Friday, February 7, 2025
HomeSecurity UpdatesVulnerability in Intel Processor Diagnostic Tool Let Hackers Perform Escalation of Privilege...

Vulnerability in Intel Processor Diagnostic Tool Let Hackers Perform Escalation of Privilege and DOS Attack

Published on

SIEM as a Service

Follow Us on Google News

Intel released new security updates with the fixes of two vulnerabilities that affected Intel Processor Diagnostic Tool and Solid State Drives (SSD) for Data Centers (DC) S4500/S4600 Series.

Vulnerability in Processor Diagnostic Tool categorized as “High” Severity and the other vulnerability that affected Solid State Drives (SSD) S4500/S4600 Series marked as “Medium” Severity.

Intel Processor Diagnostic Tool

A software-based privilege escalation vulnerability (CVE-2019-11133) that resides in the Processor Diagnostic Tool before version 4.1.2.24 lets the attacker perform a denial of service attack and steal the sensitive information due to Improper access control.

Jesse Michael from Eclypsium initially discovered this vulnerability reported Intel under responsible disclosed policy.

Affected Products:

Intel® Processor Diagnostic Tool for 32-bit before version 4.1.2.24_32bit.
Intel® Processor Diagnostic Tool for 64-bit before version 4.1.2.24_64bit.

Intel recommends that users of Intel Processor Diagnostic Tool update to version 4.1.2.24 or later. Download Here.

Intel Solid State Drives (SSD)

Another security vulnerability ( CVE-2018-18095) that affected Intel Solid State Drives (SSD) S4500/S4600 Series firmware that used for Data Centers (DC) let unprivileged user escalate the privilege via physical access.

Affected Products:

Intel® SSD DC S4500 Series firmware before SCV10150.
Intel® SSD DC S4600 Series firmware before SCV10150.

Intel releasing firmware updates to mitigate this vulnerability and recommends updating Intel® SSD DC S4500 Series and Intel® SSD DC S4600 Series firmware to SCV10150 or later.

This vulnerability was found internally by Intel updates are available for download Here

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Microsoft Released Security Update For July With the Fixes of 2 Actively Exploited Zero-Day Vulnerabilities – Update Now

Cisco Security Updates – Vulnerabilities in Cisco Products Let Hackers Gain Unauthorized Remote Access

Android Security Update – Critical Vulnerabilities Let Hackers Control Your Android Phone Remotely

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Dell Update Manager Plugin Flaw Exposes Sensitive Data

Dell Technologies has issued a security advisory (DSA-2025-047) to address a vulnerability in the Dell Update...

DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption

DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app...

Critical Flaws in HPE Aruba ClearPass Expose Systems to Arbitrary Code Execution

Hewlett Packard Enterprise (HPE) has issued a high-priority security bulletin addressing multiple vulnerabilities in...

Splunk Introduces “DECEIVE” an AI-Powered Honeypot to Track Cyber Threats

Splunk has unveiled DECEIVE (DECeption with Evaluative Integrated Validation Engine), an innovative, AI-augmented honeypot that mimics...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

Microsoft Urges Windows Admins to Patch Microsoft Message Queuing RCE Flaw

Microsoft has disclosed two Critical remote code execution vulnerabilities in MSMQ (Microsoft Message Queuing)...

Microsoft Unveild New Windows 11 Features To Strengthen Security

Microsoft has been prioritizing security in Windows, as they introduced Secured-Core PCs to protect...