First published: Mon Jun 15 2020(Updated: )
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Active Management Technology Firmware | >=11.0<11.8.77 | |
Intel Active Management Technology Firmware | >=11.10<11.12.77 | |
Intel Active Management Technology Firmware | >=11.20<11.22.77 | |
Intel Active Management Technology Firmware | >=12.0<12.0.64 | |
Intel Service Manager | >=11.0<11.8.77 | |
Intel Service Manager | >=11.10<11.12.77 | |
Intel Service Manager | >=11.20<11.22.77 | |
Intel Service Manager | >=12.0<12.0.64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0594 is a vulnerability in the IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77, and 12.0.64 that may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CVE-2020-0594 has a severity rating of 9.8 (Critical).
Intel Active Management Technology Firmware versions before 11.8.77, 11.12.77, 11.22.77, and 12.0.64, as well as Intel Service Manager versions before 11.8.77, 11.12.77, 11.22.77, and 12.0.64 are affected by CVE-2020-0594.
An unauthenticated user can potentially exploit CVE-2020-0594 through network access, enabling escalation of privilege.
You can find more information about CVE-2020-0594 in the following references: [1] NetApp Security Advisory [2] Lenovo Product Security [3] Intel Security Advisory