
Η Intel released yesterday on updates Platform Update for September 2020, which correct nine issues security. One of these issues is one Critical vulnerability affecting Active Management Technology (AMT) and Intel Standard Manageability (ISM) platforms.
The Intel ATM is part of it Intel vPro, and is mainly used by IT Ops teams for remote corporate network retrieval, correction and management /systems.
These issues were discussed in five notifications published by Intel on Product Security Center which included tips for safety.
Intel provides lists of vulnerabilities products, tips and contact information at the end of each notification. Contact details are given so that users be able to report other issues security which may affect the products or technology of Intel.

Vulnerability on Active Management Technology (AMT)
The vulnerability in AMT is defined as CVE-2020-8758 and has been rated by Intel as critical security issue (CVSS rating: 9,8). Vulnerability can allow the attacker to gradually gain more privileges in vulnerable systems in order to gain access in places you normally should not.
The vulnerability is due to inappropriate restrictions on temporary storage data in the network subsystem and could allow unauthorized users to “eventually acquire more rights throughout the corporate network".
All Intel AMT and Intel ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 are vulnerable into a attacks who can take advantage of vulnerability CVE-2020-8758. Fortunately, the vulnerability does not appear to have been exploited by cybercriminals at this time.
In June, Intel fixed two other critical vulnerabilities in AMT (CVE-2020-0594 and CVE-2020-0595), with a CVSS score of 9,8.
Intel Platform Update September 2020
The current Intel security updates are listed in the table below, with information on the severity of the vulnerabilities so that users which updates should be given priority.
Advisory | Advisory ID | Severity rating | CVSS Range |
Intel AMT and Intel ISM Advisory | INTEL-SA-00404 | CRITICAL | 7.8-9.8 |
Intel Driver & Support Assistant Advisory | INTEL-SA-00405 | MEDIUM | 4.4 |
Intel BIOS Advisory | INTEL-SA-00356 | MEDIUM | 2.0-5.1 |
Intel BIOS Advisory | INTEL-SA-00347 | HIGH | 5.5-7.6 |
Intel recommends that users check the download links provided in the notifications or contact their system manufacturers and operating system vendors to find out how they can receive these updates.
Intel has not found any evidence that the above vulnerabilities have been exploited by hackers. However, it advises users install new security updates as soon as possible to prevent possible future ones attacks.