{"api_version":"1","generated_at":"2026-04-23T01:52:25+00:00","cve":"CVE-2017-5689","urls":{"html":"https://cve.report/CVE-2017-5689","api":"https://cve.report/api/cve/CVE-2017-5689.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-5689","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-5689"},"summary":{"title":"CVE-2017-5689","description":"An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).","state":"PUBLISHED","assigner":"intel","published_at":"2017-05-02 14:59:00","updated_at":"2026-04-22 16:06:47"},"problem_types":["NVD-CWE-noinfo","CWE-269","Escalation of Privilege","CWE-269 CWE-269 Improper Privilege Management"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability","name":"https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Technical Description","Third Party Advisory"],"title":"Rediscovering the Intel AMT Vulnerability - Blog | Tenable™","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr","name":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Intel® Product Security Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/98269","name":"http://www.securityfocus.com/bid/98269","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Multiple Intel Products CVE-2017-5689 Privilege Escalation Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://security.netapp.com/advisory/ntap-20170509-0001/","name":"https://security.netapp.com/advisory/ntap-20170509-0001/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"CVE-2017-5689 Intel Management Engine Vulnerability in Multiple NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5689","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5689","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.embedi.com/news/mythbusters-cve-2017-5689","name":"https://www.embedi.com/news/mythbusters-cve-2017-5689","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"MythBusters: CVE-2017-5689 – Embedi","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf","name":"https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Exploit","Technical Description","Third Party Advisory"],"title":"Online Casino Harmony Central. 99 Free Spins & 200% Bonus!","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf","name":"https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"","mime":"inode/x-empty","httpstatus":"404","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1038385","name":"http://www.securitytracker.com/id/1038385","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Intel Active Management Technology Authentication Flaw Lets Remote and Local Users Gain Elevated Privileges - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2017","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us","name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"HPE Support document - HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-5689","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5689","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Intel Corporation","product":"Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability","version":"affected fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later","platforms":[]}],"timeline":[{"source":"ADP","time":"2022-01-28T00:00:00.000Z","lang":"en","value":"CVE-2017-5689 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"hpe","cpe5":"proliant_ml10_gen9_server","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"hpe","cpe5":"proliant_ml10_gen9_server_firmware","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_field_pg_m3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_field_pg_m3_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_field_pg_m4","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_field_pg_m4_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_field_pg_m5","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_field_pg_m5_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc477d","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc477d_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc477d_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"pro","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc477e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc477e_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc547d","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc547d_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc547e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc547e_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc547g","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc547g_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc627c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc627c_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc627d","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc627d_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc647c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc647c_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc647d","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc647d_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc677c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc677c_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc677d","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc677d_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc827c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc827c_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc827d","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc827d_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc847c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc847c_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_ipc847d","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_ipc847d_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_itp1000","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5689","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_itp1000_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2017","cve_id":"5689","cve":"CVE-2017-5689","vendorProject":"Intel","product":"Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability","vulnerabilityName":"Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability","dateAdded":"2022-01-28","shortDescription":"Intel products contain a vulnerability which can allow attackers to perform privilege escalation.","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-07-28","knownRansomwareCampaignUse":"Unknown","notes":"https://nvd.nist.gov/vuln/detail/CVE-2017-5689","cwes":"","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:11"},"epss":{"cve_year":"2017","cve_id":"5689","cve":"CVE-2017-5689","epss":"0.941940000","percentile":"0.999220000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:16"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-05T15:11:48.401Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf"},{"name":"98269","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/98269"},{"name":"1038385","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1038385"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20170509-0001/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.embedi.com/news/mythbusters-cve-2017-5689"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2017-5689","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-02-07T13:43:44.728208Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2022-01-28","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5689"},"type":"kev"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-269","description":"CWE-269 Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-10-21T23:55:41.384Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5689"}],"timeline":[{"lang":"en","time":"2022-01-28T00:00:00.000Z","value":"CVE-2017-5689 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability","vendor":"Intel Corporation","versions":[{"status":"affected","version":"fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later"}]}],"datePublic":"2017-05-01T00:00:00.000Z","descriptions":[{"lang":"en","value":"An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)."}],"problemTypes":[{"descriptions":[{"description":"Escalation of Privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-02-10T14:06:25.000Z","orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability"},{"tags":["x_refsource_CONFIRM"],"url":"https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf"},{"name":"98269","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/98269"},{"name":"1038385","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1038385"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20170509-0001/"},{"tags":["x_refsource_MISC"],"url":"https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf"},{"tags":["x_refsource_CONFIRM"],"url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"tags":["x_refsource_MISC"],"url":"https://www.embedi.com/news/mythbusters-cve-2017-5689"},{"tags":["x_refsource_CONFIRM"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2017-5689","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability","version":{"version_data":[{"version_value":"fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later"}]}}]},"vendor_name":"Intel Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Escalation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability","refsource":"MISC","url":"https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability"},{"name":"https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf","refsource":"CONFIRM","url":"https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf"},{"name":"98269","refsource":"BID","url":"http://www.securityfocus.com/bid/98269"},{"name":"1038385","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1038385"},{"name":"https://security.netapp.com/advisory/ntap-20170509-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20170509-0001/"},{"name":"https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf","refsource":"MISC","url":"https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf"},{"name":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr","refsource":"CONFIRM","url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr"},{"name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"name":"https://www.embedi.com/news/mythbusters-cve-2017-5689","refsource":"MISC","url":"https://www.embedi.com/news/mythbusters-cve-2017-5689"},{"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf","refsource":"CONFIRM","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"}]}}}},"cveMetadata":{"assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","assignerShortName":"intel","cveId":"CVE-2017-5689","datePublished":"2017-05-02T14:00:00.000Z","dateReserved":"2017-02-01T00:00:00.000Z","dateUpdated":"2025-10-21T23:55:41.384Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2017-05-02 14:59:00","lastModifiedDate":"2026-04-22 16:06:47","problem_types":["NVD-CWE-noinfo","CWE-269","Escalation of Privilege","CWE-269 CWE-269 Improper Privilege Management"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hpe:proliant_ml10_gen9_server_firmware:5.0:*:*:*:*:*:*:*","matchCriteriaId":"5ABEA07C-9E91-4937-9F6C-A687B2F946A1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hpe:proliant_ml10_gen9_server:-:*:*:*:*:*:*:*","matchCriteriaId":"64EDAC0B-39A9-41FF-99AA-66A4422EFE53"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"F7D6FF34-5C5C-485B-AC78-DE20BA01DAD5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*","matchCriteriaId":"187C6D51-5B86-484D-AE0F-26D1C9465580"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"E4EAE137-9336-43D6-AF8A-9161F236BD14"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*","matchCriteriaId":"D8F37D88-E086-4060-8420-BD0F8D8FF580"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"B5C3B3FD-7CF7-4172-87EC-11C129D5508A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*","matchCriteriaId":"687E1212-EC5A-47BA-ACAB-74F6C98B7C34"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"6C37BC27-C5B9-4740-BDFE-9439FB248CE6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*","matchCriteriaId":"E6D87239-40C1-4038-B734-D77AC4DDD571"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"3C5DA136-7541-44E4-B8DF-065CEE065A99"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*","matchCriteriaId":"1FFD2D72-5464-4B86-BACB-61F55A081C3A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"4F0583DE-EBB9-41C7-92C9-4E4E259F28B8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*","matchCriteriaId":"057D9947-CE4A-4B4C-B721-4B29FB71350C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"EC70C5D2-748E-4D6C-ADC9-ED098541C8F1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*","matchCriteriaId":"E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*","matchCriteriaId":"D0EF28FB-BAB3-4710-9D25-25F67ACADC60"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*","matchCriteriaId":"E752006C-6D94-4B14-B3A5-C9BB94141BDB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"042B60E7-0614-4EB3-8B47-07DEE5B5E274"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*","matchCriteriaId":"509AD120-3465-4C00-AAB3-B6F6ED708B51"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"BBC1791E-E3B5-4B75-B816-9EE20F44D9D6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*","matchCriteriaId":"CD1A57A9-F6E5-4672-BD22-09EF5522CA10"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"11.0.26.3000","matchCriteriaId":"124ED9B8-BA17-4204-BD5B-3F94558A6531"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*","matchCriteriaId":"9EB339B5-602F-4AB5-9998-465FDC6ABD6C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"2CD389CE-AA26-445D-8D2B-27D3D06C3B68"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*","matchCriteriaId":"D9DD4A97-1648-4C7F-A5A0-6899BD13A617"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"7.1.91.3272","matchCriteriaId":"42E364B9-1FC7-418A-860D-DD0E73DD930E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*","matchCriteriaId":"9DCF5972-C72D-4DE9-8B73-3C497D54596B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"21.01.05","matchCriteriaId":"7E311214-74E6-449F-A446-B14A498D85E9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*","matchCriteriaId":"FDF9D4C3-1892-48FA-95B4-835B636A4005"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:-:*:*:*","matchCriteriaId":"BCC01671-A79A-423E-BD61-9056AE5CD240"},{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:pro:*:*:*","matchCriteriaId":"4B4A9C1C-6105-455B-9639-7EE02AF05B60"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*","matchCriteriaId":"754A6744-5194-4A99-BD3B-944A8707C80F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"A15E9E54-0414-4C67-9DCD-181FCF2EE838"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*","matchCriteriaId":"C6127C45-E91E-46B7-A806-FC0068575DB5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"18.01.06","matchCriteriaId":"A4487A96-6AF1-4F41-9FF7-ED711FB89FA4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*","matchCriteriaId":"7ADAD919-32C1-49D2-A419-C9A803DB6250"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"22.01.03","matchCriteriaId":"8319D59A-6F4A-488D-B13F-90D70B448706"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*","matchCriteriaId":"506DEE00-30D2-4E29-9645-757EB8778C0F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"042B60E7-0614-4EB3-8B47-07DEE5B5E274"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*","matchCriteriaId":"509AD120-3465-4C00-AAB3-B6F6ED708B51"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"4F0583DE-EBB9-41C7-92C9-4E4E259F28B8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*","matchCriteriaId":"057D9947-CE4A-4B4C-B721-4B29FB71350C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc427e_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"21.01.04","matchCriteriaId":"190CD7FB-3FBA-4988-9759-7815BD1F5737"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc427e:-:*:*:*:*:*:*:*","matchCriteriaId":"60CEBBF4-221A-429E-8BE8-24899FFE6D36"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc547d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"7.1.91.3272","matchCriteriaId":"0CA84993-2A1C-4CDF-8AA3-BE5C95E7DFF8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc547d:-:*:*:*:*:*:*:*","matchCriteriaId":"8B7D8654-08B0-4FF8-907B-F081A8048C85"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc547e_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"8DB5E7FE-2FA2-429F-8A6C-5C3410562224"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc547e:-:*:*:*:*:*:*:*","matchCriteriaId":"5FBB1974-66F4-4F6B-85AB-7FE4B1BEC2E5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc547g_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"11.0.26.3000","matchCriteriaId":"4F9839B0-C214-4D84-AFD8-C5F9C14BEB4C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc547g:-:*:*:*:*:*:*:*","matchCriteriaId":"4DBE04AF-9130-43DE-A1CC-2AC66F2209DB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc627c_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"6DD13F29-4E0E-4AB4-AB37-130D4104AD8B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc627c:-:*:*:*:*:*:*:*","matchCriteriaId":"AF5275FF-588F-4337-97EF-A37522F07548"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc677c_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"F6BDFA2C-7D39-4179-A00D-92552F269158"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc677c:-:*:*:*:*:*:*:*","matchCriteriaId":"300E56DA-BB24-4877-8CF2-A049A979E31B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc647c_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"BBA440D3-93A9-4681-AF0E-8667DCF24E4B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc647c:-:*:*:*:*:*:*:*","matchCriteriaId":"6BE60199-D133-48EE-8124-6C798981E4A0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc647d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"9BC56331-2124-4446-94BD-EA6D551F193D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc647d:-:*:*:*:*:*:*:*","matchCriteriaId":"F75EE385-B1E7-4EC1-9383-73E1FA6F4AE7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc847c_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"7EEB6E29-CAA0-4EDB-9042-12B0C4D27558"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc847c:-:*:*:*:*:*:*:*","matchCriteriaId":"E8D39EF6-86A9-49F4-899A-F21D8619F24D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc847d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.41.3024","matchCriteriaId":"FB168E2D-A808-47D6-8B11-0308DAC118E8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc847d:-:*:*:*:*:*:*:*","matchCriteriaId":"3BC2AE90-7015-483A-805C-5BB6E84CAF29"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc427e_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"791C710D-472C-492C-AB83-87EFDE57E557"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc427e:-:*:*:*:*:*:*:*","matchCriteriaId":"60CEBBF4-221A-429E-8BE8-24899FFE6D36"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc547g_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"11.0.26.3000","matchCriteriaId":"4F9839B0-C214-4D84-AFD8-C5F9C14BEB4C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc547g:-:*:*:*:*:*:*:*","matchCriteriaId":"4DBE04AF-9130-43DE-A1CC-2AC66F2209DB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_pcs_7_ipc477d_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"56443C42-C990-4316-871F-8E2DA650C06E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_pcs_7_ipc477d:-:*:*:*:*:*:*:*","matchCriteriaId":"10F79553-5769-4814-B602-714F2E68A96A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*","matchCriteriaId":"46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"21.01.05","matchCriteriaId":"60A4F35F-96D5-4750-8597-5C4E74C690DE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*","matchCriteriaId":"A40D0CDB-7BE6-491F-B730-3B4E10CA159A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simotion_p320-4_s_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"17.02.06.83.1","matchCriteriaId":"310CC52F-1AE2-4319-93F5-185F492F2ABA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simotion_p320-4_s:-:*:*:*:*:*:*:*","matchCriteriaId":"4849FE93-67D0-496F-B47D-5035FF902540"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.61.3535","matchCriteriaId":"578D9CB9-6831-41C5-99C3-E1940562F118"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:sinumerik_pcu_50.5-p:-:*:*:*:*:*:*:*","matchCriteriaId":"A04BB605-3CD3-41FE-8CC6-F5D8B8650955"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:*","matchCriteriaId":"BD4D2787-FA10-4B06-BC00-B869FB16A424"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:6.1:*:*:*:*:*:*:*","matchCriteriaId":"C11D072B-B549-4352-B0E5-2E7C1923161E"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:6.2:*:*:*:*:*:*:*","matchCriteriaId":"EED42746-4191-4188-8BAD-4A23B4D6B242"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"52652BE3-F695-42FB-A6FF-4A51DBA6789B"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"BD06FA87-E538-4492-9031-068CA05E63CB"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:8.0:*:*:*:*:*:*:*","matchCriteriaId":"CFFABA0B-46E6-4F2B-BA13-A48BF2587F68"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:8.1:*:*:*:*:*:*:*","matchCriteriaId":"4290CDD9-8D27-46AD-BEFC-36827FA4A348"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:9.0:*:*:*:*:*:*:*","matchCriteriaId":"09936A93-41E2-4293-B88B-4B7ED4E6FD44"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:9.1:*:*:*:*:*:*:*","matchCriteriaId":"A8855E63-AE6C-44A7-A2FE-7E4791C69BD4"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:9.5:*:*:*:*:*:*:*","matchCriteriaId":"7E92AF85-322D-4587-B393-62172EA51D62"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:10.0:*:*:*:*:*:*:*","matchCriteriaId":"BF833CF3-0170-491D-AEDB-33003B35B47B"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:11.0:*:*:*:*:*:*:*","matchCriteriaId":"6C27CD90-E986-4A89-B63E-1E3D2C62FBB3"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:11.5:*:*:*:*:*:*:*","matchCriteriaId":"4B71755C-4B29-4947-A436-1658097CD3F6"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:active_management_technology_firmware:11.6:*:*:*:*:*:*:*","matchCriteriaId":"86388428-3285-4BC8-B0F2-2049B07711F0"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"5689","Ordinal":"1","Title":"CVE-2017-5689","CVE":"CVE-2017-5689","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"5689","Ordinal":"1","NoteData":"An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).","Type":"Description","Title":"CVE-2017-5689"},{"CveYear":"2017","CveId":"5689","Ordinal":"2","NoteData":"2017-05-02","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"5689","Ordinal":"3","NoteData":"2020-02-10","Type":"Other","Title":"Modified"}]}}}