Your review has been sent successfully

Intel Alert

3016
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

9 November, 2022

● High

2022-5351

All

Description:

Intel has released security updates to address several vulnerabilities in the following products:

  • Intel® System Studio software
  • Intel® CSME
    • before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25.
  • Intel® AMT
    • before versions 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0.
  • Intel® SPS
    • before versions SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0.
  • Intel® Distribution of OpenVINO™ Toolkit
    • before version 2021.4.2.
  • Intel® Quartus Prime Pro edition software
    • before version 22.1.
  • Intel® Quartus Prime Standard edition software
    • before version 21.1 Patch 0.02std.
  • Intel® Glorp gaming particle physics demonstration software
    • version 1.0.0.
  • Intel® VTune™ Profiler software
    • before version 2022.2.0.
  • Intel® AMT SDK
    • before version 16.0.4.1.
  • Intel® EMA
    • before version 1.7.1.
  • Intel® MC
    • before version 2.3.2.
  • Intel® XMM™ 7560 Modem M.2 software for Windows or Linux
    • before version M2_7560_R_01.2146.00.
  • Intel® Wi-Fi 6E AX411
  • Intel® Wi-Fi 6E AX211
  • Intel® Wi-Fi 6E AX210
  • Intel® Wi-Fi 6 AX201
  • Intel® Wi-Fi 6 AX200
  • Intel® Wireless-AC 9560
  • Intel® Wireless-AC 9462
  • Intel® Wireless-AC 9461
  • Intel® Wireless-AC 9260
  • Intel® Dual Band Wireless-AC 8265
  • Intel® Dual Band Wireless-AC 8260
  • Intel® Dual Band Wireless-AC 3168
  • Intel® Wireless 7265 (Rev D) Family
  • Intel® Dual Band Wireless-AC 3165
  • Intel® Xeon® Processor E5 v3 Family
  • Intel® Xeon® Processor E5 v4 Family
  • Intel® Core™ X-Series Processors
  • Intel® NUC HDMI Firmware Update Tool for NUC7i3DN, NUC7i5DN and NUC7i7DN
    • before version 1.78.2.0.7.
  • Intel® SGX SDK software for Linux
    • before version 2.18.100.1.
  • Intel® SGX SDK software for Windows
    • before version 2.17.100.1.
  • Hyperscan library maintained by Intel®
    • all versions downloaded before 04/29/2022.
  • Killer™ Wi-Fi 6E AX1690
  • Killer™ Wi-Fi 6E AX1675
  • Killer™ Wi-Fi 6 AX1650
  • Intel® Server Board S2600WF Family.
  • Intel® Server Board M50CYP Family.
  • Intel® Server Board M10JNP Family.
  • Intel® Server System R1000WF Family.
  • Intel® Server System R2000WF Family.
  • Intel® Processors
  • Intel® SDP Tool software
    • before version 3.0.0
  • PresentMon software maintained by Intel®
    • before version 1.7.1.
  • Intel® DCM software
    • before version 5.0.
  • Intel® Advanced Link Analyzer Pro edition software
    • before version 22.2.
  • Intel® Advanced Link Analyzer Standard edition software
    • before version 22.1.1 STD.
  • Intel® EMA software
    • before version 1.8.0.
  • Intel® WAPI Security software for Windows 10/11
    • before version 22.2150.0.1.
  • Intel® Support Android application
    • before version v22.02.28.
  • Intel® NUC 8 Rugged Kit
    • NUC8CCHKR.
  • Intel® NUC Kits
    • NUC5PPYH, NUC5PGYH, NUC6CAYH, NUC6CAYS.
  • Intel® NUC Board
    • NUC8CCHB.
  • Intel® NUC BIOS
Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Escalation of privilege
  • Unauthorized disclosure of information
  • Denial of service (DoS)
Best practice and Recommendations:

The CERT team encourages users to update the affected versions and to review Intel security advisory:

Last updated at 9 November, 2022

Rate the content

rate-icon
up icon