The Intel® Management Engine on the remote host has Active Management Technology (AMT) enabled by default, and has self-reported the version for multiple vulnerabilities, including:
- Insufficient protection for credentials in Intel® AMT and Intel® Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access (CVE-2022-30601).
- Insufficient protection for credentials in Intel® AMT and Intel® Standard Manageability may allow a privileged user to potentially enable information disclosure via local access (CVE-2022-30944).
- Improper access control in firmware for Intel® AMT and Intel® Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access (CVE-2022-28697).
(Source: Tenable Nessus)
Since this is a critical severity issue, users are strongly advised to immediately apply the solutions to mitigate associated security risks.