Intel Family Security Update Advisory

Overview

 

An update has been released to address vulnerabilities in Intel products. Users of the affected versions are advised to update to the latest version.

Affected Products

CVE-2024-26022
 

  • Intel® Aptio V UEFI Firmware Integrator Tools (Intel® NUC iSetupCfgWin software) versions: ~ 5.05.04.0008 (excluded)
  • Intel® Aptio V UEFI Firmware Integrator Tools (Intel® NUC iSetupCfgLnx software) versions: ~ 5.05.04.0008 (excluded)
  • Intel® Aptio V UEFI Firmware Integrator Tools (Intel® NUC iFlashVLnx software) versions: ~ 5.05.04.0008 (excluded)
  • Intel® Aptio V UEFI Firmware Integrator Tools (Intel® NUC iFlashVWin software) versions: ~ 5.05.04.0008 (excluded)
  • Intel® Aptio V UEFI Firmware Integrator Tools (Intel® NUC iDmiEdit-Win software) versions: ~ 5.05.04.0008 (excluded)
  • Intel® Aptio V UEFI Firmware Integrator Tools (Intel® NUC iDmiEditLnx software) versions: ~ 5.05.04.0008 (excluded)

 

CVE-2024-28947

  • Intel® Server Board S2600ST Family firmware versions: ~ 02.01.0017 (excluded)

 

CVE-2024-25576

  • Intel Agilex® FPGA 7 FPGA firmware versions: ~ 24.1 (excluded)

 

CVE-2024-24853

  • See “Affected Products” section in References [4] 

 

CVE-2023-49144

  • OpenBMC Firmware (Intel® Server Platforms) versions: ~ egs-1.15-0 (excluded)
  • OpenBMC Firmware (Intel® Server Platforms) versions: ~ bhs-0.27 (excluded)

 

CVE-2024-21801

  • Intel® TDX module software versions: ~ 1.5.05.46.698 (excluded)

 

CVE-2023-49141

  • See “Affected Products” section in references [7] 

 

CVE-2023-42667

  • Intel® Core™ Ultra processors

 

CVE-2024-34163

Intel® NUC X15 Laptop

  • LAPAC71G and LAPAC71H versions: ~ 0065 (excluded)
  • LAPBC510 and LAPBC710 versions: ~ 0083 (excluded)
  • LAPRC510 and LAPRC710 versions: ~ 0066 (excluded)
  • LAPKC51E and LAPKC71E and LAPKC71F versions: ~ 0048 (excluded)

 

CVE-2024-39283

  • Intel® TDX module software versions: ~ 1.5.01.00.592 (inclusive)

 

CVE-2024-23981, CVE-2024-24986, CVE-2024-23497, CVE-2024-23499, CVE-2024-21807, CVE-2024-21810

  • Intel(R) Ethernet Complete Driver Pack versions: ~ 28.3 (excluded)

 

CVE-2024-24983

  • Intel(R) Ethernet Controllers E800 Series with NVM image versions: ~ 4.4 (excluded)

 

CVE-2024-21787

  • BMRA software versions: ~ 22.08 (excluded)

 

 

Resolved Vulnerabilities

Vulnerability that could potentially allow an authenticated user to escalate privileges via local access due to inadequate access controls (CVE-2024-26022)

Vulnerability in the kernel mode driver in Intel(R) server board S2600ST family firmware where improper input validation could potentially allow an authorized user to escalate privileges via local access (CVE-2024-28947)

Improper access control in firmware in Intel(R) FPGA products could allow a privileged user to escalate privileges via local access (CVE-2024-25576)

Vulnerability in Intel(R) processors due to incorrect sequence of actions when switching between execution monitor and SMI transfer monitor (STM), which could allow a privileged user to escalate privileges via local access (CVE-2024-24853)

Vulnerability in OpenBMC firmware on Intel(R) server platforms with out-of-bounds read permissions that could potentially allow a privileged user to enable information disclosure via local access (CVE-2023-49144)

Vulnerability in Intel(R) TDX module software due to a lack of control flow management that could potentially allow a privileged user to cause a denial of service via local access (CVE-2024-21801)

Vulnerability in Intel(R) processor stream cache mechanism due to improper isolation, potentially allowing an authenticated user to escalate privileges via local access (CVE-2023-49141)

Vulnerability in the Intel(R) Core(TM) Ultra Processor stream cache mechanism due to improper isolation, which could allow an authenticated user to escalate privileges via local access (CVE-2023-42667)

Vulnerability in the firmware of Intel(R) NUCs due to improper input validation, potentially allowing an authorized user to escalate privileges via local access (CVE-2024-34163)

Vulnerability in Intel(R) TDX module software where incomplete filtering of special elements could potentially allow an authenticated user to escalate privileges via local access (CVE-2024-39283)

A wraparound error in the Linux kernel mode driver in Intel(R) Ethernet network controllers and adapters could potentially allow an authenticated user to enable privilege escalation via local access (CVE-2024-23981)

Vulnerability in the Linux kernel mode driver in Intel(R) Ethernet network controllers and adapters due to improper access control that could potentially allow an authenticated user to escalate privileges via local access (CVE-2024-24986)

An out-of-bounds write in the Linux kernel mode driver for Intel(R) Ethernet network controllers and adapters could potentially allow an authenticated user to escalate privileges via local access (CVE-2024-23497)

Vulnerability in the Linux kernel mode driver for the Intel(R) Ethernet Network Controllers and Adapters E810 Series, where a protection mechanism error could potentially allow an unauthenticated user to cause a denial of service via network access (CVE-2024-23499)

Vulnerability in the Linux kernel mode driver for Intel(R) Ethernet network controllers and adapters that could potentially allow an authenticated user to escalate privileges via local access due to improper initialization (CVE-2024-21807)

Vulnerability in the Linux kernel-mode driver for Intel(R) Ethernet network controllers and adapters due to improper input validation, potentially allowing an authenticated user to escalate privileges via local access (CVE-2024-21810)

Vulnerability in the firmware of Intel(R) Ethernet Network Controllers and Adapters E810 Series, where a protection mechanism error could potentially allow an unauthenticated user to cause a denial of service via network access (CVE-2024-24983)

Vulnerability in BMRA software due to insufficient cryptographic strength, potentially allowing an authenticated user to escalate privileges via local access (CVE-2024-21787)

 

Vulnerability Patches

 

The following product-specific Vulnerability Patches have been made available in the latest update. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

 

CVE-2024-26022

  • Refer to the “Recommendation” section of the Referenced Sites[1] to update

 

CVE-2024-28947

  • Intel® Server Board S2600ST Family firmware version: 02.01.0017 or later

 

CVE-2024-25576

  • Intel Agilex® FPGA 7 FPGA firmware versions: 24.1 or later

 

CVE-2024-24853

  • Refer to the “Recommendation” section for updates[4]

 

CVE-2023-49144

  • See the “Recommendation” section in references [5] 

 

CVE-2024-21801

  • See the “Recommendation” section in reference [6] 

 

CVE-2023-49141

  • See the “Recommendation” section in reference [7]

 

CVE-2023-42667

  • Intel® Core™ Ultra processors version: 0x17

 

CVE-2024-34163

  • See the “Recommendation” section in references [9]

 

CVE-2024-39283

  • Intel® TDX module software version: 1.5.01.02.595 or later

 

CVE-2024-23981, CVE-2024-24986, CVE-2024-23497, CVE-2024-23499, CVE-2024-21807, CVE-2024-21810

  • Intel(R) Ethernet Complete Driver Pack version: 28.3 or later 

 

CVE-2024-24983

  • Intel(R) Ethernet Controllers E800 Series with NVM image version: 4.4 or later

 

CVE-2024-21787

  • BMRA software version: 22.08 or later

 

 

References

[1] Intel® UEFI Integrator Tools on Aptio V for Intel® NUC Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01172.html

[2] Intel® Server Board S2600ST Family Firmware Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01121.html

[3] Intel Agilex® FPGA Firmware Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01087.html

[4] 2024.3 IPU – SMI Transfer Monitor Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html

[5] OpenBMC Firmware Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01078.html

[6] Intel® TDX Module Software Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01070.html

[7] 2024.2 IPU – Intel® Processor Stream Cache Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html

[8] Intel® Core™ Ultra Processor Stream Cache Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html

[9] Intel® NUC BIOS Firmware Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.html

[10] Intel® TDX Module Software Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01010.html

[11] Intel® Ethernet Controllers and Adapters Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html

[12] BMRA Software Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00790.html

Article Link: https://asec.ahnlab.com/en/82531/