A potential security vulnerability in the Intel® Active Management Technology (AMT) SDK, Intel® Endpoint Management Assistant (EMA) and Intel® Manageability Commander (MC) may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability.
CVEID: CVE-2022-26341
Description: Insufficiently protected credentials in software in Intel® AMT SDK before version 16.0.4.1, Intel® EMA before version 1.7.1 and Intel® MC before version 2.3.2 may allow an authenticated user to potentially enable escalation of privilege via network access.
CVSS Base Score: 8.2 High
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N****
Intel® AMT SDK before version 16.0.4.1.
Intel® EMA before version 1.7.1.
Intel® MC before version 2.3.2.
For software using the Intel Management Redirection SDK (IMRSDK) Library within the Intel® AMT SDK, Intel recommends updating it to version 16.0.4.1.
Intel recommends updating Intel® EMA to version 1.7.1 and Intel® MC to version 2.3.2 or later.
Updates are available at:
Intel® EMA: <https://www.intel.com/content/www/us/en/download/19449/intel-endpoint-management-assistant-intel-ema.html>
Intel® MC: <https://www.intel.com/content/www/us/en/download/18796/intel-manageability-commander.html>
This issue was found internally by Intel employees. Intel would like to thank Yossef Kuszer.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.