Vulnerabilities > Intel > Active Management Technology Firmware > 12.0.63
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-06-15 | CVE-2020-0540 | Insufficiently Protected Credentials vulnerability in Intel Active Management Technology Firmware Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access. | 7.5 |
2020-06-15 | CVE-2020-0538 | Improper Input Validation vulnerability in Intel Active Management Technology Firmware Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access. | 7.5 |
2020-06-15 | CVE-2020-0537 | Improper Input Validation vulnerability in Intel Active Management Technology Firmware Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access. | 4.9 |
2020-06-15 | CVE-2020-0535 | Improper Input Validation vulnerability in Intel Active Management Technology Firmware Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access. | 5.3 |
2020-06-15 | CVE-2020-0532 | Improper Input Validation vulnerability in Intel Active Management Technology Firmware Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access. | 7.1 |
2020-06-15 | CVE-2020-0531 | Improper Input Validation vulnerability in Intel Active Management Technology Firmware Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access. | 6.5 |