A potential security vulnerability in some 3rd Generation Intel® Xeon® Scalable Processors may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability.
CVEID: CVE-2021-33117
Description: Improper access control for some 3rd Generation Intel® Xeon® Scalable Processors before BIOS version MR7, may allow a local attacker to potentially enable information disclosure via local access.
CVSS Base Score: 6.5 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N****
Product Family
|
Processor
|
Vertical Segment
|
CPU ID
|
Platform ID
—|—|—|—|—
3rd Generation Intel® Xeon® Scalable Processors
|
06_6AH
|
Server
|
606AX
|
0x87
Intel recommends updating affected 3rd Generation Intel® Xeon® Scalable Processors to BIOS version MR7 or later. Intel recommends the users to enable the technologies that are used for BIOS to detect early boot code unauthorized modification.
Alternatively, Intel recommends following the steps to update the microcode patch located in platform flash designated by firmware interface table (FIT) entry type1. Details on the firmware interface table layout and types can be found at:
Intel is releasing microcode updates, which are available at this GitHub* repository link:
This CVE requires a Microcode Security Version Number (SVN) update. To address this issue, an Intel SGX TCB Recovery is planned. Details can be found here.
Refer to Intel SGX Attestation Technical Details for more information on the Intel SGX TCB recovery process.
Further TCB Recovery Guidance for developers is available.
This issue was found internally by Intel employees.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.