Intel Standard Manageability
By the Year
In 2024 there have been 0 vulnerabilities in Intel Standard Manageability . Standard Manageability did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 3 | 7.37 |
2021 | 0 | 0.00 |
2020 | 4 | 8.65 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Standard Manageability vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Intel Standard Manageability Security Vulnerabilities
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may
CVE-2022-30944
5.5 - Medium
- August 18, 2022
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.
Insufficiently Protected Credentials
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may
CVE-2022-30601
9.8 - Critical
- August 18, 2022
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
Insufficiently Protected Credentials
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may
CVE-2022-28697
6.8 - Medium
- August 18, 2022
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may
CVE-2020-8752
9.8 - Critical
- November 12, 2020
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
Memory Corruption
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may
CVE-2020-8753
7.5 - High
- November 12, 2020
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
Out-of-bounds Read
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may
CVE-2020-8754
7.5 - High
- November 12, 2020
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
Out-of-bounds Read
Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may
CVE-2020-8758
9.8 - Critical
- September 10, 2020
Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Intel Active Management Technology Firmware or by Intel? Click the Watch button to subscribe.