Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
intel active management technology firmware vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2022-27497
Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.
Intel Active Management Technology Firmware
8.8
CVSSv3
CVE-2022-29893
Improper authentication in firmware for Intel(R) AMT prior to 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.
Intel Active Management Technology Firmware
6.7
CVSSv3
CVE-2021-33159
Improper authentication in subsystem for Intel(R) AMT prior to 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Active Management Technology Firmware
9.8
CVSSv3
CVE-2022-26845
Improper authentication in firmware for Intel(R) AMT prior to 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Intel Active Management Technology Firmware
6.8
CVSSv3
CVE-2022-28697
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Intel Standard Manageability
Intel Active Management Technology Firmware
5.5
CVSSv3
CVE-2022-30944
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.
Intel Standard Manageability
Intel Active Management Technology Firmware
9.8
CVSSv3
CVE-2022-30601
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
Intel Standard Manageability
Intel Active Management Technology Firmware
6.5
CVSSv3
CVE-2021-33068
Null pointer dereference in subsystem for Intel(R) AMT prior to 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.
Intel Active Management Technology Firmware
Netapp Cloud Backup -
5.5
CVSSv3
CVE-2022-0487
A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions before 5.14 rc1.
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 11.0
1 Github repository
7.8
CVSSv3
CVE-2020-8744
Improper initialization in subsystem for Intel(R) CSME versions before12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions prior to 4.0.30 Intel(R) SPS versions before E3_05.01.04.200 may allow a privileged user to potentially enable escalation of privilege via ...
Intel Trusted Execution Engine
Intel Server Platform Services
Intel Converged Security And Management Engine
Siemens Simatic S7-1518-4 Pn\\/dp Mfp Firmware -
Siemens Simatic S7-1518f-4 Pn\\/dp Mfp Firmware -
Siemens Simatic S7-1500 Firmware -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »