Lucene search

K
f5F5F5:K42117350
HistoryJun 21, 2019 - 12:00 a.m.

K42117350 : Intel-SA-00213: Intel CSME, Intel SPS, Intel TXE, Intel DAL, and Intel AMT vulnerabilities

2019-06-2100:00:00
my.f5.com
24

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.1 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

62.5%

Security Advisory Description

In May 2019, Intel announced the discovery of multiple vulnerabilities with Intel technology. To review Intel-SA-00213, the complete announcement, refer to the following link:

Intel CSME, Intel SPS, Intel TXE, Intel DAL, and Intel AMT 2019.1 QSR Advisory

Note: The previous link takes you to a resource outside of AskF5. The third party could remove the document without our knowledge.

Traffix SDC is the only F5 product affected by the vulnerabilities listed in Intel-SA-00213. To locate relevant F5 Security Advisory articles for these vulnerabilities, refer to the following table. F5 Technical Support has no additional information on these issues.

Article

K84591451: Intel AMT vulnerabilities CVE-2019-0092, CVE-2019-0094, CVE-2019-0097, and CVE-2019-0096
K35815741: Intel CSME and TXE vulnerability CVE-2019-0086
K47234311: Intel SPS vulnerability CVE-2019-0089
K59145983: Intel CSME and SPS vulnerability CVE-2019-0090
K21423526: Intel CSME and TXE vulnerability CVE-2019-0091
K13710800: Intel CSME and SPS vulnerability CVE-2019-0093
K10522033: Intel CSME and TXE vulnerability CVE-2019-0098
K30105730: Intel SPS vulnerability CVE-2019-0099
K71265658: Intel CSME vulnerability CVE-2019-0153
K51470205: Intel DAL vulnerability CVE-2019-0170

Note: This is a temporary index. When articles have been published for all of the CVEs listed in the previous table, this article may no longer be maintained, may be repurposed, or may be archived without advanced notice.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.1 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

62.5%