Security Advisories
Total: 86
Mar 2024
2024.1 IPU - Intel® Atom® Processor Advisory, March 12, 2024
A potential security vulnerability in some Intel® Atom® Processors may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
INTEL-SA-00898 –2024.1 IPU - Intel® Atom® Processor Advisory
- INTEL-SA-00898
- CVE-2023-28746
Mar 2024
2024.2 IPU - Intel® Chipset Software and SPS Advisory, March 12, 2024
Potential security vulnerabilities in the Intel® Converged Security Management Engine (CSME) installer, Intel® Local Manageability Service software and Intel® Server Platform Servcies (SPS) may allow information disclosure, escalation of privilege, or denial of service.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
INTEL-SA-00923 –2024.2 IPU - Intel® Chipset Software and SPS Advisory
- INTEL-SA-00923
- CVE-2023-27502
- CVE-2023-32633
- CVE-2023-28389
- CVE-2023-35191
Mar 2024
2024.1 IPU - BIOS Advisory, March 12, 2024
A potential security vulnerability in BIOS firmware for some Intel® Processors may allow escalation of privilege. Intel is releasing BIOS updates to mitigate this potential vulnerability.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
INTEL-SA-00929 –2024.1 IPU - BIOS Advisory
- INTEL-SA-00929
- CVE-2023-32282
Mar 2024
2024.1 IPU - Intel® Xeon® Processor Advisory, March 12, 2024
A potential security vulnerability in some 3rd and 4th Generation Intel® Xeon® Processors when using Intel® Software Guard Extensions (SGX) or Intel® Trust Domain Extensions (TDX) may allow escalation of privilege. Intel is releasing firmware updates to mitigate this potential vulnerability.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
INTEL-SA-00960 –2024.1 IPU - Intel® Xeon® Processor Advisory
- INTEL-SA-00960
- CVE-2023-22655
Mar 2024
2024.1 IPU - Intel® Processor Bus Lock Advisory, March 12, 2024
A potential security vulnerability in the bus lock regulator mechanism for some Intel® Processors may allow denial of service. Intel is releasing firmware updates to mitigate this potential vulnerability.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
INTEL-SA-00972 –2024.1 IPU - Intel® Processor Bus Lock Advisory
- INTEL-SA-00972
- CVE-2023-39368
Mar 2024
March 12, 20242024.1 IPU - Intel® Processor Return Predictions Advisory, March 12, 2024
A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing a firmware update to mitigate this potential vulnerability.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
INTEL-SA-00982 –March 12, 20242024.1 IPU - Intel® Processor Return Predictions Advisory
- INTEL-SA-00982
- CVE-2023-38575
Mar 2024
4th Gen Intel® Xeon® Processor Advisory, March 12, 2024
Potential security vulnerabilities in some 4th Generation Intel® Xeon® Processors when using Intel® Software Guard Extensions (SGX) or Intel® Trust Domain Extensions (TDX) may allow escalation of privilege or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
INTEL-SA-00986 –4th Gen Intel® Xeon® Processor Advisory
- INTEL-SA-00986
- CVE-2023-32666
Nov 2023
Intel® Server Board and Server System Firmware Advisory, November 14, 2023
Potential security vulnerabilities in some Intel® Server Board and Server System BIOS firmware may allow escalation of privilege. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
INTEL-SA-00719 - Intel® Server Board and Server System Firmware Advisory
- INTEL-SA-00719
- CVE-2022-29510
- CVE-2022-24379
- CVE-2022-29262
- CVE-2022-33945
- CVE-2023-34431
Nov 2023
Intel® Optane™ SSD and Intel® Optane™ SSD DC Firmware Advisory, November 14, 2023
Potential security vulnerabilities in some Intel® Optane™ SSD and some Intel® Optane™ SSD DC products may allow escalation of privilege, information disclosure or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
INTEL-SA-00758 – Intel® Optane™ SSD and Intel® Optane™ SSD DC Firmware Advisory
- INTEL-SA-00758
- CVE-2023-24588
- CVE-2023-27306
- CVE-2023-27879
- CVE-2023-27519
- CVE-2023-24587
Nov 2023
Intel® QAT Software Advisory, November 14, 2023
Potential security vulnerabilities in some Intel® QuickAssist Technology (QAT) software may allow information disclsoure or escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.
INTEL-SA-00861 – Intel® QAT Software Advisory
- INTEL-SA-00861
- CVE-2023-22313
- CVE-2023-28740
- CVE-2023-28378
- CVE-2023-28741