CVE-2017-5729
https://notcve.org/view.php?id=CVE-2017-5729
Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle. Vulnerabilidad de reproducción de tramas en el subsistema Wi-Fi en productos Intel Dual-Band y Tri-Band Wireless-AC permite que un atacante remoto reproduzca tramas mediante un ataque Man-in-the-Middle (MitM) basado en canales. • https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr •
CVE-2017-5697
https://notcve.org/view.php?id=CVE-2017-5697
Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page. Protección insuficiente contra el secuestro de la acción click en la Interfaz de usuario web de Intel AMT versiones de firmware anteriores a 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205 y 11.6.25.1129, que potencialmente permiten a un atacante remoto secuestrar los cliqueos web de los usuarios por medio de la página web especialmente diseñada. • https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •
CVE-2017-5689 – Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2017-5689
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT). Un atacante de red sin privilegios podría alcanzar privilegios del sistema para aprovisionar SKUs de administrabilidad Intel: Intel Active Management Technology (AMT) e Intel Standard Manageability (ISM). Un atacante local sin privilegios podría aprovisionar características de administrabilidad alcanzando privilegios de red o sistema local no privilegiados en SKUs de administrabilidad de Intel: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) e Intel Small Business Technology (SBT). Intel products contain a vulnerability which can allow attackers to perform privilege escalation. • https://www.exploit-db.com/exploits/43385 https://github.com/CerberusSecurity/CVE-2017-5689 https://github.com/TheWay-hue/CVE-2017-5689-Checker http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.securityfocus.com/bid/98269 http://www.securitytracker.com/id/1038385 https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf https://h20566.www2.hpe.com/hpsc& •