SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Intel Active Management Technology SDK Vendors:   Intel
Intel Active Management Technology Authentication Flaw Lets Remote and Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1038385
SecurityTracker URL:  http://securitytracker.com/id/1038385
CVE Reference:   CVE-2017-5689   (Links to External Site)
Updated:  May 5 2017
Original Entry Date:  May 2 2017
Impact:   Root access via local system, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, 11.6
Description:   Two vulnerabilities were reported in Intel Active Management Technology. A local user can obtain elevated privileges on the target system. A remote user can gain elevated privileges.

A remote user can supply a specially crafted HTTP Digest authentication response to bypass authentication and gain system privileges on the target system.

Intel Standard Manageability (ISM) is also affected by this vulnerability.

A local user can provision manageability features to gain elevated privileges on the target system.

Intel Standard Manageability (ISM) and Intel Small Business Technology firmware is also affected by this vulnerability.

Maksim Malyutin from Embedi reported these vulnerabilities.

Impact:   A local user can obtain elevated privileges on the target system.

A remote user can gain elevated privileges on the target system.

Solution:   The vendor has issued a fix. A firmware patch matrix is available in the vendor advisory.

The vendor has also provided mitigation instructions, available at:

https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf

The vendor advisory is available at:

https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr

Vendor URL:  security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr (Links to External Site)
Cause:   Authentication error

Message History:   This archive entry has one or more follow-up message(s) listed below.
May 8 2017 (HP Issues Advisory for Certain HP Computers) Intel Active Management Technology Authentication Flaw Lets Remote and Local Users Gain Elevated Privileges
HPE has issued an advisory for certain HP Computers.
May 8 2017 (Lenovo Issues Fix for Certain Lenovo PCs) Intel Active Management Technology Authentication Flaw Lets Remote and Local Users Gain Elevated Privileges
Lenovo has issued an advisory for certain Lenovo ThinkPads, ThinkCentres, ThinkStations, and ThinkServers.
Jul 19 2017 (Oracle Issues Fix for Oracle Hospitality Applications (MICROS)) Intel Active Management Technology Authentication Flaw Lets Remote and Local Users Gain Elevated Privileges
Oracle has issued a fix for Oracle Hospitality Applications (MICROS).



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC