Page 9 of 42 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page. Protección insuficiente contra el secuestro de la acción click en la Interfaz de usuario web de Intel AMT versiones de firmware anteriores a 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205 y 11.6.25.1129, que potencialmente permiten a un atacante remoto secuestrar los cliqueos web de los usuarios por medio de la página web especialmente diseñada. • https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVSS: 10.0EPSS: 97%CPEs: 14EXPL: 4

An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT). Un atacante de red sin privilegios podría alcanzar privilegios del sistema para aprovisionar SKUs de administrabilidad Intel: Intel Active Management Technology (AMT) e Intel Standard Manageability (ISM). Un atacante local sin privilegios podría aprovisionar características de administrabilidad alcanzando privilegios de red o sistema local no privilegiados en SKUs de administrabilidad de Intel: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) e Intel Small Business Technology (SBT). Intel products contain a vulnerability which can allow attackers to perform privilege escalation. • https://www.exploit-db.com/exploits/43385 https://github.com/CerberusSecurity/CVE-2017-5689 https://github.com/TheWay-hue/CVE-2017-5689-Checker http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.securityfocus.com/bid/98269 http://www.securitytracker.com/id/1038385 https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf https://h20566.www2.hpe.com/hpsc& •