Intel Products Multiple Vulnerabilities
Release Date:
16 May 2024
3326
Views
RISK: Medium Risk
TYPE: Clients - Productivity Products
Multiple vulnerabilities were identified in Intel Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system.
Impact
- Denial of Service
- Elevation of Privilege
- Information Disclosure
System / Technologies affected
- Intel Agilex® 7 FPGAs and SoC FPGAs Firmware versions after 21.4
- Intel® Agilex™ 7 FPGA and SoC FPGA product families
- Intel Atom® Processor X Series
- Intel® Atom® Processors C Series
- Intel® BIOS Guard firmware
- Intel® BIOS PPAM firmware
- Intel® Celeron® Processor Family
- Intel® Core™ Processor N series
- Intel® Core™ Ultra processors
- Intel® Data Center GPU Max Series 1100 and 1550 products
- Intel® Ethernet Controller I225 Manageability firmware before NVM version 1.87
- Intel® Ethernet Adapters before version 29.0.1
- Intel® TDX module software before version TDX_1.5.05.46.698
- Intel® PROSet/Wireless Wi-Fi software before version 23.20
- Intel® Pentium® Gold Processor Family
- Intel® Processor N-series
- Intel® Server D50DNP Family
- Intel® Server M50FCP Family
- Intel® Server Board S2600BP Family
- Intel® Stratix® 10 FPGA and SoC FPGA product families
- Intel® Stratix® 10 FPGAs and SoC FPGAs Firmware versions after 21.2
- Intel® Xeon® W workstation processors
- Intel® Xeon® D Processor
- 4th Generation Intel® Xeon® Scalable processors
- 4th Generation Intel® Xeon® Platinum processors
- 4th Generation Intel® Xeon® Gold Processors
- 4th Generation Intel® Xeon® Silver Processor
- 4th Generation Intel® Xeon® Bronze Processor
- 4th Gen Intel Xeon Scalable Processors with Intel® vRAN
- 5th Generation Intel® Xeon® Scalable processors
- 12th Generation Intel® Core™ Processor Family
- 13th Generation Intel® Core™ Processor Family
Solutions
Before installation of the software, please visit the software manufacturer website for more details.
The vendor has issued a fix:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01007.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00756.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00814.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01041.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01050.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html
Vulnerability Identifier
- CVE-2021-33141
- CVE-2021-33142
- CVE-2021-33145
- CVE-2021-33146
- CVE-2021-33157
- CVE-2021-33158
- CVE-2021-33161
- CVE-2021-33162
- CVE-2022-37341
- CVE-2023-22662
- CVE-2023-27504
- CVE-2023-28383
- CVE-2023-28402
- CVE-2023-38417
- CVE-2023-38654
- CVE-2023-40536
- CVE-2023-41092
- CVE-2023-43490
- CVE-2023-45733
- CVE-2023-45745
- CVE-2023-45845
- CVE-2023-46103
- CVE-2023-47165
- CVE-2023-47210
- CVE-2023-47855
- CVE-2023-47859
- CVE-2023-49614
- CVE-2024-21823
- CVE-2024-22095
- CVE-2024-22382
- CVE-2024-22390
- CVE-2024-23487
- CVE-2024-23980
- CVE-2024-24971
- CVE-2024-24981
Source
Related Link
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01007.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00756.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00814.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01041.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01050.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html
Share with