An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
Published 2017-05-02 14:59:01
Updated 2020-02-18 17:12:16
View at NVD,   CVE.org

CVE-2017-5689 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageabilit
CISA required action:
Apply updates per vendor instructions.
CISA description:
Intel products contain a vulnerability which can allow attackers to perform privilege escalation.
Added on 2022-01-28 Action due date 2022-07-28

Exploit prediction scoring system (EPSS) score for CVE-2017-5689

Probability of exploitation activity in the next 30 days: 97.40%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2017-5689

  • Intel AMT Digest Authentication Bypass Scanner
    Disclosure Date: 2017-05-05
    First seen: 2020-04-26
    auxiliary/scanner/http/intel_amt_digest_bypass
    This module scans for Intel Active Management Technology endpoints and attempts to bypass authentication using a blank HTTP digest (CVE-2017-5689). This service can be found on ports 16992, 16993 (tls), 623, and 624 (tls). Authors: - hdm <x@hdm.io>

CVSS scores for CVE-2017-5689

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
10.0
HIGH AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

References for CVE-2017-5689

Products affected by CVE-2017-5689

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!