Thursday, November 30, 2023

Vulnerability in Intel Processor Diagnostic Tool Let Hackers Perform Escalation of Privilege and DOS Attack

Intel released new security updates with the fixes of two vulnerabilities that affected Intel Processor Diagnostic Tool and Solid State Drives (SSD) for Data Centers (DC) S4500/S4600 Series.

Vulnerability in Processor Diagnostic Tool categorized as “High” Severity and the other vulnerability that affected Solid State Drives (SSD) S4500/S4600 Series marked as “Medium” Severity.

Intel Processor Diagnostic Tool

A software-based privilege escalation vulnerability (CVE-2019-11133) that resides in the Processor Diagnostic Tool before version lets the attacker perform a denial of service attack and steal the sensitive information due to Improper access control.

Jesse Michael from Eclypsium initially discovered this vulnerability reported Intel under responsible disclosed policy.

Affected Products:

Intel® Processor Diagnostic Tool for 32-bit before version
Intel® Processor Diagnostic Tool for 64-bit before version

Intel recommends that users of Intel Processor Diagnostic Tool update to version or later. Download Here.

Intel Solid State Drives (SSD)

Another security vulnerability ( CVE-2018-18095) that affected Intel Solid State Drives (SSD) S4500/S4600 Series firmware that used for Data Centers (DC) let unprivileged user escalate the privilege via physical access.

Affected Products:

Intel® SSD DC S4500 Series firmware before SCV10150.
Intel® SSD DC S4600 Series firmware before SCV10150.

Intel releasing firmware updates to mitigate this vulnerability and recommends updating Intel® SSD DC S4500 Series and Intel® SSD DC S4600 Series firmware to SCV10150 or later.

This vulnerability was found internally by Intel updates are available for download Here

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Microsoft Released Security Update For July With the Fixes of 2 Actively Exploited Zero-Day Vulnerabilities – Update Now

Cisco Security Updates – Vulnerabilities in Cisco Products Let Hackers Gain Unauthorized Remote Access

Android Security Update – Critical Vulnerabilities Let Hackers Control Your Android Phone Remotely


Latest articles

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on...

Zyxel Command Injection Flaws Let Attackers Run OS Commands

Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products,...

North Korean Hackers Attacking macOS Using Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution...

Most Popular Websites Still Allow Users To Have Weak Passwords

The latest analysis shows that tens of millions of people are creating weak passwords...

Chrome Zero-Day Vulnerability That Exploited In The Wild

Google has fixed the sixth Chrome zero-day bug that was exploited in the wild this...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles