支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2017-5689 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
多款Intel产品安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Intel Management Engine(ME)是美国英特尔(Intel)公司的一个管理引擎,能够远程管理计算机。Intel Active Management Technology (AMT)、Intel Standard Manageability (ISM)和Intel Small Business Technology (SBT)都是其中的组件。 多款Intel产品中存在安全漏洞。攻击者可利用该漏洞获取系统权限。以下产品受到影响:Intel Active Management Technol
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Intel CorporationIntel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later -
二、漏洞 CVE-2017-5689 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/CerberusSecurity/CVE-2017-5689POC详情
2Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689https://github.com/haxrob/amthoneypotPOC详情
3simple python poc for CVE-2017-5689https://github.com/Bijaye/intel_amt_bypassPOC详情
4CVE-2017-5689 Proof-of-Concept exploithttps://github.com/embedi/amt_auth_bypass_pocPOC详情
5Nonehttps://github.com/TheWay-hue/CVE-2017-5689-CheckerPOC详情
6Nonehttps://github.com/lapis33/CVE-2017-5689POC详情
7Intel Active Management platforms are susceptible to authentication bypass. A non-privileged network attacker can gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability. A non-privileged local attacker can provision manageability features, gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology. The issue has been observed in versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 for all three platforms. Versions before 6 and after 11.6 are not impacted. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-5689.yamlPOC详情
8Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689https://github.com/MlSebrell/amthoneypotPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2017-5689 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2017-5689 的评论

暂无评论


发表评论