First published: Thu Nov 12 2020(Updated: )
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Active Management Technology Firmware | <11.8.80 | |
Intel Active Management Technology Firmware | >=11.12.0<11.12.80 | |
Intel Active Management Technology Firmware | >=11.22.0<11.22.80 | |
Intel Active Management Technology Firmware | >=12.0<12.0.70 | |
Intel Active Management Technology Firmware | >=14.0<14.0.45 | |
netapp cloud backup | ||
Intel Standard Manageability | <11.8.80 | |
Intel Standard Manageability | >=11.12.0<11.12.80 | |
Intel Standard Manageability | >=11.22.0<11.22.80 | |
Intel Standard Manageability | >=12.0<12.0.70 | |
Intel Standard Manageability | >=14.0<14.0.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8754 is rated as a medium severity vulnerability.
To fix CVE-2020-8754, upgrade your Intel AMT or ISM firmware to the latest versions as specified in the advisory.
CVE-2020-8754 affects Intel Active Management Technology and Intel Standard Manageability firmware versions prior to specified updates.
CVE-2020-8754 may allow unauthenticated users to potentially enable information disclosure via network access.
To verify vulnerability to CVE-2020-8754, check the firmware version of your Intel AMT or ISM against the versions listed in the vulnerability description.