Intel AMT和ISM 安全漏洞

CVE编号

CVE-2020-0597

利用情况

暂无

补丁情况

N/A

披露时间

2020-06-16
漏洞描述
在14.0.33之前的Intel(R)AMT和Intel(R)ISM版本的IPv6子系统中读取的越界可能允许未经身份验证的用户通过网络访问启用拒绝服务。

解决建议
厂商已发布了漏洞修复程序,请及时关注更新:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 intel active_management_technology * From
(including)
11.0
Up to
(including)
11.8.76
运行在以下环境
应用 intel active_management_technology * From
(including)
11.10
Up to
(including)
11.11.76
运行在以下环境
应用 intel active_management_technology * From
(including)
11.20
Up to
(including)
11.22.76
运行在以下环境
应用 intel active_management_technology * From
(including)
12.0
Up to
(including)
12.0.63
运行在以下环境
应用 intel active_management_technology * From
(including)
13.0
Up to
(including)
13.0.31
运行在以下环境
应用 intel active_management_technology * From
(including)
14.0
Up to
(including)
14.0.32
运行在以下环境
应用 intel software_manager * From
(including)
11.0
Up to
(including)
11.8.76
运行在以下环境
应用 intel software_manager * From
(including)
11.10
Up to
(including)
11.11.76
运行在以下环境
应用 intel software_manager * From
(including)
11.20
Up to
(including)
11.22.76
运行在以下环境
应用 intel software_manager * From
(including)
12.0
Up to
(including)
12.0.63
运行在以下环境
应用 intel software_manager * From
(including)
13.0
Up to
(including)
13.0.31
运行在以下环境
应用 intel software_manager * From
(including)
14.0
Up to
(including)
14.0.32
CVSS3评分
7.5
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-125 跨界内存读
阿里云安全产品覆盖情况