Intel’s Patch Tuesday updates for July 2019 fix a serious vulnerability in the company’s Processor Diagnostic Tool and a less serious issue in its Solid State Drives (SSD) for Data Centers (DC) product.
The flaw affecting the Processor Diagnostic Tool is tracked as CVE-2019-11133 and Intel has assigned it a “high severity” rating with a CVSS score of 8.2.
According to the tech giant, an attacker who has access to a system running the tool can exploit the vulnerability to escalate privileges, obtain information, or cause a denial-of-service (DoS) condition.
The security hole, reported to Intel by researcher Jesse Michael of Eclypsium, has been addressed with the release of version 18.104.22.168. Prior versions, both for 32-bit and 64-bit systems, are affected.
The second vulnerability patched by Intel affects SSD DC S4500/S4600 series firmware and it can also be exploited for privilege escalation. However, this weakness has been classified as “medium severity” as exploitation requires physical access to the targeted device.
The issue, discovered internally by Intel, affects firmware versions prior to SCV10150, which contains a patch.
Intel’s updates for May 2019 patched several Microarchitectural Data Sampling (MDS) vulnerabilities affecting most processors made in the last decade.
The flaws, discovered by researchers at Intel and other organizations, are related to speculative execution and they have been named ZombieLoad, RIDL, Fallout, and Store-to-Leak Forwarding.
They can be exploited locally or remotely to get applications, operating systems, virtual machines and trusted execution environments to leak potentially sensitive information, such as passwords, website content, disk encryption keys and browser history. However, Intel says real-world attacks are not easy to carry out and even if the exploit is successful the attacker may not obtain any valuable information.