Your review has been sent successfully

Intel® Updates

3011
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

15 January, 2020

● Medium

2020-796

All

Description:

Intel® has released security Updates to address vulnerabilities in the following products:

  • Intel® SNMP Subagent Stand-Alone Advisory for Windows all versions
  • Intel® Chipset Device Software INF Utility before version 10.1.18
  • Intel® RWC 3 for Windows* before version 7.010.009.000.
  • 3rd Generation Intel® Core™ Processors
  • 4th Generation Intel® Core™ Processors
  • 6th Generation Intel® Core™ Processors
  • 7th Generation Intel® Core™ Processors
  • 8th Generation Intel® Core™ Processors
  • 9th Generation Intel® Core™ Processors
  • 10th Generation Intel® Core™ Processors
  • Intel® Xeon® Processor E3 v2 Family
  • Intel® Xeon® Processor E3 v3 Family
  • Intel® Xeon® Processor E3 v5 Family
  • Intel® Xeon® Processor E3 v6 Family
  • Intel® Xeon® Processor E-2100 Family
  • Intel® Xeon® Processor E-2200 Family
  • Intel® Pentium® Processor A1000 Series
  • Intel® Pentium® Processor 2000 Series
  • Intel® Pentium® Processor 3500 Series
  • Intel® Pentium® Processor 4000 Series
  • Intel® Pentium® Processor G2000 Series
  • Intel® Pentium® Processor G3000 Series
  • Intel® Pentium® Processor G4000 Series
  • Intel® Pentium® Processor J2000 Series
  • Intel® Pentium® Processor J3000 Series
  • Intel® Pentium® Processor J4000 Series
  • Intel® Pentium® Processor N3500 Series
  • Intel® Pentium® Processor N3700 Series
  • Intel® Pentium® Processor N4000 Series
  • Intel® Pentium® Processor Silver Series
  • Intel® Pentium® Processor Gold Series
  • Intel® Celeron® Processor 927UE
  • Intel® Celeron® Processor 1000 Series
  • Intel® Celeron® Processor 2000 Series
  • Intel® Celeron® Processor 3800 Series
  • Intel® Celeron® Processor 3900 Series
  • Intel® Celeron® Processor 4000 Series
  • Intel® Celeron® Processor 5000 Series
  • Intel® Celeron® Processor G1000 Series
  • Intel® Celeron® Processor G3000 Series
  • Intel® Celeron® Processor G4000 Series
  • Intel® Celeron® Processor J1000 Series
  • Intel® Celeron® Processor J3000 Series
  • Intel® Celeron® Processor J4000 Series
  • Intel® Celeron® Processor N2000 Series
  • Intel® Celeron® Processor N3000 Series
  • Intel® Celeron® Processor N4000 Series
  • Intel® Celeron® Processor G3900 Series
  • Intel® Celeron® Processor G4900 Series
  • Intel® Atom® Processor A Series
  • Intel® Atom® Processor E Series
  • Intel® Atom® Processor X Series
  • Intel® Atom® Processor Z Series

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Escalation of privilege
  • Denial of service attack (DoS)
  • Unauthorized disclosure of information

Best practice and Recommendations:

The CERT team encourages users to review Intel® security advisory and apply the necessary Updates:

https://www.intel.com/content/www/us/en/security-center/default.html

Last updated at 15 January, 2020

Rate the content

rate-icon
up icon