First published: Mon Jun 15 2020(Updated: )
Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Active Management Technology Firmware | >=11.0<11.8.77 | |
Intel Active Management Technology Firmware | >=11.10<11.12.77 | |
Intel Active Management Technology Firmware | >=11.20<11.22.77 | |
Intel Active Management Technology Firmware | >=12.0<12.0.64 | |
Intel Service Manager | >=11.0<11.8.77 | |
Intel Service Manager | >=11.10<11.12.77 | |
Intel Service Manager | >=11.20<11.22.77 | |
Intel Service Manager | >=12.0<12.0.64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-0596.
The severity of CVE-2020-0596 is high with a score of 7.5.
Intel Active Management Technology Firmware versions before 11.8.77, 11.12.77, 11.22.77, and 12.0.64, as well as Intel Service Manager versions before 11.8.77, 11.12.77, 11.22.77, and 12.0.64 are affected by CVE-2020-0596.
An unauthenticated user can potentially enable information disclosure via network access by exploiting the improper input validation in the DHCPv6 subsystem of Intel AMT and Intel ISM.
You can find more information about CVE-2020-0596 at the following references: [Reference 1](https://security.netapp.com/advisory/ntap-20200611-0007/), [Reference 2](https://support.lenovo.com/de/en/product_security/len-30041), [Reference 3](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html).