Skip to main content

Intel Products Multiple Vulnerabilities

Release Date: 16 May 2024 3204 Views

RISK: Medium Risk

TYPE: Clients - Productivity Products

TYPE: Productivity Products

Multiple vulnerabilities were identified in Intel Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system.


Impact

  • Denial of Service
  • Elevation of Privilege
  • Information Disclosure

System / Technologies affected

  • Intel Agilex® 7 FPGAs and SoC FPGAs Firmware versions after 21.4
  • Intel® Agilex™ 7 FPGA and SoC FPGA product families
  • Intel Atom® Processor X Series
  • Intel® Atom® Processors C Series
  • Intel® BIOS Guard firmware
  •  Intel® BIOS PPAM firmware
  • Intel® Celeron® Processor Family
  • Intel® Core™ Processor N series
  • Intel® Core™ Ultra processors
  • Intel® Data Center GPU Max Series 1100 and 1550 products
  • Intel® Ethernet Controller I225 Manageability firmware before NVM version 1.87
  • Intel® Ethernet Adapters before version 29.0.1
  • Intel® TDX module software before version TDX_1.5.05.46.698
  • Intel® PROSet/Wireless Wi-Fi software before version 23.20
  • Intel® Pentium® Gold Processor Family
  • Intel® Processor N-series
  • Intel® Server D50DNP Family
  • Intel® Server M50FCP Family
  • Intel® Server Board S2600BP Family
  • Intel® Stratix® 10 FPGA and SoC FPGA product families
  • Intel® Stratix® 10 FPGAs and SoC FPGAs Firmware versions after 21.2
  • Intel® Xeon® W workstation processors
  • Intel® Xeon® D Processor
  • 4th Generation Intel® Xeon® Scalable processors
  • 4th Generation Intel® Xeon® Platinum processors
  • 4th Generation Intel® Xeon® Gold Processors
  • 4th Generation Intel® Xeon® Silver Processor
  • 4th Generation Intel® Xeon® Bronze Processor
  • 4th Gen Intel Xeon Scalable Processors with Intel® vRAN
  • 5th Generation Intel® Xeon® Scalable processors
  • 12th Generation Intel® Core™ Processor Family
  • 13th Generation Intel® Core™ Processor Family

Solutions

Before installation of the software, please visit the software manufacturer website for more details.

The vendor has issued a fix:


Vulnerability Identifier


Source


Related Link