Intel Alert
2869Warning Date
Severity Level
Warning Number
Target Sector
9 February, 2022
● High
2022-4351
All
Intel has released security updates to address several vulnerabilities in the following products:
- BIOS firmware
- Intel® 82599 Ethernet Series
- Intel® Advisor Software
- Intel® AMT
- Intel® Capital Global Summit Android App
- Intel® GPA Software
- Intel® IPP Cryptography
- Intel® Kernelflinger
- Intel® PROSet/Wireless Wi-Fi, Intel® AMT Wireless and Killer™ Wi-Fi Software
- Intel® Quartus®
- Intel® RealSense™ DCM
- Intel® RXT for Chromebook
- Intel® Smart Campus Android App
- Intel® Trace Analyzer and Collector
- Intel® Wireless Bluetooth® and Killer™ Bluetooth®
- IPU - Intel Atom® Processor
- IPU - Intel® Chipset Firmware
- IPU - Intel® Processor
- IPU - Intel® Processor Breakpoint Control Flow
Attacker could exploit these vulnerabilities by doing the following:
- Denial of service attack (DoS)
- Escalation of privilege
- Unauthorized disclosure of information
The CERT team encourages users to update the affected versions and to review Intel security advisory:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00574.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00588.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00591.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00594.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00599.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00600.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00607.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00608.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00622.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00632.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00639.html