ID CISA:5E88CD1E1F7C180C73F343D557D6B6BF
Type cisa
Reporter CISA
Modified 2019-06-12T00:00:00
Description
Intel has released security updates and recommendations to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to gain an escalation of privileges on a previously infected machine.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the following Intel advisories and apply the necessary updates:
This product is provided subject to this Notification and this Privacy & Use policy.
Please share your thoughts.
We recently updated our anonymous product survey ; we'd welcome your feedback.
{"id": "CISA:5E88CD1E1F7C180C73F343D557D6B6BF", "type": "cisa", "bulletinFamily": "info", "title": "Intel Releases Security Updates, Mitigations for Multiple Products", "description": "Intel has released security updates and recommendations to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to gain an escalation of privileges on a previously infected machine.\n\nThe Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the following Intel advisories and apply the necessary updates:\n\n * NUC Firmware Advisory [INTEL-SA-00264](<https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html>)\n * RAID Web Console 3 for Windows Advisory [INTEL-SA-00259](<http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html>)\n * Omni-Path Fabric Manager GUI Advisory [INTEL-SA-00257](<https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html>)\n * Open Cloud Integrity Technology and OpenAttestation Advisory [INTEL-SA-00248](<http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html>)\n * Partial Physical Address Leakage Advisory [INTEL-SA-00247](<https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html>)\n * Turbo Boost Max Technology 3.0 Advisory [INTEL-SA-00243](<https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html>)\n * SGX for Linux Advisory [INTEL-SA-00235](<https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html>)\n * PROSet/Wireless WiFi Software Advisory [INTEL-SA-00232](<https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html>)\n * Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory [INTEL-SA-00226](<http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html>)\n * Chipset Device Software (INF Update Utility) Advisory [INTEL-SA-00224](<https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html>)\n * ITE Tech Consumer Infrared Driver for Windows 10 Advisory [INTEL-SA-00206](<https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html>)\n\nThis product is provided subject to this Notification and this [Privacy & Use](<https://www.dhs.gov/privacy-policy>) policy.\n\n**Please share your thoughts.**\n\nWe recently updated our anonymous [product survey](<https://www.surveymonkey.com/r/CISA-cyber-survey?product=https://us-cert.cisa.gov/ncas/current-activity/2019/06/11/Intel-Releases-Security-Updates-Mitigations-Multiple-Products>); we'd welcome your feedback.\n", "published": "2019-06-11T00:00:00", "modified": "2019-06-12T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://us-cert.cisa.gov/ncas/current-activity/2019/06/11/Intel-Releases-Security-Updates-Mitigations-Multiple-Products", "reporter": "CISA", "references": ["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html", "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html", "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html", "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html", "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html", "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html", "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html", "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html", "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html", "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html"], "cvelist": [], "lastseen": "2021-02-24T18:07:09", "viewCount": 0, "enchantments": {"dependencies": {"references": [], "modified": "2021-02-24T18:07:09", "rev": 2}, "score": {"value": 1.7, "vector": "NONE", "modified": "2021-02-24T18:07:09", "rev": 2}, "vulnersScore": 1.7}, "wildExploited": false}
{}