CVE-2020-8747
📋 TL;DR
This vulnerability allows unauthenticated attackers to read memory outside intended boundaries in Intel AMT subsystems, potentially enabling information disclosure or denial of service. Affected systems include Intel AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, and 14.0.45.
💻 Affected Systems
- Intel Active Management Technology (AMT)
📦 What is this software?
Active Management Technology Firmware by Intel
View all CVEs affecting Active Management Technology Firmware →
Active Management Technology Firmware by Intel
View all CVEs affecting Active Management Technology Firmware →
Active Management Technology Firmware by Intel
View all CVEs affecting Active Management Technology Firmware →
Active Management Technology Firmware by Intel
View all CVEs affecting Active Management Technology Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote attackers could leak sensitive memory contents including credentials, encryption keys, or system information, potentially leading to full system compromise.
Likely Case
Information disclosure of system memory contents and potential denial of service through system crashes.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external access to AMT interfaces.
🎯 Exploit Status
The vulnerability requires network access to AMT interfaces but no authentication, making exploitation straightforward for attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 11.8.80, 11.12.80, 11.22.80, 12.0.70, or 14.0.45 depending on platform
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391
Restart Required: Yes
Instructions:
1. Identify affected systems using Intel AMT. 2. Download appropriate firmware update from Intel. 3. Apply firmware update following Intel's instructions. 4. Reboot system to complete installation.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to Intel AMT management interfaces
Configure firewall rules to block external access to AMT ports (typically 16992-16995, 623)
Disable AMT
allDisable Intel AMT if not required
Access BIOS/UEFI settings and disable Intel AMT/Intel vPro features
🧯 If You Can't Patch
- Implement strict network segmentation to isolate AMT interfaces from untrusted networks
- Disable AMT functionality entirely if not required for business operations
🔍 How to Verify
Check if Vulnerable:
Check Intel AMT firmware version via Intel Management Engine Interface or system BIOS/UEFI
Check Version:
On Windows: wmic /namespace:\\root\Intel_ME_AMT path Intel_ME_System get Version
Verify Fix Applied:
Verify firmware version is updated to patched versions: 11.8.80, 11.12.80, 11.22.80, 12.0.70, or 14.0.45
📡 Detection & Monitoring
Log Indicators:
- Unusual access attempts to AMT management ports
- System crashes or instability related to AMT services
Network Indicators:
- Traffic to AMT ports (16992-16995, 623) from unexpected sources
- Unusual outbound traffic patterns after AMT access
SIEM Query:
source_port=16992 OR source_port=16993 OR source_port=16994 OR source_port=16995 OR source_port=623