Intel Alert
3016Warning Date
Severity Level
Warning Number
Target Sector
9 November, 2022
● High
2022-5351
All
Intel has released security updates to address several vulnerabilities in the following products:
- Intel® System Studio software
- Intel® CSME
- before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25.
- Intel® AMT
- before versions 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0.
- Intel® SPS
- before versions SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0.
- Intel® Distribution of OpenVINO™ Toolkit
- before version 2021.4.2.
- Intel® Quartus Prime Pro edition software
- before version 22.1.
- Intel® Quartus Prime Standard edition software
- before version 21.1 Patch 0.02std.
- Intel® Glorp gaming particle physics demonstration software
- version 1.0.0.
- Intel® VTune™ Profiler software
- before version 2022.2.0.
- Intel® AMT SDK
- before version 16.0.4.1.
- Intel® EMA
- before version 1.7.1.
- Intel® MC
- before version 2.3.2.
- Intel® XMM™ 7560 Modem M.2 software for Windows or Linux
- before version M2_7560_R_01.2146.00.
- Intel® Wi-Fi 6E AX411
- Intel® Wi-Fi 6E AX211
- Intel® Wi-Fi 6E AX210
- Intel® Wi-Fi 6 AX201
- Intel® Wi-Fi 6 AX200
- Intel® Wireless-AC 9560
- Intel® Wireless-AC 9462
- Intel® Wireless-AC 9461
- Intel® Wireless-AC 9260
- Intel® Dual Band Wireless-AC 8265
- Intel® Dual Band Wireless-AC 8260
- Intel® Dual Band Wireless-AC 3168
- Intel® Wireless 7265 (Rev D) Family
- Intel® Dual Band Wireless-AC 3165
- Intel® Xeon® Processor E5 v3 Family
- Intel® Xeon® Processor E5 v4 Family
- Intel® Core™ X-Series Processors
- Intel® NUC HDMI Firmware Update Tool for NUC7i3DN, NUC7i5DN and NUC7i7DN
- before version 1.78.2.0.7.
- Intel® SGX SDK software for Linux
- before version 2.18.100.1.
- Intel® SGX SDK software for Windows
- before version 2.17.100.1.
- Hyperscan library maintained by Intel®
- all versions downloaded before 04/29/2022.
- Killer™ Wi-Fi 6E AX1690
- Killer™ Wi-Fi 6E AX1675
- Killer™ Wi-Fi 6 AX1650
- Intel® Server Board S2600WF Family.
- Intel® Server Board M50CYP Family.
- Intel® Server Board M10JNP Family.
- Intel® Server System R1000WF Family.
- Intel® Server System R2000WF Family.
- Intel® Processors
- Intel® SDP Tool software
- before version 3.0.0
- PresentMon software maintained by Intel®
- before version 1.7.1.
- Intel® DCM software
- before version 5.0.
- Intel® Advanced Link Analyzer Pro edition software
- before version 22.2.
- Intel® Advanced Link Analyzer Standard edition software
- before version 22.1.1 STD.
- Intel® EMA software
- before version 1.8.0.
- Intel® WAPI Security software for Windows 10/11
- before version 22.2150.0.1.
- Intel® Support Android application
- before version v22.02.28.
- Intel® NUC 8 Rugged Kit
- NUC8CCHKR.
- Intel® NUC Kits
- NUC5PPYH, NUC5PGYH, NUC6CAYH, NUC6CAYS.
- Intel® NUC Board
- NUC8CCHB.
- Intel® NUC BIOS
Attacker could exploit these vulnerabilities by doing the following:
- Escalation of privilege
- Unauthorized disclosure of information
- Denial of service (DoS)
The CERT team encourages users to update the affected versions and to review Intel security advisory:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00558.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00642.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00659.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00673.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00676.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00680.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00683.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00687.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00689.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00691.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00695.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00708.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00710.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00711.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00713.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00715.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00716.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00720.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00740.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html