Vulnerabilites related to siemens - simatic_pcs_7_ipc847c_firmware
Vulnerability from fkie_nvd
Published
2017-05-02 14:59
Modified
2025-04-20 01:37
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
References
secure@intel.comhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlPatch, Third Party Advisory
secure@intel.comhttp://www.securityfocus.com/bid/98269Third Party Advisory, VDB Entry, Broken Link
secure@intel.comhttp://www.securitytracker.com/id/1038385Third Party Advisory, VDB Entry, Broken Link
secure@intel.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdfThird Party Advisory
secure@intel.comhttps://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdfBroken Link
secure@intel.comhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_usThird Party Advisory
secure@intel.comhttps://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-frPatch, Vendor Advisory
secure@intel.comhttps://security.netapp.com/advisory/ntap-20170509-0001/Third Party Advisory
secure@intel.comhttps://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdfExploit, Technical Description, Third Party Advisory, Broken Link
secure@intel.comhttps://www.embedi.com/news/mythbusters-cve-2017-5689Third Party Advisory, Broken Link
secure@intel.comhttps://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerabilityTechnical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/98269Third Party Advisory, VDB Entry, Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1038385Third Party Advisory, VDB Entry, Broken Link
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdfBroken Link
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-frPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20170509-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdfExploit, Technical Description, Third Party Advisory, Broken Link
af854a3a-2127-422b-91ae-364da2661108https://www.embedi.com/news/mythbusters-cve-2017-5689Third Party Advisory, Broken Link
af854a3a-2127-422b-91ae-364da2661108https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerabilityTechnical Description, Third Party Advisory
Impacted products
Vendor Product Version
hpe proliant_ml10_gen9_server_firmware 5.0
hpe proliant_ml10_gen9_server -
siemens simatic_itp1000_firmware *
siemens simatic_itp1000 -
siemens simatic_ipc847d_firmware *
siemens simatic_ipc847d -
siemens simatic_ipc847c_firmware *
siemens simatic_ipc847c -
siemens simatic_ipc827d_firmware *
siemens simatic_ipc827d -
siemens simatic_ipc827c_firmware *
siemens simatic_ipc827c -
siemens simatic_ipc677d_firmware *
siemens simatic_ipc677d -
siemens simatic_ipc677c_firmware *
siemens simatic_ipc677c -
siemens simatic_ipc647d_firmware *
siemens simatic_ipc647d -
siemens simatic_ipc647c_firmware *
siemens simatic_ipc647c -
siemens simatic_ipc627d_firmware *
siemens simatic_ipc627d -
siemens simatic_ipc627c_firmware *
siemens simatic_ipc627c -
siemens simatic_ipc547g_firmware *
siemens simatic_ipc547g -
siemens simatic_ipc547e_firmware *
siemens simatic_ipc547e -
siemens simatic_ipc547d_firmware *
siemens simatic_ipc547d -
siemens simatic_ipc477e_firmware *
siemens simatic_ipc477e -
siemens simatic_ipc477d_firmware -
siemens simatic_ipc477d_firmware -
siemens simatic_ipc477d -
siemens simatic_field_pg_m3_firmware *
siemens simatic_field_pg_m3 -
siemens simatic_field_pg_m4_firmware *
siemens simatic_field_pg_m4 -
siemens simatic_field_pg_m5_firmware *
siemens simatic_field_pg_m5 -
siemens simatic_ipc627d_firmware *
siemens simatic_ipc627d -
siemens simatic_ipc677d_firmware *
siemens simatic_ipc677d -
siemens simatic_pcs_7_ipc427e_firmware *
siemens simatic_pcs_7_ipc427e -
siemens simatic_pcs_7_ipc547d_firmware *
siemens simatic_pcs_7_ipc547d -
siemens simatic_pcs_7_ipc547e_firmware *
siemens simatic_pcs_7_ipc547e -
siemens simatic_pcs_7_ipc547g_firmware *
siemens simatic_pcs_7_ipc547g -
siemens simatic_pcs_7_ipc627c_firmware *
siemens simatic_pcs_7_ipc627c -
siemens simatic_pcs_7_ipc677c_firmware *
siemens simatic_pcs_7_ipc677c -
siemens simatic_pcs_7_ipc647c_firmware *
siemens simatic_pcs_7_ipc647c -
siemens simatic_pcs_7_ipc647d_firmware *
siemens simatic_pcs_7_ipc647d -
siemens simatic_pcs_7_ipc847c_firmware *
siemens simatic_pcs_7_ipc847c -
siemens simatic_pcs_7_ipc847d_firmware *
siemens simatic_pcs_7_ipc847d -
siemens simatic_pcs_7_ipc427e_firmware -
siemens simatic_pcs_7_ipc427e -
siemens simatic_pcs_7_ipc547g_firmware *
siemens simatic_pcs_7_ipc547g -
siemens simatic_pcs_7_ipc477d_firmware -
siemens simatic_pcs_7_ipc477d -
siemens simatic_ipc427d_firmware -
siemens simatic_ipc427d -
siemens simatic_ipc427e_firmware *
siemens simatic_ipc427e -
siemens simotion_p320-4_s_firmware *
siemens simotion_p320-4_s -
siemens sinumerik_pcu50.5-p_firmware *
siemens sinumerik_pcu_50.5-p -
intel active_management_technology_firmware 6.0
intel active_management_technology_firmware 6.1
intel active_management_technology_firmware 6.2
intel active_management_technology_firmware 7.0
intel active_management_technology_firmware 7.1
intel active_management_technology_firmware 8.0
intel active_management_technology_firmware 8.1
intel active_management_technology_firmware 9.0
intel active_management_technology_firmware 9.1
intel active_management_technology_firmware 9.5
intel active_management_technology_firmware 10.0
intel active_management_technology_firmware 11.0
intel active_management_technology_firmware 11.5
intel active_management_technology_firmware 11.6



{
  "cisaActionDue": "2022-07-28",
  "cisaExploitAdd": "2022-01-28",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:proliant_ml10_gen9_server_firmware:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABEA07C-9E91-4937-9F6C-A687B2F946A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml10_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDAC0B-39A9-41FF-99AA-66A4422EFE53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7D6FF34-5C5C-485B-AC78-DE20BA01DAD5",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4EAE137-9336-43D6-AF8A-9161F236BD14",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C3B3FD-7CF7-4172-87EC-11C129D5508A",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "687E1212-EC5A-47BA-ACAB-74F6C98B7C34",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C37BC27-C5B9-4740-BDFE-9439FB248CE6",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5DA136-7541-44E4-B8DF-065CEE065A99",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FFD2D72-5464-4B86-BACB-61F55A081C3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E752006C-6D94-4B14-B3A5-C9BB94141BDB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "042B60E7-0614-4EB3-8B47-07DEE5B5E274",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD1A57A9-F6E5-4672-BD22-09EF5522CA10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "124ED9B8-BA17-4204-BD5B-3F94558A6531",
              "versionEndExcluding": "11.0.26.3000",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD389CE-AA26-445D-8D2B-27D3D06C3B68",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42E364B9-1FC7-418A-860D-DD0E73DD930E",
              "versionEndExcluding": "7.1.91.3272",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DCF5972-C72D-4DE9-8B73-3C497D54596B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E311214-74E6-449F-A446-B14A498D85E9",
              "versionEndExcluding": "21.01.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:-:*:*:*",
              "matchCriteriaId": "BCC01671-A79A-423E-BD61-9056AE5CD240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:pro:*:*:*",
              "matchCriteriaId": "4B4A9C1C-6105-455B-9639-7EE02AF05B60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A15E9E54-0414-4C67-9DCD-181FCF2EE838",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6127C45-E91E-46B7-A806-FC0068575DB5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4",
              "versionEndExcluding": "18.01.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8319D59A-6F4A-488D-B13F-90D70B448706",
              "versionEndExcluding": "22.01.03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "042B60E7-0614-4EB3-8B47-07DEE5B5E274",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc427e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "190CD7FB-3FBA-4988-9759-7815BD1F5737",
              "versionEndExcluding": "21.01.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc427e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60CEBBF4-221A-429E-8BE8-24899FFE6D36",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc547d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CA84993-2A1C-4CDF-8AA3-BE5C95E7DFF8",
              "versionEndExcluding": "7.1.91.3272",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc547d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B7D8654-08B0-4FF8-907B-F081A8048C85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc547e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB5E7FE-2FA2-429F-8A6C-5C3410562224",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc547e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBB1974-66F4-4F6B-85AB-7FE4B1BEC2E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc547g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F9839B0-C214-4D84-AFD8-C5F9C14BEB4C",
              "versionEndExcluding": "11.0.26.3000",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc547g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBE04AF-9130-43DE-A1CC-2AC66F2209DB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc627c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD13F29-4E0E-4AB4-AB37-130D4104AD8B",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc627c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF5275FF-588F-4337-97EF-A37522F07548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc677c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6BDFA2C-7D39-4179-A00D-92552F269158",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc677c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "300E56DA-BB24-4877-8CF2-A049A979E31B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc647c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBA440D3-93A9-4681-AF0E-8667DCF24E4B",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc647c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BE60199-D133-48EE-8124-6C798981E4A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc647d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC56331-2124-4446-94BD-EA6D551F193D",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc647d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75EE385-B1E7-4EC1-9383-73E1FA6F4AE7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc847c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EEB6E29-CAA0-4EDB-9042-12B0C4D27558",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc847c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D39EF6-86A9-49F4-899A-F21D8619F24D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc847d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB168E2D-A808-47D6-8B11-0308DAC118E8",
              "versionEndExcluding": "9.1.41.3024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc847d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC2AE90-7015-483A-805C-5BB6E84CAF29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc427e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "791C710D-472C-492C-AB83-87EFDE57E557",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc427e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60CEBBF4-221A-429E-8BE8-24899FFE6D36",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc547g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F9839B0-C214-4D84-AFD8-C5F9C14BEB4C",
              "versionEndExcluding": "11.0.26.3000",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc547g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBE04AF-9130-43DE-A1CC-2AC66F2209DB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc477d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56443C42-C990-4316-871F-8E2DA650C06E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc477d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10F79553-5769-4814-B602-714F2E68A96A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A4F35F-96D5-4750-8597-5C4E74C690DE",
              "versionEndExcluding": "21.01.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simotion_p320-4_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "310CC52F-1AE2-4319-93F5-185F492F2ABA",
              "versionEndExcluding": "17.02.06.83.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simotion_p320-4_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4849FE93-67D0-496F-B47D-5035FF902540",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "578D9CB9-6831-41C5-99C3-E1940562F118",
              "versionEndExcluding": "6.2.61.3535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:sinumerik_pcu_50.5-p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A04BB605-3CD3-41FE-8CC6-F5D8B8650955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4D2787-FA10-4B06-BC00-B869FB16A424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11D072B-B549-4352-B0E5-2E7C1923161E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED42746-4191-4188-8BAD-4A23B4D6B242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "52652BE3-F695-42FB-A6FF-4A51DBA6789B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD06FA87-E538-4492-9031-068CA05E63CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFFABA0B-46E6-4F2B-BA13-A48BF2587F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4290CDD9-8D27-46AD-BEFC-36827FA4A348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "09936A93-41E2-4293-B88B-4B7ED4E6FD44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8855E63-AE6C-44A7-A2FE-7E4791C69BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E92AF85-322D-4587-B393-62172EA51D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF833CF3-0170-491D-AEDB-33003B35B47B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C27CD90-E986-4A89-B63E-1E3D2C62FBB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B71755C-4B29-4947-A436-1658097CD3F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "86388428-3285-4BC8-B0F2-2049B07711F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)."
    },
    {
      "lang": "es",
      "value": "Un atacante de red sin privilegios podr\u00eda alcanzar privilegios del sistema para aprovisionar SKUs de administrabilidad Intel: Intel Active Management Technology (AMT) e Intel Standard Manageability (ISM). Un atacante local sin privilegios podr\u00eda aprovisionar caracter\u00edsticas de administrabilidad alcanzando privilegios de red o sistema local no privilegiados en SKUs de administrabilidad de Intel: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) e Intel Small Business Technology (SBT)."
    }
  ],
  "id": "CVE-2017-5689",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2017-05-02T14:59:00.520",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry",
        "Broken Link"
      ],
      "url": "http://www.securityfocus.com/bid/98269"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry",
        "Broken Link"
      ],
      "url": "http://www.securitytracker.com/id/1038385"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20170509-0001/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Exploit",
        "Technical Description",
        "Third Party Advisory",
        "Broken Link"
      ],
      "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory",
        "Broken Link"
      ],
      "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry",
        "Broken Link"
      ],
      "url": "http://www.securityfocus.com/bid/98269"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry",
        "Broken Link"
      ],
      "url": "http://www.securitytracker.com/id/1038385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20170509-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Technical Description",
        "Third Party Advisory",
        "Broken Link"
      ],
      "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "Broken Link"
      ],
      "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

CVE-2017-5689 (GCVE-0-2017-5689)
Vulnerability from cvelistv5
Published
2017-05-02 14:00
Modified
2025-07-30 01:46
Severity ?
CWE
  • Escalation of Privilege
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
Impacted products
Vendor Product Version
Intel Corporation Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability Version: fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:11:48.401Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf"
          },
          {
            "name": "98269",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98269"
          },
          {
            "name": "1038385",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038385"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20170509-0001/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2017-5689",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-07T13:43:44.728208Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2022-01-28",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5689"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-269",
                "description": "CWE-269 Improper Privilege Management",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-30T01:46:28.623Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "timeline": [
          {
            "lang": "en",
            "time": "2022-01-28T00:00:00+00:00",
            "value": "CVE-2017-5689 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability",
          "vendor": "Intel Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later"
            }
          ]
        }
      ],
      "datePublic": "2017-05-01T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-10T14:06:25.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf"
        },
        {
          "name": "98269",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98269"
        },
        {
          "name": "1038385",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038385"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20170509-0001/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2017-5689",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability",
              "refsource": "MISC",
              "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability"
            },
            {
              "name": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf",
              "refsource": "CONFIRM",
              "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf"
            },
            {
              "name": "98269",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98269"
            },
            {
              "name": "1038385",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038385"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20170509-0001/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20170509-0001/"
            },
            {
              "name": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf",
              "refsource": "MISC",
              "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf"
            },
            {
              "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr",
              "refsource": "CONFIRM",
              "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr"
            },
            {
              "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us"
            },
            {
              "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
            },
            {
              "name": "https://www.embedi.com/news/mythbusters-cve-2017-5689",
              "refsource": "MISC",
              "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2017-5689",
    "datePublished": "2017-05-02T14:00:00.000Z",
    "dateReserved": "2017-02-01T00:00:00.000Z",
    "dateUpdated": "2025-07-30T01:46:28.623Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}