Intel Management Engine Unspecified Multiple Vulnerabilities (INTEL-SA-00086)

high Nessus Plugin ID 104741

Synopsis

The management engine on the remote host is affected by multiple vulnerabilities.

Description

The Intel Management Engine on the remote host is affected by multiple buffer overflow and privilege escalation vulnerabilities.

Note that due to the low-level implementation of Intel ME, Nessus may not be able to identify its version on the remote host at this time.

Solution

Contact your system OEM for updated firmware per the vendor advisory.

Fixes are as follows:
- 6th Generation Intel® Core™ Processor Family - Intel® ME 11.8.50.3399
- 6th Gen X-Series Intel® CoreTM Processor - Intel® ME 11.11.50.1402
- 7th Generation Intel® Core™ Processor Family - Intel® ME 11.8.50.3399
- 7th Gen X-Series Intel® CoreTM Processor - Intel® ME 11.11.50.1402
- 8th Generation Intel® Core™ Processor Family - Intel® ME 11.8.50.3399
- Intel® Xeon® Processor E3-1200 v5 Product Family - Intel® ME 11.8.50.3399
- Intel® Xeon® Processor E3-1200 v6 Product Family - Intel® ME 11.8.50.3399
- Intel® Xeon® Processor Scalable Family - Intel® ME 11.21.50.1400
- Intel® Xeon® Processor W Family - Intel® ME 11.11.50.1402

See Also

http://www.nessus.org/u?f5c71de3

http://www.nessus.org/u?535f3ae4

Plugin Details

Severity: High

ID: 104741

File Name: wmi_INTEL-SA-00086.nbin

Version: 1.163

Type: local

Agent: windows

Family: Windows

Published: 11/22/2017

Updated: 11/12/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2017-5712

CVSS v3

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:intel:active_management_technology, cpe:/o:intel:active_management_technology_firmware

Required KB Items: Settings/ParanoidReport, SMB/Services/Enumerated, Intel/AMT/Enabled

Exploit Ease: No known exploits are available

Patch Publication Date: 11/20/2017

Vulnerability Publication Date: 11/20/2017

Reference Information

CVE: CVE-2017-5705, CVE-2017-5708, CVE-2017-5711, CVE-2017-5712

BID: 101917, 101918, 101920, 101921

IAVA: 2017-A-0348