Intel Updates
2877Warning Date
Severity Level
Warning Number
Target Sector
11 November, 2020
● High
2020-2035
All
Description:
Intel has released security updates to address multiple vulnerabilities in the following products:
- Intel® DSA
- before version 20.8.30.6.
- Intel® Board ID Tool
- all versions.
- Intel® Quartus® Prime Pro
- before version 20.3.
- Intel® Quartus® Prime Standard
- before version 20.1 Update1.
- Intel® Server Board S2600ST family.
- Intel® Server Board S2600WF family.
- Intel® Battery Life Diagnostic Tool
- before version 1.0.7.
- Intel® Data Center Manager Console
- before version 3.6.2.
- Intel® XTU
- before version 6.5.1.360.
- Intel CSI2 Host Controller diver.
- Open WebRTC Toolkit
- before version 4.3.1.
- Intel® Media SDK for Windows*
- before version 2019 R1.
- 2nd Generation Intel® Xeon® Scalable Processors
- Intel® Core™ X-series Processors
- Intel® Xeon® Processor W Family
- Intel® Xeon® Scalable Processors
- Intel® Atom® Processor C3XXX
- Intel® Unite Client for Windows*
- before version 4.2.13064.
- Intel® Xeon® Processor D Family
- Intel® Xeon® Processor E7 v4 Family
- Intel® Xeon® Processor E5 v3 Family
- Intel® Xeon® Processor E5 v4 Family
- Intel® CSME
- Intel® AMT
- versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25.
- Intel® TXE
- versions before 3.1.80 and 4.0.30.
- Intel® Server Platform Services firmware
- versions before SPS_E5_04.01.04.400, SPS_E3_05.01.04.200, SPS_E3_04.01.04.200, SPS_SoC-X_04.00.04.200 and SPS_SoC-A_04.00.04.300.
- Intel® SGX DCAP software
- before version 1.6.
- Intel® Quartus Prime
- before version 20.2.
- Intel® VTune™ Profiler
- before version 2020 Update 1.
- Intel® PROSet/Wireless
- Intel® Wireless Bluetooth®
- Intel® Wi-Fi 6 AX201
- Intel® Wi-Fi 6 AX200
- Intel® Wireless-AC 9560
- Intel® Wireless-AC 9462
- Intel® Wireless-AC 9461
- Intel® Wireless-AC 9260
- Intel® Dual Band Wireless-AC 8265
- Intel® Dual Band Wireless-AC 8260
- Intel® Dual Band Wireless-AC 3168
- Intel® Wireless 7265 (Rev D) Family
- Intel® Dual Band Wireless-AC 3165
- Intel® RealSense™ D400 Series Dynamic Calibration Tool
- before version 2.11.
- Intel® High Definition Audio drivers
- before version 9.21.00.4561.
- Intel® Thunderbolt™ 3 and 4 DCH drivers for Windows*
- before version 72.
- Intel® Computing Improvement Program
- before version 2.4.5982.
- Intel® EMA
- before version 1.3.3.
- Intel® SCS Add-on for Microsoft* SCCM
- before version 2.1.10.
- NUC firmware
- Intel® ADAS IE
- before version ADAS_IE_1.0.766.
- Intel® Falcon 8+ UAS AscTec Thermal Viewer
- all versions.
- Intel® Advisor tools
- before version 2020 Update 2.
- Intel Unite® Cloud Service client
- before version 4.2.12212.
- Intel® Processor Identification Utility
- before version 6.4.0603.
- Intel® QAT for Linux
- before version 1.7.l.4.10.0.
- Intel® HID Event Filter Driver
- before version 2.2.1.372.
- Intel® Core™ Processors
- Intel® Pentium® Processor J Series
- Intel® Pentium® Processor N Series
- Intel® Celeron® Processor J Series
- Intel® Celeron® Processor N Series
- Intel® Atom® Processor A Series
- Intel® Atom® Processor E3900 Series
- Intel® Quartus® Prime Pro
- before version 20.2.
- Intel® Visual Compute Accelerator 2
- all versions.
- Intel® Ethernet 700 Series Controllers
- before version 7.3.
- Intel® SSD Pro 6000p Series
- Intel® SSD Pro 5450s
- Intel® SSD E 5100s Series
- Intel® SSD Pro 5400s Series
- Intel® SSD Pro 7600p Series
- Intel® SSD 760p Series
- Intel® SSD E 6100p Series
- Intel® SSD 660p Series
- Intel® Optane™ SSD 905P Series
- Intel® Optane™ SSD 900P Series
- Intel® SSD DC P4510 Series
- Intel® SSD DC P4610 Series
- Intel® SSD DC P4800X Series
- Intel® SSD DC P4801X Series
- Intel® SSD DC P4101 Series
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Escalation of privilege.
- Denial of service (DoS).
- Information يisclosure.
Best practice and Recommendations:
The CERT team encourages users to review Intel security advisory and apply the necessary updates:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00449.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00447.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00446.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00439.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00431.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00430.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00429.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00427.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00424.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00423.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00422.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00421.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00420.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00419.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00418.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00417.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00416.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00415.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00413.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00412.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00410.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00409.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00408.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00403.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00400.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00398.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00390.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00388.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00380.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00368.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00358.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00350.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00262.html