Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-5689

KEV EPSS 94.19% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-5689

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Intel产品安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Intel Management Engine(ME)是美国英特尔(Intel)公司的一个管理引擎,能够远程管理计算机。Intel Active Management Technology (AMT)、Intel Standard Manageability (ISM)和Intel Small Business Technology (SBT)都是其中的组件。 多款Intel产品中存在安全漏洞。攻击者可利用该漏洞获取系统权限。以下产品受到影响:Intel Active Management Technol
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Intel CorporationIntel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later -

II. Public POCs for CVE-2017-5689

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/CerberusSecurity/CVE-2017-5689POC Details
2Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689https://github.com/haxrob/amthoneypotPOC Details
3simple python poc for CVE-2017-5689https://github.com/Bijaye/intel_amt_bypassPOC Details
4CVE-2017-5689 Proof-of-Concept exploithttps://github.com/embedi/amt_auth_bypass_pocPOC Details
5Nonehttps://github.com/TheWay-hue/CVE-2017-5689-CheckerPOC Details
6Nonehttps://github.com/lapis33/CVE-2017-5689POC Details
7Intel Active Management platforms are susceptible to authentication bypass. A non-privileged network attacker can gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability. A non-privileged local attacker can provision manageability features, gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology. The issue has been observed in versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 for all three platforms. Versions before 6 and after 11.6 are not impacted. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-5689.yamlPOC Details
8Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689https://github.com/MlSebrell/amthoneypotPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-5689

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2017-5689

No comments yet


Leave a comment