تنبيه Intel
2867تاريخ التحذير
مستوى الخطورة
رقم التحذير
القطاع المستهدف
9 فبراير, 2022
● عالي
2022-4351
الكل
أصدرت Intel عدة تحديثات لمعالجة عدد من الثغرات في المنتجات التالية:
- BIOS firmware
- Intel® 82599 Ethernet Series
- Intel® Advisor Software
- Intel® AMT
- Intel® Capital Global Summit Android App
- Intel® GPA Software
- Intel® IPP Cryptography
- Intel® Kernelflinger
- Intel® PROSet/Wireless Wi-Fi, Intel® AMT Wireless and Killer™ Wi-Fi Software
- Intel® Quartus®
- Intel® RealSense™ DCM
- Intel® RXT for Chromebook
- Intel® Smart Campus Android App
- Intel® Trace Analyzer and Collector
- Intel® Wireless Bluetooth® and Killer™ Bluetooth®
- IPU - Intel Atom® Processor
- IPU - Intel® Chipset Firmware
- IPU - Intel® Processor
- IPU - Intel® Processor Breakpoint Control Flow
يمكن للمهاجم استغلال الثغرات وتنفيذ ما يلي:
- هجمة حجب الخدمة (DoS attack)
- رفع الصلاحيات لزيادة قدرته على التعديل في النظام
- الكشف والإفصاح غير المصرح به للمعلومات
يوصي المركز بتحديث النسخ المتأثرة، حيث أصدرت Intel توضيحًا لهذه التحديثات:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00574.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00588.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00591.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00594.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00599.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00600.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00607.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00608.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00622.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00632.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00639.html