尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Intel Corporation | Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability | fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/CerberusSecurity/CVE-2017-5689 | POC详情 |
| 2 | Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689 | https://github.com/haxrob/amthoneypot | POC详情 |
| 3 | simple python poc for CVE-2017-5689 | https://github.com/Bijaye/intel_amt_bypass | POC详情 |
| 4 | CVE-2017-5689 Proof-of-Concept exploit | https://github.com/embedi/amt_auth_bypass_poc | POC详情 |
| 5 | None | https://github.com/TheWay-hue/CVE-2017-5689-Checker | POC详情 |
| 6 | None | https://github.com/lapis33/CVE-2017-5689 | POC详情 |
| 7 | Intel Active Management platforms are susceptible to authentication bypass. A non-privileged network attacker can gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability. A non-privileged local attacker can provision manageability features, gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology. The issue has been observed in versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 for all three platforms. Versions before 6 and after 11.6 are not impacted. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-5689.yaml | POC详情 |
| 8 | Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689 | https://github.com/MlSebrell/amthoneypot | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论