Security News > 2022 > May > If you've got Intel inside, you probably need to get these security patches inside, too

If you've got Intel inside, you probably need to get these security patches inside, too
2022-05-12 21:06

Intel has disclosed high-severity bugs in its firmware that's used in datacenter servers, workstations, mobile devices, storage products, and other gear.

In addition to patching these high-severity vulnerabilities, Intel also issued an advisory for what it's called a speculative cross-store bypass, a data-leaking hardware-level security shortcoming it reckons is low in severity and which affects some of its processors.

The most severe security issues include local privilege escalation vulnerabilities in Intel's firmware that impact systems powered by various Xeon, Xeon Scalable, Rocket Lake, Core, and Core X-series processors.

In addition to the BIOS bugs, three high-severity firmware vulns affect Intel Optane Solid-State Drive and Optane SSD Data Center storage products.

Finally, Intel issued firmware updates for three LPE security flaws in its NUC computers.

In addition to the high-severity vulnerabilities, Intel reported nine medium-severity flaws in its BIOS and Optane SSD firmware, Extreme Tuning Utility software, and Advisor software.


News URL

https://go.theregister.com/feed/www.theregister.com/2022/05/12/intel_product_bugs/

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Intel 6314 31 755 708 45 1539