ID

VAR-201705-3474


CVE

CVE-2017-5689


TITLE

Intel AMT Remote Authentication Bypass Vulnerability

Trust: 0.8

sources: IVD: 408ebf9c-6ba3-4489-b364-1b4677311268 // CNVD: CNVD-2017-05856

DESCRIPTION

An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT). These functions use multiple ports to listen for administrative commands. Intel According to the document AMT Port as web interface for 16992 and 16993 Is used. Also other ports 16994 When 16995 Or 623 When 664 May be used. Intel Documents https://software.intel.com/sites/default/files/article/393789/amt-9-start-here-guide.pdf port 16994 When 16995 https://www.symantec.com/connect/articles/why-must-intel-amt-be-configured-and-what-required Supporting these remote management functions Intel Management Engine In the remote ( Not authenticated ) There is a vulnerability that allows remote management functions to be accessed by a third party. Intel Is a security advisory for this vulnerability (INTEL-SA-00075) And guide for mitigation (INTEL-SA-00075 Mitigation Guide) Offers. Security advisory (INTEL-SA-00075) https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr Mitigation guide (INTEL-SA-00075 Mitigation Guide) https://downloadcenter.intel.com/download/26754 Also, OEM This product may have this remote management function enabled.A remote attacker may gain access to the remote management functions of the system. Intel AMT has a remote authentication bypass vulnerability. Unauthorized users only need to send an empty user_response value to bypass the Intel AMT Web authentication system and use the Keyboard Video Mouse (KVM) feature to remotely control the system for malicious operations. Multiple Intel products are prone to a privilege-escalation vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03754en_us SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesbhf03754en_us Version: 1 HPESBHF03754 rev.1 - HPE ML10 Gen 9 Server using Intel Xeon E3-1200 v5 Processor, Remote Access Restriction Bypass NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-05-26 Last Updated: 2017-05-26 Potential Security Impact: Remote: Access Restriction Bypass Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified in HPE ML10 Gen 9 Server using Intel Xeon E3-1200 v5 Processor. The vulnerability could be remotely exploited to allow access restriction bypass. Do not attempt to upgrade the ME FW without following the instructions detailed in the Resolution section. Refer to the "Platform Specific Information" section in the Resolution for more specific information on upgrades for specific ProLiant servers. References: - CVE-2017-5689 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HPE ProLiant ML10 Gen9 E3-1225 v5 3.3GHz 4-core 8GB-R 1TB Non-hot Plug 4LFF SATA 300W AP Svr/Promo Gen9 - HPE ProLiant ML10 Gen9 E3-1225 v5 4GB-R 1TB Non-hot Plug 4LFF SATA 300W Svr/S-Buy Gen9 - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 1TB Non-hot Plug 4LFF SATA 300W Perf Svr Gen9 - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W Svr/GO Gen9 - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W Svr/TV Gen9 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2017-5689 8.1 CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H 6.2 (AV:L/AC:H/Au:N/C:C/I:C/A:C) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has provided the following resolution for this issue: **Note:** Only the ProLiant Gen9 server detailed in the impacted product information above can be upgraded using the procedure described in this document. Before beginning the upgrade process, the server must have Intel Xeon E3-1200 v5 processors installed. See below for further instructions. Upgrade to the latest System ROM available for the platform prior to upgrading the ME is required. System ROM will need 1.06 version or later to support this ME firmware. The system ROM toolkit and firmware image can be found at: * BIOS 1.06 (Windows) <http://h20564.www2.hpe.com/hpsc/swd/public/detail?sp4ts.oid=1008772176&swIte Id=MTX_0a1076f4bf0444a090b09eeb62&swEnvOid=4168#tab1> * BIOS 1.06 (Linux 6) <http://h20564.www2.hpe.com/hpsc/swd/public/detail?sp4ts.oid=1008772176&swIte Id=MTX_14bacf35f0844bb696ef65799b&swEnvOid=4103> * BIOS 1.06 (Linux 7) <http://h20564.www2.hpe.com/hpsc/swd/public/detail?sp4ts.oid=1008772176&swIte Id=MTX_14bacf35f0844bb696ef65799b&swEnvOid=4176> The ME toolkit and firmware image can be found at: * ME 11.6.27.3264 (Windows) <http://h20564.www2.hpe.com/hpsc/swd/public/detail?sp4ts.oid=1008772176&swIte Id=MTX_359491d72fe04c0f9461fd657d&swEnvOid=4168> * ME 11.6.27.3264 (UEFI) <http://h20564.www2.hpe.com/hpsc/swd/public/detail?sp4ts.oid=1008772176&swIte Id=MTX_67a275408a9b45aba72ad7cbc1&swEnvOid=4168> HISTORY Version:1 (rev.1) - 26 May 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBCAAGBQJZKGjXAAoJELXhAxt7SZaiu3AH/2a97Qx1mBghXloDAR4pCdWE qiQUvMYft5zk2UmRgQpg5jOjDMSBQFTPtPvV9vBYxhj0Or49wAyTDcw1JeG8I8hI Bs9XDJXOQXvhTjdJakpG/+PIPsoMwJhNoH9H4/rWn0iUJb3wjTDEoHboNfSRZh0j mRlEpDmc12sDSlalJ3LymcXt/Zn/62t1VErmQp3QSdlCjsSxttoUvVzz6u2plKQ0 tJqa8m76wP2fzmIcEpr4DqHkSmAqAyAQEPiVjmdDYYaIN1pi1GKkcIu4WbI7x2xY Tjy4CXRHSy357ePv3zqwMYfl4nbQe+1Fk4zSNf1i18LQ9kLWp6mSPqLMV7kOnko= =DPhQ -----END PGP SIGNATURE-----

Trust: 3.6

sources: NVD: CVE-2017-5689 // CERT/CC: VU#491375 // JVNDB: JVNDB-2017-002923 // CNVD: CNVD-2017-05856 // BID: 98269 // IVD: 408ebf9c-6ba3-4489-b364-1b4677311268 // VULHUB: VHN-113892 // VULMON: CVE-2017-5689 // PACKETSTORM: 142693

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 408ebf9c-6ba3-4489-b364-1b4677311268 // CNVD: CNVD-2017-05856

AFFECTED PRODUCTS

vendor:intelmodel:active management technologyscope:eqversion:9.5

Trust: 1.9

vendor:intelmodel:active management technologyscope:eqversion:9.1

Trust: 1.9

vendor:intelmodel:active management technologyscope:eqversion:9.0

Trust: 1.9

vendor:intelmodel:active management technologyscope:eqversion:8.1

Trust: 1.9

vendor:intelmodel:active management technologyscope:eqversion:8.0

Trust: 1.9

vendor:intelmodel:active management technologyscope:eqversion:7.1

Trust: 1.9

vendor:intelmodel:active management technologyscope:eqversion:7.0

Trust: 1.9

vendor:intelmodel:active management technologyscope:eqversion:6.2

Trust: 1.9

vendor:intelmodel:active management technologyscope:eqversion:6.1

Trust: 1.9

vendor:intelmodel:active management technologyscope:eqversion:6.0

Trust: 1.9

vendor:intelmodel:manageabilityscope:eqversion:7.x

Trust: 1.4

vendor:intelmodel:manageabilityscope:eqversion:8.x

Trust: 1.4

vendor:intelmodel:manageabilityscope:eqversion:9.x

Trust: 1.4

vendor:intelmodel:manageabilityscope:eqversion:10.x

Trust: 1.4

vendor:intelmodel:manageabilityscope:eqversion:11.0

Trust: 1.4

vendor:intelmodel:active management technologyscope:eqversion:11.6

Trust: 1.3

vendor:intelmodel:active management technologyscope:eqversion:11.5

Trust: 1.3

vendor:intelmodel:active management technologyscope:eqversion:11.0

Trust: 1.3

vendor:intelmodel:active management technologyscope:eqversion:10.0

Trust: 1.3

vendor:dellmodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:fujitsumodel: - scope: - version: -

Trust: 0.8

vendor:hpmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:lenovomodel: - scope: - version: -

Trust: 0.8

vendor:siemensmodel: - scope: - version: -

Trust: 0.8

vendor:toshiba america informationmodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel:manageabilityscope:eqversion:version 6.x

Trust: 0.8

vendor:intelmodel:manageabilityscope:eqversion:11.5 and 11.6 using hardware

Trust: 0.8

vendor:intelmodel:manageabilityscope:eqversion:6.x

Trust: 0.6

vendor:intelmodel:manageabilityscope:eqversion:11.5

Trust: 0.6

vendor:lenovomodel:thinkcentre m83scope:eqversion:0

Trust: 0.6

vendor:siemensmodel:sinumerik panel control unitscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:simotion p320scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:simatic industrial pcscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:micros workstationscope:eqversion:6500

Trust: 0.3

vendor:oraclemodel:micros pc workstationscope:eqversion:20150

Trust: 0.3

vendor:lenovomodel:thinkstation s30scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation p910scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation p900scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation p710scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation p700scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation p510scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation p500scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation p410scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation p310scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation p300scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation e32scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation e31scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation e20scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation d30scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkstation c30scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkserver ts550scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkserver ts540scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkserver ts440scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkserver ts250scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkserver ts240scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkserver ts200vscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkserver ts150scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkserver ts140scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad yogascope:eqversion:3700

Trust: 0.3

vendor:lenovomodel:thinkpadscope:eqversion:x2600

Trust: 0.3

vendor:lenovomodel:thinkpad x240sscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpadscope:eqversion:x2400

Trust: 0.3

vendor:lenovomodel:thinkpad w550sscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad w530scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad w520scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t560scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t550scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t470pscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t460sscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t460pscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t460scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t450sscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t440pscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t431sscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad t430sscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad s430scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad s1 yogascope:eqversion:120

Trust: 0.3

vendor:lenovomodel:thinkpad p70scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad p51scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad p50sscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad p50scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad l570scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad l560scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad l470scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpad l460scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre merton m81scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m93zscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m92zscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m910zscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m910xscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m910tscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m910sscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m910qscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m90zscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m900zscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m900scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m800scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m710qscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre m700 tinyscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre edge92scope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkcentre e63z fqkt33ascope: - version: -

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:9.5

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:9.1

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:9.0

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:8.1

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:8.0

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:7.1

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:7.0

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:6.2

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:6.1

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:6.0

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:11.6

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:11.5

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:11.0

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:eqversion:10.0

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:9.5

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:9.1

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:9.0

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:8.1

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:8.0

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:7.1

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:7.0

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:6.2

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:6.1

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:6.0

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:11.6

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:11.5

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:11.0

Trust: 0.3

vendor:intelmodel:small business technologyscope:eqversion:10.0

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:neversion:9.5.61.3012

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:neversion:9.1.41.3024

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:neversion:8.1.71.3608

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:neversion:7.1.91.3272

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:neversion:6.2.61.3535

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:neversion:11.6.27.3264

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:neversion:11.0.25.3001

Trust: 0.3

vendor:intelmodel:standard manageabilityscope:neversion:10.0.55.3000

Trust: 0.3

vendor:intelmodel:small business technologyscope:neversion:9.5.61.3012

Trust: 0.3

vendor:intelmodel:small business technologyscope:neversion:9.1.41.3024

Trust: 0.3

vendor:intelmodel:small business technologyscope:neversion:8.1.71.3608

Trust: 0.3

vendor:intelmodel:small business technologyscope:neversion:7.1.91.3272

Trust: 0.3

vendor:intelmodel:small business technologyscope:neversion:6.2.61.3535

Trust: 0.3

vendor:intelmodel:small business technologyscope:neversion:11.6.27.3264

Trust: 0.3

vendor:intelmodel:small business technologyscope:neversion:11.0.25.3001

Trust: 0.3

vendor:intelmodel:small business technologyscope:neversion:10.0.55.3000

Trust: 0.3

vendor:intelmodel:active management technologyscope:neversion:9.5.61.3012

Trust: 0.3

vendor:intelmodel:active management technologyscope:neversion:9.1.41.3024

Trust: 0.3

vendor:intelmodel:active management technologyscope:neversion:8.1.71.3608

Trust: 0.3

vendor:intelmodel:active management technologyscope:neversion:7.1.91.3272

Trust: 0.3

vendor:intelmodel:active management technologyscope:neversion:6.2.61.3535

Trust: 0.3

vendor:intelmodel:active management technologyscope:neversion:11.6.27.3264

Trust: 0.3

vendor:intelmodel:active management technologyscope:neversion:11.0.25.3001

Trust: 0.3

vendor:intelmodel:active management technologyscope:neversion:10.0.55.3000

Trust: 0.3

vendor:active managementmodel: - scope:eqversion:6.0

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:6.1

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:6.2

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:7.0

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:7.1

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:8.0

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:8.1

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:9.0

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:9.1

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:9.5

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:10.0

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:11.0

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:11.5

Trust: 0.2

vendor:active managementmodel: - scope:eqversion:11.6

Trust: 0.2

sources: IVD: 408ebf9c-6ba3-4489-b364-1b4677311268 // CERT/CC: VU#491375 // CNVD: CNVD-2017-05856 // BID: 98269 // JVNDB: JVNDB-2017-002923 // CNNVD: CNNVD-201705-136 // NVD: CVE-2017-5689

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-5689
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-5689
value: HIGH

Trust: 0.8

NVD: CVE-2017-5689
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-05856
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201705-136
value: CRITICAL

Trust: 0.6

IVD: 408ebf9c-6ba3-4489-b364-1b4677311268
value: CRITICAL

Trust: 0.2

VULHUB: VHN-113892
value: HIGH

Trust: 0.1

VULMON: CVE-2017-5689
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-5689
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

NVD: CVE-2017-5689
severity: HIGH
baseScore: 9.3
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2017-05856
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 408ebf9c-6ba3-4489-b364-1b4677311268
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-113892
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-5689
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2017-5689
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 408ebf9c-6ba3-4489-b364-1b4677311268 // CERT/CC: VU#491375 // CNVD: CNVD-2017-05856 // VULHUB: VHN-113892 // VULMON: CVE-2017-5689 // JVNDB: JVNDB-2017-002923 // CNNVD: CNNVD-201705-136 // NVD: CVE-2017-5689

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

problemtype:CWE-284

Trust: 0.8

sources: VULHUB: VHN-113892 // JVNDB: JVNDB-2017-002923 // NVD: CVE-2017-5689

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201705-136

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201705-136

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002923

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#491375 // VULHUB: VHN-113892 // VULMON: CVE-2017-5689

PATCH

title:INTEL-SA-00075 Mitigation Guideurl:https://downloadcenter.intel.com/download/26754

Trust: 0.8

title:INTEL ACTIVE MANAGEMENT TECHNOLOGY (INTEL AMT) Start Here Guide (Intel AMT 9.0)url:https://software.intel.com/sites/default/files/article/393789/amt-9-start-here-guide.pdf

Trust: 0.8

title:INTEL-SA-00075url:https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr

Trust: 0.8

title:NV17-021url:http://jpn.nec.com/security-info/secinfo/nv17-021.html

Trust: 0.8

title:Why Must Intel AMT Be Configured, and What is Required?url:https://www.symantec.com/connect/articles/why-must-intel-amt-be-configured-and-what-required

Trust: 0.8

title:Rediscovering the Intel AMT Vulnerabilityurl:https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability

Trust: 0.8

title:インテル社ファームウエアの脆弱性に関してurl:http://dynabook.com/assistpc/info/2017/201705icpu.htm

Trust: 0.8

title:インテル社のファームウェアに関する脆弱性のお知らせurl:http://www.fmworld.net/biz/common/intel/20170510/

Trust: 0.8

title:Intel AMT Remote Authentication bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/93339

Trust: 0.6

title:Multiple Intel Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69788

Trust: 0.6

title:Cisco: Intel Active Management Technology Privilege Escalation Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20170512-intelamt

Trust: 0.1

title:HP: HPSBHF03557 rev. 1 - Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Remote Privilege Escalationurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBHF03557

Trust: 0.1

title:Brocade Security Advisories: BSA-2017-320url:https://vulmon.com/vendoradvisory?qidtp=brocade_security_advisories&qid=2cf6af0133ca060b98e91dd3a5ab51e8

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2

Trust: 0.1

title:Intel_IME_WebUI_bypassurl:https://github.com/flyingfishfuse/Intel_IME_WebUI_bypass

Trust: 0.1

title:Disable-Intel-AMTurl:https://github.com/bartblaze/Disable-Intel-AMT

Trust: 0.1

title:cve2017-5689url:https://github.com/baonq-me/cve2017-5689

Trust: 0.1

title:intel_amt_bypassurl:https://github.com/Bijaye/intel_amt_bypass

Trust: 0.1

title:amt_auth_bypassurl:https://github.com/ChoKyuWon/amt_auth_bypass

Trust: 0.1

title:amt_auth_bypass_pocurl:https://github.com/embedi/amt_auth_bypass_poc

Trust: 0.1

title:INTEL-SA-00075-Linux-Detection-And-Mitigation-Toolsurl:https://github.com/intel/INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools

Trust: 0.1

title:amthoneypoturl:https://github.com/packetflare/amthoneypot

Trust: 0.1

title:HUANANZHI-X99-F8url:https://github.com/BIOS-iEngineer/HUANANZHI-X99-F8

Trust: 0.1

title:awesome-shodan-queriesurl:https://github.com/blackunixteam/awesome-shodan-queries

Trust: 0.1

title:-jakejarvis-awesome-shodan-queries-url:https://github.com/SoumyaJas2324/-jakejarvis-awesome-shodan-queries-

Trust: 0.1

title:HUANANZHI-X99-TFurl:https://github.com/BIOS-iEngineer/HUANANZHI-X99-TF

Trust: 0.1

title:awesome-shodan-queriesurl:https://github.com/jakejarvis/awesome-shodan-queries

Trust: 0.1

title:shodan_queriesurl:https://github.com/tristisranae/shodan_queries

Trust: 0.1

title:AutoSploiturl:https://github.com/RootUp/AutoSploit

Trust: 0.1

title:Awesome-Honeypotsurl:https://github.com/AidoWedo/Awesome-Honeypots

Trust: 0.1

title:-awesome-honeypots-url:https://github.com/Nieuport/-awesome-honeypots-

Trust: 0.1

title:awesome-honeypoturl:https://github.com/alphaSeclab/awesome-honeypot

Trust: 0.1

sources: CNVD: CNVD-2017-05856 // VULMON: CVE-2017-5689 // JVNDB: JVNDB-2017-002923 // CNNVD: CNNVD-201705-136

EXTERNAL IDS

db:NVDid:CVE-2017-5689

Trust: 3.8

db:BIDid:98269

Trust: 2.0

db:SIEMENSid:SSA-874235

Trust: 2.0

db:CERT/CCid:VU#491375

Trust: 1.9

db:SECTRACKid:1038385

Trust: 1.7

db:CNNVDid:CNNVD-201705-136

Trust: 0.9

db:CNVDid:CNVD-2017-05856

Trust: 0.8

db:ICS CERTid:ICSA-17-180-01A

Trust: 0.8

db:JVNid:JVNVU92793783

Trust: 0.8

db:JVNDBid:JVNDB-2017-002923

Trust: 0.8

db:PACKETSTORMid:156782

Trust: 0.6

db:ICS CERTid:ICSA-17-180-01

Trust: 0.3

db:LENOVOid:LEN-14963

Trust: 0.3

db:IVDid:408EBF9C-6BA3-4489-B364-1B4677311268

Trust: 0.2

db:PACKETSTORMid:142693

Trust: 0.2

db:SEEBUGid:SSVID-93070

Trust: 0.1

db:EXPLOIT-DBid:43385

Trust: 0.1

db:VULHUBid:VHN-113892

Trust: 0.1

db:VULMONid:CVE-2017-5689

Trust: 0.1

sources: IVD: 408ebf9c-6ba3-4489-b364-1b4677311268 // CERT/CC: VU#491375 // CNVD: CNVD-2017-05856 // VULHUB: VHN-113892 // VULMON: CVE-2017-5689 // BID: 98269 // JVNDB: JVNDB-2017-002923 // PACKETSTORM: 142693 // CNNVD: CNNVD-201705-136 // NVD: CVE-2017-5689

REFERENCES

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00075&languageid=en-fr

Trust: 3.3

url:https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability

Trust: 2.5

url:https://www.embedi.com/files/white-papers/silent-bob-is-silent.pdf

Trust: 2.5

url:http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Trust: 2.0

url:http://www.securityfocus.com/bid/98269

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf

Trust: 1.7

url:https://downloadmirror.intel.com/26754/eng/intel-sa-00075%20mitigation%20guide-rev%201.1.pdf

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20170509-0001/

Trust: 1.7

url:https://www.embedi.com/news/mythbusters-cve-2017-5689

Trust: 1.7

url:http://www.securitytracker.com/id/1038385

Trust: 1.7

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03754en_us

Trust: 1.6

url:https://support.lenovo.com/us/en/product_security/len-14963

Trust: 1.1

url:https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-874235.pdf

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/491375

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5689

Trust: 0.9

url:https://downloadcenter.intel.com/download/26754

Trust: 0.8

url:https://www.ssh.com/vulnerability/intel-amt/

Trust: 0.8

url:https://software.intel.com/sites/default/files/article/393789/amt-9-start-here-guide.pdf

Trust: 0.8

url:http://download.intel.com/support/motherboards/desktop/sb/intel_mebx_user_guide_for_7series.pdf

Trust: 0.8

url:https://www.symantec.com/connect/articles/why-must-intel-amt-be-configured-and-what-required

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/284.html

Trust: 0.8

url:http://en.community.dell.com/techcenter/extras/m/white_papers/20443937

Trust: 0.8

url:https://support.f5.com/csp/article/k94700053

Trust: 0.8

url:https://sp.ts.fujitsu.com/dmsp/publications/public/intel-firmware-vulnerability-update-of-fujitsu-ccd-products.pdf

Trust: 0.8

url:https://www.hpe.com/us/en/services/security-vulnerability.html

Trust: 0.8

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk117218

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5689

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-17-180-01a

Trust: 0.8

url:http://jvn.jp/vu/jvnvu92793783/index.html

Trust: 0.8

url:https://www.embedi.com/news/what-you-need-know-about-intel-amt-vulnerability

Trust: 0.8

url:https://www.us-cert.gov/ncas/current-activity/2017/05/01/intel-firmware-vulnerability

Trust: 0.6

url:https://packetstormsecurity.com/files/156782/manually-exploiting-intel-amt.html

Trust: 0.6

url:http://www.intel.com/

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-180-01

Trust: 0.3

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03754en_us

Trust: 0.1

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00075&amp;languageid=en-fr

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/swd/public/detail?sp4ts.oid=1008772176&swite

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03754en_us

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

sources: CERT/CC: VU#491375 // CNVD: CNVD-2017-05856 // VULHUB: VHN-113892 // BID: 98269 // JVNDB: JVNDB-2017-002923 // PACKETSTORM: 142693 // CNNVD: CNNVD-201705-136 // NVD: CVE-2017-5689

CREDITS

Laxita Jain

Trust: 0.6

sources: CNNVD: CNNVD-201705-136

SOURCES

db:IVDid:408ebf9c-6ba3-4489-b364-1b4677311268
db:CERT/CCid:VU#491375
db:CNVDid:CNVD-2017-05856
db:VULHUBid:VHN-113892
db:VULMONid:CVE-2017-5689
db:BIDid:98269
db:JVNDBid:JVNDB-2017-002923
db:PACKETSTORMid:142693
db:CNNVDid:CNNVD-201705-136
db:NVDid:CVE-2017-5689

LAST UPDATE DATE

2024-11-23T22:45:39.957000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#491375date:2017-12-21T00:00:00
db:CNVDid:CNVD-2017-05856date:2017-05-09T00:00:00
db:VULHUBid:VHN-113892date:2020-02-18T00:00:00
db:VULMONid:CVE-2017-5689date:2020-02-18T00:00:00
db:BIDid:98269date:2017-07-19T15:07:00
db:JVNDBid:JVNDB-2017-002923date:2017-09-11T00:00:00
db:CNNVDid:CNNVD-201705-136date:2020-03-19T00:00:00
db:NVDid:CVE-2017-5689date:2024-11-21T03:28:13.573

SOURCES RELEASE DATE

db:IVDid:408ebf9c-6ba3-4489-b364-1b4677311268date:2017-05-03T00:00:00
db:CERT/CCid:VU#491375date:2017-05-02T00:00:00
db:CNVDid:CNVD-2017-05856date:2017-05-03T00:00:00
db:VULHUBid:VHN-113892date:2017-05-02T00:00:00
db:VULMONid:CVE-2017-5689date:2017-05-02T00:00:00
db:BIDid:98269date:2017-05-01T00:00:00
db:JVNDBid:JVNDB-2017-002923date:2017-05-09T00:00:00
db:PACKETSTORMid:142693date:2017-05-27T02:57:43
db:CNNVDid:CNNVD-201705-136date:2017-05-09T00:00:00
db:NVDid:CVE-2017-5689date:2017-05-02T14:59:00.520