First published: Thu Sep 10 2020(Updated: )
Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Standard Manageability | >=11.8<11.8.79 | |
Intel Standard Manageability | >=11.12<11.12.79 | |
Intel Standard Manageability | >=11.22<11.22.79 | |
Intel Standard Manageability | >=12.0<12.0.68 | |
Intel Standard Manageability | >=14.0<14.0.39 | |
Intel Active Management Technology Firmware | >=11.8<11.8.79 | |
Intel Active Management Technology Firmware | >=11.12<11.12.79 | |
Intel Active Management Technology Firmware | >=11.22<11.22.79 | |
Intel Active Management Technology Firmware | >=12.0<12.0.68 | |
Intel Active Management Technology Firmware | >=14.0<14.0.39 | |
Netapp Steelstore Cloud Integrated Storage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-8758.
The severity of CVE-2020-8758 is critical with a score of 9.8.
Intel AMT and Intel ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68, and 14.0.39 are affected by CVE-2020-8758.
CVE-2020-8758 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
You can find more information about CVE-2020-8758 at the following references: [Netapp Security Advisory](https://security.netapp.com/advisory/ntap-20200911-0005/) and [Intel Security Advisory](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html).