Intel Products Multiple Vulnerabilities
Release Date:
10 Nov 2021
5653
Views
RISK: Medium Risk
TYPE: Clients - Productivity Products
Multiple vulnerabilities were identified in Intel Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system.
Impact
- Denial of Service
- Elevation of Privilege
- Information Disclosure
System / Technologies affected
- 10th Generation Intel® Core™ Processors
- 11th Generation Intel® Core™ Processors
- 3rd Generation Intel® Xeon® Scalable Processors
- 7th Generation Intel® Core™ Processors
- Intel® Atom® Processor A Series
- Intel® Atom® Processor C3000
- Intel® Atom® Processor E3900 Series
- Intel® Celeron® Processor J Series, N Series
- Intel® Celeron® Processor N Series
- Intel® Core™ i5-8305G Processor with Radeon™ RX Vega M GL graphics before version 21.10
- Intel® Core™ i7-8706G Processor with Radeon™ RX Vega M GL graphics before version 21.10
- Intel® Core™ X-series Processors
- Intel® EMA before version 1.5.0
- Intel® Graphics Driver for Windows® 10 64-bit for NUC8i7HNK, NUC8i7HVK before version 21.10
- Intel® Pentium® Processor J Series, N Series
- Intel® Pentium® Processor N Series
- Intel® Pentium® Processor Silver Series/ J&N Series
- Intel® Pentium® Processor Silver Series/ J&N Series - Refresh
- Intel® Pentium® Silver Processor Series
- Intel® Xeon® Processor E Family
- Intel® Xeon® Processor E3 v6 Family
- Intel® Xeon® Processor W Family
Solutions
Before installation of the software, please visit the software manufacturer website for more details.
- The vendor has issued a fix:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00562.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00482.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00481.html
Vulnerability Identifier
- CVE-2020-12892
- CVE-2020-12893
- CVE-2020-12894
- CVE-2020-12895
- CVE-2020-12897
- CVE-2020-12898
- CVE-2020-12899
- CVE-2020-12900
- CVE-2020-12901
- CVE-2020-12902
- CVE-2020-12903
- CVE-2020-12904
- CVE-2020-12905
- CVE-2020-12963
- CVE-2020-12964
- CVE-2020-12980
- CVE-2020-12981
- CVE-2020-12982
- CVE-2020-12983
- CVE-2020-12985
- CVE-2020-12986
- CVE-2020-12987
- CVE-2021-0013
- CVE-2021-0146
- CVE-2021-0157
- CVE-2021-0158
- CVE-2021-33105
Source
Related Link
- https://www.auscert.org.au/bulletins/ESB-2021.3735
- https://www.auscert.org.au/bulletins/ESB-2021.3726
- https://www.auscert.org.au/bulletins/ESB-2021.3724
- https://www.auscert.org.au/bulletins/ESB-2021.3722
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00562.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00482.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00481.html
Share with