Endpoint Management Assistant Intel Endpoint Management Assistant

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Intel Endpoint Management Assistant.

By the Year

In 2026 there have been 1 vulnerability in Intel Endpoint Management Assistant. Endpoint Management Assistant did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.




Year Vulnerabilities Average Score
2026 1 0.00
2025 0 0.00
2024 0 0.00
2023 2 5.40
2022 2 8.30
2021 1 7.50
2020 2 0.00

It may take a day or so for new Endpoint Management Assistant vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Intel Endpoint Management Assistant Security Vulnerabilities

Privilege Escalation in Intel EMA <1.14.5 via Input Validation
CVE-2025-35990 - May 12, 2026

Improper input validation for some Intel Endpoint Management Assistant (EMA) software before version 1.14.5 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Improper Input Validation

Intel EMA <=1.9.0.0 Improper Auth Enables Local DoS
CVE-2022-45128 5.5 - Medium - May 10, 2023

Improper authorization in the Intel(R) EMA software before version 1.9.0.0 may allow an authenticated user to potentially enable denial of service via local access.

AuthZ

Intel EMA <=1.8.1.0 Priv Escal via Improper Neutralization
CVE-2022-38056 5.3 - Medium - February 16, 2023

Improper neutralization in the Intel(R) EMA software before version 1.8.1.0 may allow a privileged user to potentially enable escalation of privilege via network access.

Intel EMA <1.8.0: XSS that can lead to privilege escalation
CVE-2022-30297 7.8 - High - November 11, 2022

Cross-site scripting in the Intel(R) EMA software before version 1.8.0 may allow a privileged user to potentially enable escalation of privilege via local access.

XSS

Intel AMT SDK, EMA, MC pre-v16.0.4.1,1.7.1,2.3.2 - Credential Leak
CVE-2022-26341 8.8 - High - November 11, 2022

Insufficiently protected credentials in software in Intel(R) AMT SDK before version 16.0.4.1, Intel(R) EMA before version 1.7.1 and Intel(R) MC before version 2.3.2 may allow an authenticated user to potentially enable escalation of privilege via network access.

Insufficiently Protected Credentials

Improper input validation for Intel(R) EMA before version 1.5.0 may
CVE-2021-0013 7.5 - High - November 17, 2021

Improper input validation for Intel(R) EMA before version 1.5.0 may allow an unauthenticated user to potentially enable denial of service via network access.

Improper Input Validation

Path traversal in the Intel(R) EMA before version 1.3.3 may
CVE-2020-12315 - November 12, 2020

Path traversal in the Intel(R) EMA before version 1.3.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may
CVE-2020-12316 - November 12, 2020

Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Intel Endpoint Management Assistant or by Intel? Click the Watch button to subscribe.

Intel
Vendor

subscribe