var-201711-0647
Vulnerability from variot

Multiple privilege escalations in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow unauthorized process to access privileged content via unspecified vector. Intel Manageability Engine Firmware Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. An attacker could exploit the vulnerability to access privileged content. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. kernel is one of the kernels. The following products and versions are affected: Intel Manageability Engine Firmware Firmware Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0647",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.7"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.6"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.5"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.20"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.10"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.20"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "db": "BID",
        "id": "101921"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5708"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:intel:manageability_engine_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "101921"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-5708",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-5708",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2017-37850",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-113911",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2017-5708",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-5708",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-5708",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-37850",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-884",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-113911",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113911"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5708"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple privilege escalations in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow unauthorized process to access privileged content via unspecified vector. Intel Manageability Engine Firmware Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Manageability Engine The Intel Management Engine is Intel\u0027s thermal management driver for its desktop family of chipsets. An attacker could exploit the vulnerability to access privileged content. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. kernel is one of the kernels. The following products and versions are affected: Intel Manageability Engine Firmware Firmware Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-5708"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "db": "BID",
        "id": "101921"
      },
      {
        "db": "IVD",
        "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113911"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-5708",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "101921",
        "trust": 2.6
      },
      {
        "db": "SECTRACK",
        "id": "1039852",
        "trust": 1.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-892715",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-884",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-060-01",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "E2E04452-39AB-11E9-BF1E-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-113911",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113911"
      },
      {
        "db": "BID",
        "id": "101921"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5708"
      }
    ]
  },
  "id": "VAR-201711-0647",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113911"
      }
    ],
    "trust": 1.4769231
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:53:37.857000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "INTEL-SA-00086",
        "trust": 0.8,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr"
      },
      {
        "title": "NTAP-20171120-0001",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20171120-0001/"
      },
      {
        "title": "Intel Manageability Engine has multiple patches for local privilege escalation vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/111459"
      },
      {
        "title": "Multiple Intel product Manageability Engine Firmware Fixes for permission permissions and access control vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76616"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-264",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-113911"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5708"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086\u0026languageid=en-fr"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/101921"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://security.netapp.com/advisory/ntap-20171120-0001/"
      },
      {
        "trust": 1.7,
        "url": "https://www.asus.com/news/wzeltg5cjyaiwgj0"
      },
      {
        "trust": 1.7,
        "url": "https://www.synology.com/support/security/synology_sa_17_73"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039852"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5708"
      },
      {
        "trust": 0.8,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-18-060-01"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5708"
      },
      {
        "trust": 0.3,
        "url": "http://www.intel.com/content/www/us/en/homepage.html"
      },
      {
        "trust": 0.1,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086\u0026amp;languageid=en-fr"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113911"
      },
      {
        "db": "BID",
        "id": "101921"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5708"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113911"
      },
      {
        "db": "BID",
        "id": "101921"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5708"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-12-22T00:00:00",
        "db": "IVD",
        "id": "e2e04452-39ab-11e9-bf1e-000c29342cb1"
      },
      {
        "date": "2017-12-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "date": "2017-11-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113911"
      },
      {
        "date": "2017-11-20T00:00:00",
        "db": "BID",
        "id": "101921"
      },
      {
        "date": "2017-12-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      },
      {
        "date": "2017-11-21T14:29:00.400000",
        "db": "NVD",
        "id": "CVE-2017-5708"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-12-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-37850"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113911"
      },
      {
        "date": "2017-12-19T22:37:00",
        "db": "BID",
        "id": "101921"
      },
      {
        "date": "2019-07-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      },
      {
        "date": "2024-11-21T03:28:15.910000",
        "db": "NVD",
        "id": "CVE-2017-5708"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "101921"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Intel Manageability Engine Firmware Vulnerabilities related to authorization, permissions, and access control",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010522"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control issues",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-884"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.