Potential security vulnerabilities in the Intel® Endpoint Management Assistant (EMA) may allow escalation of privilege or information disclosure.** **Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2020-12315
Description: Path traversal in the Intel® EMA before version 1.3.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CVSS Base Score: 8.6 High
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CVEID: CVE-2020-12316
Description: Insufficiently protected credentials in the Intel® EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access.
CVSS Base Score: 3.3 Low
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Intel® EMA before version 1.3.3.
Intel recommends updating the Intel® EMA to version 1.3.3 or later.
Updates are available for download at this location: <https://downloadcenter.intel.com/download/28994/Intel-Endpoint-Management-Assistant-Intel-EMA->
These issues were found externally.****
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.