Files
CVEs-PoC/2017/CVE-2017-5689.md
T
2025-09-29 21:09:30 +02:00

95 lines
4.8 KiB
Markdown

### [CVE-2017-5689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5689)
![](https://img.shields.io/static/v1?label=Product&message=Intel%20Active%20Mangement%20Technology%2C%20Intel%20Small%20Business%20Technology%2C%20Intel%20Standard%20Manageability&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=fixed%20in%20versions%206.2.61.3535%2C%207.1.91.3272%2C%208.1.71.3608%2C%209.1.41.3024%2C%2010.0.55.3000%2C%2011.0.25.3001%2C%20and%2011.6.27.3264%20and%20later%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Escalation%20of%20Privilege&color=brightgreen)
### Description
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability
#### Github
- https://github.com/0x00er/ShodanOSINT
- https://github.com/189569400/SecurityProduct
- https://github.com/20MH1A04H9/Cyber-Security-Projects
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/AidoWedo/Awesome-Honeypots
- https://github.com/BIOS-iEngineer/HUANANZHI-X99-F8
- https://github.com/BIOS-iEngineer/HUANANZHI-X99-TF
- https://github.com/Bijaye/intel_amt_bypass
- https://github.com/CerberusSecurity/CVE-2017-5689
- https://github.com/ChoKyuWon/amt_auth_bypass
- https://github.com/Correia-jpv/fucking-awesome-honeypots
- https://github.com/Darupz/shodandork
- https://github.com/H4CK3RT3CH/Shodan-Dork2
- https://github.com/Hackinfinity/Honey-Pots-
- https://github.com/Jelbk/honeypot
- https://github.com/Mehedi-Babu/Shodan_dork
- https://github.com/Mehedi-Babu/honeypots_cyber
- https://github.com/Milkmange/ShodanOSINT
- https://github.com/MlSebrell/amthoneypot
- https://github.com/Nieuport/-awesome-honeypots-
- https://github.com/Ondrik8/-Security
- https://github.com/One87snuff/One87Snuff
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Pasyware/Honeypot_Projects
- https://github.com/RootUp/AutoSploit
- https://github.com/Shirshakhtml/Useful-Dorks
- https://github.com/SnowflAI/ShodanOSINT
- https://github.com/SoumyaJas2324/-jakejarvis-awesome-shodan-queries-
- https://github.com/TheWay-hue/CVE-2017-5689-Checker
- https://github.com/aprendeDELOShackers/Dorking
- https://github.com/arunima-rastogi-1/honeypots
- https://github.com/baonq-me/cve2017-5689
- https://github.com/bartblaze/Disable-Intel-AMT
- https://github.com/birdhan/SecurityProduct
- https://github.com/birdhan/Security_Product
- https://github.com/embedi/amt_auth_bypass_poc
- https://github.com/eric-erki/awesome-honeypots
- https://github.com/exxncatin/ShodanOSINT
- https://github.com/flyingfishfuse/Intel_IME_WebUI_bypass
- https://github.com/gauss77/honeypot
- https://github.com/haxrob/amthoneypot
- https://github.com/intel/INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools
- https://github.com/investlab/Awesome-honeypots
- https://github.com/krishpranav/autosploit
- https://github.com/lnick2023/nicenice
- https://github.com/lothos612/shodan
- https://github.com/m5anksc0des/san_honeypot_resources
- https://github.com/mjg59/mei-amt-check
- https://github.com/n0-traces/cve_monitor
- https://github.com/nixawk/labs
- https://github.com/nullfuzz-pentest/shodan-dorks
- https://github.com/oneplus-x/MS17-010
- https://github.com/paralax/awesome-honeypots
- https://github.com/paulocmarques/HUANANZHI-X99-F8
- https://github.com/paulveillard/cybersecurity-honeypots
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qince1455373819/awesome-honeypots
- https://github.com/r3p3r/paralax-awesome-honeypots
- https://github.com/referefref/referefref
- https://github.com/sagervrma/ShodanOSINT
- https://github.com/sankitanitdgp/san_honeypot_resources
- https://github.com/scriptzteam/Awesome-Shodan-Queries
- https://github.com/scriptzteam/Shodan-Dorks
- https://github.com/sharifbinmostafa/honeypots
- https://github.com/syedhafiz1234/honeypot-list
- https://github.com/t666/Honeypot
- https://github.com/tareqxploit/shodan-dork.txt
- https://github.com/thecatdidit/HPEliteBookTools
- https://github.com/tristisranae/shodan_queries
- https://github.com/unnideeraj/article_backdoor
- https://github.com/vikipetrov96/HUANANZHI-X99-TF
- https://github.com/webshell1414/honey
- https://github.com/wisoez/Awesome-honeypots
- https://github.com/x1sec/amthoneypot
- https://github.com/xbl3/awesome-cve-poc_qazbnm456