First published: Wed Dec 18 2019(Updated: )
Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Active Management Technology Firmware | >=11.0<11.8.70 | |
Intel Active Management Technology Firmware | >=11.10<11.11.70 | |
Intel Active Management Technology Firmware | >=11.20<11.22.70 | |
Intel Active Management Technology Firmware | >=12.0<12.0.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11132 is a vulnerability in the subsystem in Intel(R) AMT that allows a privileged user to potentially enable escalation of privilege via network access.
Versions 11.0 to 11.8.70, 11.10 to 11.11.70, 11.20 to 11.22.70, and 12.0 to 12.0.45 of Intel Active Management Technology Firmware are affected by CVE-2019-11132.
CVE-2019-11132 has a severity rating of 8.4 out of 10 (high).
The CVE-2019-11132 vulnerability can be exploited through cross-site scripting (XSS) attacks.
You can find more information about CVE-2019-11132 on the Intel Security Center Advisory page: [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html)