#VU63077 Input validation error in Intel Manageability Commander


Published: 2022-05-11

Vulnerability identifier: #VU63077

Vulnerability risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-0126

CWE-ID: CWE-20

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Intel Manageability Commander
Client/Desktop applications / Software for system administration

Vendor: Intel

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote authenticated user can send specially crafted traffic to the system and execute arbitrary code with elevated privileges.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Intel Manageability Commander: 1.0 - 2.1


External links
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00519.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability