Intel Alert
2932Warning Date
Severity Level
Warning Number
Target Sector
15 February, 2023
● Critical
2023-5456
All
Intel® has released security updates to address several vulnerabilities in the following product:
- 10th Generation Intel® Core™ Processor Family
- 11th Gen Intel® Core™ processor
- 11th Generation Intel® Core Processor Family
- 11th Generation Intel® Core™ Processor Family
- 12th Generation Intel® Core™ Processor Family
- 1st,2nd,3rd Gen Intel® Xeon® Scalable processor
- 2nd Generation Intel® Xeon® Scalable Processors
- 3rd Gen Intel® Xeon® Scalable processor
- 3rd Gen Intel® Xeon® Scalable Processor family
- 3rd Generation Intel® Xeon ®Scalable Processor Family
- 3rd Generation Intel® Xeon® Scalable Processors
- Crypto API Toolkit for Intel® SGX
- Intel Atom® C53xx Processors
- Intel Atom® P53xx Processors
- Intel Atom® P59xx Processors
- Intel® Battery Life Diagnostic Tool
- Intel® C++ Compiler Classic
- Intel® C250 series chipset
- Intel® C620 series chipset
- Intel® C620A series chipset
- Intel® C740 series chipset
- Intel® Celeron® Processor Family
- Intel® Distribution for Python programming language
- Intel® DSA software
- Intel® FPGA Add-on for Intel® oneAPI Base Toolkit
- Intel® MPI Library
- Intel® oneAPI Collective Communications Library (oneCCL)
- Intel® oneAPI Data Analytics Library
- Intel® oneAPI Deep Neural Network (oneDNN)
- Intel® oneAPI DPC++/C++ Compiler
- Intel® oneAPI DPC++/C++ Compiler Runtime
- Intel® oneAPI Toolkits
- Intel® Pentium® Gold Processor Family
- Intel® QAT drivers for Linux
- Intel® QAT drivers for Windows
- Intel® Quartus Prime Pro/Standard
- Intel® SPS firmware
- Intel® SUR software
- Intel® Trace Analyzer and Collector
- Intel® Xeon® D processor 1500 series
- Intel® Xeon® D processor family
- Intel® Xeon® D Processors
- Intel® Xeon® E processor family
- Intel® Xeon® E-2300 processor family
- Intel® Xeon® Platinum P-8124, P-8136 processors
- Intel® Xeon® Scalable processor family
- Intel® Xeon® W processor
- Intel® Xeon® W processor
- Intel® Xeon® W processor family
- oneapi-cli
- QATzip software
An attacker could exploit these vulnerabilities by doing the following:
- Escalation of Privilege
- Denial of Service
- Sensitive Information Disclosure
The CERT team encourages users to update the affected product and review Intel® security advisory:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00765.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00718.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html