From the Blog

Intel Vulnerability Enables Multiple Issues

Intel is warning users of a high severity flaw found within their firmware of it’s ‘Converged Security and Management Engine’ (CSME) which is used to power Intel’s ‘Active Management System’ hardware for the purpose of remote out-of-band management to consumers. This flaw could enable an attacker to conduct Privilege Escalation, Information Disclosure and Denial of Service.

exc-5e4a5d5fdd42c458f374aa78

Intel is warning users of a high severity flaw found within their firmware of it’s ‘Converged Security and Management Engine’ (CSME) which is used to power Intel’s ‘Active Management System’ hardware for the purpose of remote out-of-band management to consumers. This flaw could enable an attacker to conduct Privilege Escalation, Information Disclosure and Denial of Service.

“Improper Authentication in subsystem in Intel(R) CSME versions 12.0 through 12.0.48 (IOT only: 12.0.56), versions 13.0 through 13.0.20, versions 14.0 through 14.0.10 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.” – Intel Advisory

The recommended route to remediate this issue is by updating the CSME version to it’s latest. The issues were found internally by Intel themselves thanks to Chedva Gottesman.

This was not the only vulnerability identified within Intel’s Products. In total there were six patched flaws on Tuesday including the mentioned high severity flaw within CSME.

The other five remaining vulnerabilities included a Medium severity flaw within Intel’s Renesas Electronics USB 3 driver that is common to Intel motherboards. This issue could potentially allow privilege escalation and comes from improper permissions in the installer. All versions of the driver have been affected by this issue.

“Intel has issued a Product Discontinuation notice for Intel Renesas Electronics USB 3.0 Driver and recommends that users of the Intel Renesas Electronics USB 3.0 Driver uninstall it or discontinue use at their earliest convenience,”

Another two Medium severity flaws exist within Intel’s RAID Web Console which could potentially allow users to configure the RAID custom storage controllers and the disk drives on the system. One of the Medium severity flaws is found in RAID Web Console 3 for Windows, which can be found from the improper permissions set in the installer. The other Medium severity can be found in RAID Web Console 2 which is also found from set improper permissions within the installer.

The final Medium severity flaw can be found in Intel Manycore Platform Software Stack, which is necessary to run Intel Xeon Phi Coprocessor which enables privilege escalation from improper permissions in the installer.

The sixth vulnerability comes from a flaw within Intel’s Software Guard Extension (SGX) SDK which again could enable privilege escalation.

Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest
Scroll to Top

Covid-19 Update

We Remain Open

At this present time we have taken all the relevant measures to ensure our team are safe. Until further notice all our “onsite” engagements will either be postponed or performed remotely via VPN or one of our appliances.

Please bear with us if we need to reschedule some of your work. As a collective, we are also volunteering our time to support the elderly and assist essential services.

Thank you for your patience and understanding.

Peter
CEO & Founder