cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-26021,https://securityvulnerability.io/vulnerability/CVE-2024-26021,Improper Initialization in Intel AMT and Standard Manageability Firmware,"The vulnerability arises from improper initialization in the firmware of specific Intel AMT and Intel Standard Manageability products, which could allow a privileged user to access sensitive information through local access. This flaw highlights the potential risk for data exposure if exploited, emphasizing the need for users to update their firmware and reinforce security protocols.",Intel,Intel(r) Amt And Intel(r) Standard Manageability,4.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:22.506Z,0 CVE-2024-38307,https://securityvulnerability.io/vulnerability/CVE-2024-38307,Improper Input Validation in Intel Manageability Firmware,"The firmware for certain versions of Intel AMT and Intel Standard Manageability is susceptible to an improper input validation issue. This vulnerability may allow an authenticated user to exploit the system, potentially leading to a denial of service through network access. It is crucial for users to apply any recommended updates to mitigate this risk effectively.",Intel,Intel(r) Amt And Intel(r) Standard Manageability,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:19.293Z,0 CVE-2023-38655,https://securityvulnerability.io/vulnerability/CVE-2023-38655,Potential Denial of Service Vulnerability in Intel Firmware,"The vulnerability identified stems from improper buffer restrictions within the firmware of Intel's Active Management Technology (AMT) and Intel Standard Manageability. This flaw allows a privileged user to exploit the system, potentially leading to a denial of service condition through network access. Organizations utilizing these technologies should assess their exposure to this weakness and apply necessary mitigations as outlined by Intel's security advisory.",Intel(R),Intel(r) Amt And Intel(r) Standard Manageability,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:43.058Z,0 CVE-2022-36392,https://securityvulnerability.io/vulnerability/CVE-2022-36392,Improper Input Validation in Intel AMT and Standard Manageability Firmware,"The vulnerability arises from improper input validation present in specific firmware versions for Intel(R) AMT and Intel(R) Standard Manageability. This flaw may allow an unauthenticated user to perform actions that could result in a denial of service via network access, potentially disrupting the functionality of affected systems. Users and administrators should ensure their firmware is updated to the latest versions to mitigate this risk and maintain secure operations.",Intel,Intel(r) Amt And Intel(r) Standard Manageability In Intel (r) Csme,8.6,HIGH,0.001069999998435378,false,,false,false,false,,,false,false,,2023-08-11T02:36:55.653Z,0 CVE-2022-28697,https://securityvulnerability.io/vulnerability/CVE-2022-28697,Improper Access Control in Intel AMT and Intel Standard Manageability,An improper access control issue exists in the firmware for Intel AMT and Intel Standard Manageability. This vulnerability can potentially allow an unauthenticated user to escalate privileges by gaining physical access to the affected devices. It emphasizes the importance of securing physical access to systems utilizing these technologies to mitigate potential threats.,Intel,Intel(r) Amt And Intel(r) Standard Manageability,6.8,MEDIUM,0.0006799999973736703,false,,false,false,false,,,false,false,,2022-08-18T00:00:00.000Z,0 CVE-2022-30944,https://securityvulnerability.io/vulnerability/CVE-2022-30944,Insufficiently Protected Credentials in Intel Management Products,The vulnerability in Intel's Active Management Technology (AMT) and Standard Manageability arises from inadequate protection of user credentials. This shortcoming could allow a privileged user to access sensitive information locally. Users working with affected versions must take immediate action to assess their security configurations and apply necessary patches to mitigate this risk. Regular audits and adherence to security best practices can help safeguard against potential exploits stemming from this vulnerability.,Intel,Intel(r) Amt And Intel(r) Standard Manageability,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-08-18T00:00:00.000Z,0 CVE-2022-30601,https://securityvulnerability.io/vulnerability/CVE-2022-30601,Insufficient Credential Protection in Intel AMT and Standard Manageability,"The vulnerability in Intel AMT and Intel Standard Manageability arises from insufficient protection of user credentials, granting unauthenticated users potential network access. This situation can lead to unauthorized information disclosure and privilege escalation, posing security risks for users. It is crucial for organizations using these products to assess their security measures and implement recommended patches.",Intel,Intel(r) Amt And Intel(r) Standard Manageability,9.8,CRITICAL,0.001990000018849969,false,,false,false,false,,,false,false,,2022-08-18T00:00:00.000Z,0