Page 10 of 49 results (0.023 seconds)

CVSS: 7.4EPSS: 0%CPEs: 41EXPL: 0

Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle. Vulnerabilidad de reproducción de tramas en el subsistema Wi-Fi en productos Intel Dual-Band y Tri-Band Wireless-AC permite que un atacante remoto reproduzca tramas mediante un ataque Man-in-the-Middle (MitM) basado en canales. • https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr •

CVSS: 4.9EPSS: 0%CPEs: 6EXPL: 0

Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges. El sistema anti-rollback de Intel Active Management Technology, Intel Standard Manageability e Intel Small Business Technology en sus versiones 11.0.25.3001 y 11.0.26.3000 no evita que se actualice el firmware a la versión 11.6.x.1xxx, la cual es vulnerable a CVE-2017-5689. Esto puede llevarlo a cabo un usuario local con privilegios de administrador. • https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page. Protección insuficiente contra el secuestro de la acción click en la Interfaz de usuario web de Intel AMT versiones de firmware anteriores a 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205 y 11.6.25.1129, que potencialmente permiten a un atacante remoto secuestrar los cliqueos web de los usuarios por medio de la página web especialmente diseñada. • https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVSS: 10.0EPSS: 97%CPEs: 14EXPL: 4

An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT). Un atacante de red sin privilegios podría alcanzar privilegios del sistema para aprovisionar SKUs de administrabilidad Intel: Intel Active Management Technology (AMT) e Intel Standard Manageability (ISM). Un atacante local sin privilegios podría aprovisionar características de administrabilidad alcanzando privilegios de red o sistema local no privilegiados en SKUs de administrabilidad de Intel: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) e Intel Small Business Technology (SBT). Intel products contain a vulnerability which can allow attackers to perform privilege escalation. • https://www.exploit-db.com/exploits/43385 https://github.com/CerberusSecurity/CVE-2017-5689 https://github.com/TheWay-hue/CVE-2017-5689-Checker http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.securityfocus.com/bid/98269 http://www.securitytracker.com/id/1038385 https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf https://h20566.www2.hpe.com/hpsc& •