply necessary patches to mitigate this risk. Regular audits and adherence to security best practices can help safeguard against potential exploits stemming from this vulnerability.,Intel,Intel(r) Amt And Intel(r) Standard Manageability,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-08-18T00:00:00.000Z,0 CVE-2021-33107,https://securityvulnerability.io/vulnerability/CVE-2021-33107,Insufficiently Protected Credentials in Intel AMT SDK and SCS Products,"The vulnerability is linked to insufficient security measures in USB provisioning processes for several Intel products, including the Intel AMT SDK, Intel SCS, and Intel MEBx. An unauthenticated user with physical access to these systems may exploit this weakness to gain unauthorized access, potentially leading to the disclosure of sensitive information. This flaw reinforces the need for robust security protocols in hardware management systems.",Intel,"Intel(r) Amt Sdk Before Version 16.0.3, Intel(r) Scs Before Version 12.2 And Intel(r) Mebx",4.6,MEDIUM,0.0007399999885819852,false,,false,false,false,,,false,false,,2022-02-09T22:04:36.000Z,0 CVE-2021-33068,https://securityvulnerability.io/vulnerability/CVE-2021-33068,Null Pointer Dereference in Intel AMT Products by Intel,"A null pointer dereference vulnerability exists in the Intel Active Management Technology (AMT), allowing an authenticated user to potentially exploit network access and trigger a denial of service condition. This vulnerability affects Intel AMT before version 15.0.35, necessitating updates to mitigate potential risks associated with unauthorized disruptions.",Intel,Intel(r) Amt,6.5,MEDIUM,0.0008999999845400453,false,,false,false,false,,,false,false,,2022-02-09T22:04:31.000Z,0 CVE-2020-8749,https://securityvulnerability.io/vulnerability/CVE-2020-8749,Out-of-Bounds Read Vulnerability in Intel AMT Versions,"An out-of-bounds read vulnerability exists in Intel's Active Management Technology (AMT) that impacts various versions released prior to 11.8.80, 11.12.80, 11.22.80, 12.0.70, and 14.0.45. This flaw may allow an unauthenticated user to execute access to potentially sensitive information, which could result in privilege escalation through adjacent access. Users and organizations utilizing affected versions are recommended to apply updates to mitigate the risk associated with this vulnerability.",Intel,Intel(r) Amt,8.8,HIGH,0.0007699999841861427,false,,false,false,false,,,false,false,,2020-11-12T18:09:41.000Z,0 CVE-2020-8746,https://securityvulnerability.io/vulnerability/CVE-2020-8746,Integer Overflow Vulnerability in Intel AMT Subsystem,"An integer overflow vulnerability exists in the subsystem for Intel Active Management Technology (AMT) prior to certain secure versions. This flaw potentially allows unauthenticated users with adjacent access to compromise system integrity, leading to potential denial of service conditions. Ensuring timely updates to the product is critical to safeguarding networks from exploitation.",Intel,Intel(r) Amt,6.5,MEDIUM,0.000699999975040555,false,,false,false,false,,,false,false,,2020-11-12T18:09:33.000Z,0 CVE-2020-12356,https://securityvulnerability.io/vulnerability/CVE-2020-12356,Out-of-Bounds Read Vulnerability in Intel Active Management Technology,"An out-of-bounds read vulnerability exists in Intel Active Management Technology, affecting versions prior to 11.8.80, 11.12.80, 11.22.80, 12.0.70, and 14.0.45. This flaw may allow a privileged user with local access to potentially disclose sensitive information. Therefore, securing your systems by updating to the latest version is critically important to mitigate the risks associated with this vulnerability.",Intel,Intel(r) Amt,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-11-12T18:09:24.000Z,0 CVE-2020-8747,https://securityvulnerability.io/vulnerability/CVE-2020-8747,Out-of-bounds Read Vulnerability in Intel AMT Products,"An out-of-bounds read vulnerability exists within Intel Active Management Technology (AMT) that may allow unauthenticated users to gain unauthorized access to sensitive information or lead to denial of service. This issue affects several versions prior to specified updates. If exploited, it could allow attackers to read memory locations that they shouldn’t have access to, posing significant risks to data integrity and system availability.",Intel,Intel(r) Amt,9.1,CRITICAL,0.001560000004246831,false,,false,false,false,,,false,false,,2020-11-12T18:09:04.000Z,0 CVE-2020-8754,https://securityvulnerability.io/vulnerability/CVE-2020-8754,Out-of-Bounds Read Vulnerability in Intel AMT and ISM,"An out-of-bounds read vulnerability exists within the Intel(R) Active Management Technology (AMT) and Intel(R) Industry Standard Architecture (ISM) systems. This issue allows an unauthenticated user to potentially disclose sensitive information through network access. Affected versions of these products can lead to unauthorized data exposure, emphasizing the need for immediate updates to the latest secure versions.",Intel,"Intel(r) Amt, Intel(r) Ism",7.5,HIGH,0.0013699999544769526,false,,false,false,false,,,false,false,,2020-11-12T18:08:35.000Z,0 CVE-2020-8760,https://securityvulnerability.io/vulnerability/CVE-2020-8760,Integer Overflow Vulnerability in Intel AMT Subsystem,"An integer overflow vulnerability exists in the Intel Active Management Technology (AMT) subsystem, allowing potentially privileged users to escalate their privileges through local access. This flaw affects specific versions of Intel AMT, exposing systems to unauthorized operations if exploited.",Intel,Intel(r) Amt,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-11-12T18:08:03.000Z,0 CVE-2020-8757,https://securityvulnerability.io/vulnerability/CVE-2020-8757,Out-of-Bounds Read Vulnerability in Intel AMT Product,"An out-of-bounds read vulnerability exists in Intel's Active Management Technology (AMT), which affects various versions prior to specific updates. This flaw could allow a privileged user with local access to potentially escalate their privileges, posing a security risk. Users of the affected versions should promptly apply the necessary updates to mitigate the risk associated with this vulnerability.",Intel,Intel(r) Amt,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-11-12T18:07:38.000Z,0 CVE-2020-12354,https://securityvulnerability.io/vulnerability/CVE-2020-12354,Escalation of Privilege in Intel AMT SDK Versions,"The Intel AMT SDK has a vulnerability due to incorrect default permissions in the Windows installer. Authenticated users can exploit this flaw to escalate privileges through local access, potentially compromising system integrity and security. Users and administrators are advised to review their systems and apply necessary updates to mitigate this vulnerability.",Intel,Intel(r) Amt Sdk,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-11-12T18:07:30.000Z,0 CVE-2020-8753,https://securityvulnerability.io/vulnerability/CVE-2020-8753,Out-of-Bounds Read Vulnerability in Intel AMT and ISM Software,"An out-of-bounds read vulnerability exists in the DHCP subsystem of Intel AMT and ISM software that could allow an unauthenticated attacker to gain access to sensitive information over the network. This flaw affects specific versions of the products, potentially exposing critical data to risk. Users are advised to update to the latest versions to mitigate the issue.",Intel,"Intel(r) Amt, Intel(r) Ism Versions",7.5,HIGH,0.0013699999544769526,false,,false,false,false,,,false,false,,2020-11-12T18:05:32.000Z,0 CVE-2020-8752,https://securityvulnerability.io/vulnerability/CVE-2020-8752,Out-of-Bounds Write Vulnerability in Intel AMT and ISM Products,"An out-of-bounds write vulnerability exists in the IPv6 subsystem of Intel's Active Management Technology (AMT) and Intel Standard Manageability (ISM) products. This flaw affects multiple versions and may allow an unauthenticated user to potentially escalate privileges via network access, creating significant security concerns for affected systems.",Intel,"Intel(r) Amt, Intel(r) Ism Versions",9.8,CRITICAL,0.0023399998899549246,false,,false,false,false,,,false,false,,2020-11-12T18:05:24.000Z,0 CVE-2020-8758,https://securityvulnerability.io/vulnerability/CVE-2020-8758,Improper Buffer Restrictions in Intel AMT and ISM Network Subsystem,"The vulnerability arises from improper buffer restrictions within the network subsystem of provisioned Intel AMT and Intel ISM. This allows unauthenticated users to potentially escalate privileges via network access in affected versions. Additionally, for un-provisioned systems, authenticated users may exploit local access to achieve similar privilege escalation. Users are advised to review the affected versions and apply the necessary updates as detailed in Intel's advisory.",Intel,Intel(r) Amt And Intel(r) Ism,9.8,CRITICAL,0.0023399998899549246,false,,false,false,false,,,false,false,,2020-09-10T14:22:14.000Z,0