# N/A
## 漏洞概述
未授权的网络攻击者可以获取受保护的Intel可管理性SKU(如Intel Active Management Technology (AMT) 和 Intel Standard Manageability (ISM))的系统权限。未授权的本地攻击者可以在Intel可管理性SKU(包括Intel Active Management Technology (AMT)、Intel Standard Manageability (ISM) 和 Intel Small Business Technology (SBT))上配置可管理性特性,从而获取未授权的网络或本地系统权限。
## 影响版本
- Intel Active Management Technology (AMT)
- Intel Standard Manageability (ISM)
- Intel Small Business Technology (SBT)
## 细节
- 网络攻击者能够通过未受保护的路径获取系统权限。
- 本地攻击者能够配置可管理性特性,从而获取未受保护的网络或本地系统权限。
## 影响
- 系统的安全性受到威胁。
- 使未授权的攻击者能够获得系统控制权,进行进一步的恶意活动。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/CerberusSecurity/CVE-2017-5689 | POC详情 |
2 | Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689 | https://github.com/haxrob/amthoneypot | POC详情 |
3 | simple python poc for CVE-2017-5689 | https://github.com/Bijaye/intel_amt_bypass | POC详情 |
4 | CVE-2017-5689 Proof-of-Concept exploit | https://github.com/embedi/amt_auth_bypass_poc | POC详情 |
5 | None | https://github.com/TheWay-hue/CVE-2017-5689-Checker | POC详情 |
6 | None | https://github.com/lapis33/CVE-2017-5689 | POC详情 |
7 | Intel Active Management platforms are susceptible to authentication bypass. A non-privileged network attacker can gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability. A non-privileged local attacker can provision manageability features, gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology. The issue has been observed in versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 for all three platforms. Versions before 6 and after 11.6 are not impacted. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-5689.yaml | POC详情 |
8 | Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689 | https://github.com/MlSebrell/amthoneypot | POC详情 |
暂无评论