Vulnerabilities (CVE)

Filtered by vendor Intel Subscribe
Filtered by product Endpoint Management Assistant
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-45128 1 Intel 1 Endpoint Management Assistant 2023-12-10 N/A 5.5 MEDIUM
Improper authorization in the Intel(R) EMA software before version 1.9.0.0 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2022-38056 1 Intel 1 Endpoint Management Assistant 2023-12-10 N/A 5.3 MEDIUM
Improper neutralization in the Intel(R) EMA software before version 1.8.1.0 may allow a privileged user to potentially enable escalation of privilege via network access.
CVE-2022-26341 1 Intel 3 Active Management Technology Software Development Kit, Endpoint Management Assistant, Manageability Commander 2023-12-10 N/A 8.8 HIGH
Insufficiently protected credentials in software in Intel(R) AMT SDK before version 16.0.4.1, Intel(R) EMA before version 1.7.1 and Intel(R) MC before version 2.3.2 may allow an authenticated user to potentially enable escalation of privilege via network access.
CVE-2022-30297 1 Intel 1 Endpoint Management Assistant 2023-12-10 N/A 7.8 HIGH
Cross-site scripting in the Intel(R) EMA software before version 1.8.0 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2021-0013 1 Intel 1 Endpoint Management Assistant 2023-12-10 5.0 MEDIUM 7.5 HIGH
Improper input validation for Intel(R) EMA before version 1.5.0 may allow an unauthenticated user to potentially enable denial of service via network access.
CVE-2020-12316 1 Intel 1 Endpoint Management Assistant 2023-12-10 2.1 LOW 5.5 MEDIUM
Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access.
CVE-2020-12315 1 Intel 1 Endpoint Management Assistant 2023-12-10 7.5 HIGH 9.8 CRITICAL
Path traversal in the Intel(R) EMA before version 1.3.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access.