Intel Endpoint Management Assistant
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Intel Endpoint Management Assistant.
By the Year
In 2026 there have been 1 vulnerability in Intel Endpoint Management Assistant. Endpoint Management Assistant did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 2 | 5.40 |
| 2022 | 2 | 8.30 |
| 2021 | 1 | 7.50 |
| 2020 | 2 | 0.00 |
It may take a day or so for new Endpoint Management Assistant vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Intel Endpoint Management Assistant Security Vulnerabilities
Privilege Escalation in Intel EMA <1.14.5 via Input Validation
CVE-2025-35990
- May 12, 2026
Improper input validation for some Intel Endpoint Management Assistant (EMA) software before version 1.14.5 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Improper Input Validation
Intel EMA <=1.9.0.0 Improper Auth Enables Local DoS
CVE-2022-45128
5.5 - Medium
- May 10, 2023
Improper authorization in the Intel(R) EMA software before version 1.9.0.0 may allow an authenticated user to potentially enable denial of service via local access.
AuthZ
Intel EMA <=1.8.1.0 Priv Escal via Improper Neutralization
CVE-2022-38056
5.3 - Medium
- February 16, 2023
Improper neutralization in the Intel(R) EMA software before version 1.8.1.0 may allow a privileged user to potentially enable escalation of privilege via network access.
Intel EMA <1.8.0: XSS that can lead to privilege escalation
CVE-2022-30297
7.8 - High
- November 11, 2022
Cross-site scripting in the Intel(R) EMA software before version 1.8.0 may allow a privileged user to potentially enable escalation of privilege via local access.
XSS
Intel AMT SDK, EMA, MC pre-v16.0.4.1,1.7.1,2.3.2 - Credential Leak
CVE-2022-26341
8.8 - High
- November 11, 2022
Insufficiently protected credentials in software in Intel(R) AMT SDK before version 16.0.4.1, Intel(R) EMA before version 1.7.1 and Intel(R) MC before version 2.3.2 may allow an authenticated user to potentially enable escalation of privilege via network access.
Insufficiently Protected Credentials
Improper input validation for Intel(R) EMA before version 1.5.0 may
CVE-2021-0013
7.5 - High
- November 17, 2021
Improper input validation for Intel(R) EMA before version 1.5.0 may allow an unauthenticated user to potentially enable denial of service via network access.
Improper Input Validation
Path traversal in the Intel(R) EMA before version 1.3.3 may
CVE-2020-12315
- November 12, 2020
Path traversal in the Intel(R) EMA before version 1.3.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may
CVE-2020-12316
- November 12, 2020
Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Intel Endpoint Management Assistant or by Intel? Click the Watch button to subscribe.