Chipmakers Intel and AMD both released security advisories this Patch Tuesday. They have informed customers about a total of more than 100 vulnerabilities found in their products.
Intel
Intel has released 38 advisories covering over 80 vulnerabilities. The company has addressed nearly two dozen issues rated ‘high severity’ — the remaining bugs have been rated ‘medium severity’ and one is ‘low severity’.
High-severity vulnerabilities that can lead to privilege escalation have been resolved in QuickAssist Technology (QAT), the Retail Edge Mobile iOS application, Server Board BMC firmware, processors, WULT software, i915 Graphics drivers for Linux, Data Center Manager (DCM), Virtual RAID on CPU (VROC), Trace Analyzer and Collector, NUC firmware, System Usage Report (SUR), and One Boot Flash Update (OFU).
Medium-severity flaws have been addressed in Unite products, NUC products, Data Center Manager (DCM), Connect M Android application, MacCPUID, Integrated Performance Primitives (IPP), Setup and Configuration Software (SCS), Endpoint Management Assistant (EMA), Quartus Prime Pro, Smart Campus Android application, Digital Signal Processing (DSP), oneAPI Toolkit, FPGA firmware, and Pathfinder for RISC-V.
A majority of these vulnerabilities can be exploited for privilege escalation and some can lead to a DoS condition.
A low-severity issue that can lead to information disclosure was patched in the Open Cache Acceleration Software (CAS) for Linux maintained by Intel.
Patches are available for most vulnerabilities, and for some flaws the company has made available mitigations or workarounds.
AMD
AMD published two Patch Tuesday advisories: one describing 19 client vulnerabilities, and one covering 14 server vulnerabilities.
The client flaws — all with 2021 CVE identifiers — are low- and medium-severity issues affecting components of Athlon, Ryzen and Threadripper processors. Exploitation can lead to arbitrary code execution, DoS, or information disclosure.
AMD has released firmware updates that should address these vulnerabilities.
In the case of the server vulnerabilities, most of them have 2021 CVE identifiers and two have 2023 CVEs. There is one high- and 13 medium-severity issues that can lead to code execution, information disclosure, privilege escalation, or a DoS condition.
The security holes impact AMD Secure Processor (ASP), System Management Unit (SMU), Secure Encrypted Virtualization (SEV), and other platform components.
Related: Microsoft Patch Tuesday: 40 Vulnerabilities, 2 Zero-Days
Related: Adobe Patches 14 Vulnerabilities in Substance 3D Painter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
