First published: Thu Nov 12 2020(Updated: )
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Active Management Technology Firmware | <11.8.80 | |
Intel Active Management Technology Firmware | >=11.12.0<11.12.80 | |
Intel Active Management Technology Firmware | >=11.22.0<11.22.80 | |
Intel Active Management Technology Firmware | >=12.0<12.0.70 | |
Intel Active Management Technology Firmware | >=14.0<14.0.45 | |
Intel Standard Manageability | <11.8.80 | |
Intel Standard Manageability | >=11.12.0<11.12.80 | |
Intel Standard Manageability | >=11.22.0<11.22.80 | |
Intel Standard Manageability | >=12.0<12.0.70 | |
Intel Standard Manageability | >=14.0<14.0.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8753 has been classified as a high-severity vulnerability due to its potential for information disclosure.
To remediate CVE-2020-8753, upgrade your Intel AMT or Intel ISM firmware to the latest version specified in the advisory.
CVE-2020-8753 affects users of Intel AMT and Intel ISM prior to the specified firmware versions.
CVE-2020-8753 is an out-of-bounds read vulnerability that can lead to unauthorized information disclosure.
Yes, CVE-2020-8753 can potentially be exploited by an unauthenticated user via network access.