Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Intel, AMD, Zoom, Splunk Release Patch Tuesday Security Advisories

Intel, AMD, Zoom and Splunk released security advisories on Patch Tuesday to inform customers about vulnerabilities found in their products.

Intel, AMD, Zoom and Splunk have each released security advisories on the first Patch Tuesday of 2024 to inform customers about vulnerabilities found in their products.

Intel has published three new advisories announcing patches. Two of them describe a total of six high-severity and one medium-severity local privilege escalation vulnerabilities in NUC BIOS firmware.

The chip giant has also informed customers about four privilege escalation and denial-of-service (DoS) vulnerabilities in NUC software. All of the flaws require local access for exploitation.

AMD has published one new advisory this Patch Tuesday to announce that no mitigation is planned for a low-severity issue involving SEV-SNP.  

“A researcher has reported that a host can potentially suppress delivery of debug exceptions to SEV-SNP guests that have the restricted injection feature enabled,” the company explained. “For example, a software-based debugger generating hardware-based exceptions for the purpose of debugging may not see the exceptions delivered to the VM guest.”

Splunk has released four new advisories. One of them informs customers about seven critical- and high-severity vulnerabilities patched in Splunk Enterprise Security with third-party package updates. 

Advertisement. Scroll to continue reading.

Another advisory covers six high-severity flaws patched in User Behavior Analytics with third-party package updates. 

The company has also patched two medium-severity vulnerabilities in Enterprise Security. The flaws allow an authenticated attacker to cause a DoS condition to an investigation.

Zoom has published one advisory to inform customers that Zoom Desktop, VDI Client and SDKs for Windows are affected by a high-severity flaw that could allow an authenticated attacker to escalate privileges via local access. Patches have been released. 

Related: Siemens, Schneider Electric Release First ICS Patch Tuesday Advisories of 2024

Related: SAP’s First Patches of 2024 Resolve Critical Vulnerabilities

Related: Microsoft Ships Urgent Fixes for Critical Flaws in Windows Kerberos, Hyper-V

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.