Security Experts:

Connect with us

Hi, what are you looking for?


Endpoint Security

Intel Patches Severe Vulnerabilities in Firmware, Management Software

Intel on Tuesday published 27 security advisories detailing roughly 60 vulnerabilities across firmware, software libraries, and endpoint and data center management products.

Intel on Tuesday published 27 security advisories detailing roughly 60 vulnerabilities across firmware, software libraries, and endpoint and data center management products.

The most severe of these – based on its CVSS score – is a privilege escalation bug in the Intel-maintained Open AMT Cloud Toolkit, an open-source toolkit for integrating OOB management solutions.

Tracked as CVE-2022-25899 (CVSS score of 9.9), the vulnerability is described as an authentication bypass that an unauthenticated attacker may exploit over the network.

Intel recommends updating to Open AMT Cloud Toolkit versions 2.0.2 or 2.2.2, which address the security issue.

Another critical-severity vulnerability that Intel addressed this week impacts its Data Center Manager, a solution for monitoring operational information of devices within data centers.

The issue – CVE-2022-21225, CVSS score of 9.0 – is described as an improper access control that an authenticated attacker could exploit to escalate privileges via adjacent access.

The advisory for this vulnerability details three other bugs in Data Center Manager, including another improper access control issue, an improper initialization flaw, and an improper input validation bug.

On Tuesday, Intel also published ten advisories detailing high-severity vulnerabilities in processor firmware, NUC Laptop Kits, Active Management Technology (AMT) and Standard Manageability, Driver & Support Assistant (DSA) software, Rapid Storage Technology (RST) software, Integrated Performance Primitives (IPP) Cryptography software, Hardware Accelerated Execution Manager (HAXM) software, Edge Insights for Industrial software, and Wireless Bluetooth and Killer Bluetooth products.

Successful exploitation of most of these vulnerabilities could lead to escalation of privilege, while other issues could be exploited to leak information.

For most issues, the tech giant recommends updating the impacted products to newer releases that contain the necessary fixes. For Intel AMT and Intel Standard Manageability, however, Intel recommends enabling TLS and BIOS password protections to mitigate the identified vulnerabilities.

The remaining 12 advisories that Intel published this week deal with medium- and low-severity vulnerabilities. One of these details CVE-2022-21233 – also referred to as ÆPIC Leak – a novel attack method targeting Intel processors that could allow an attacker to leak potentially sensitive information.

Further information on all of the addressed issues can be found on Intel’s security center.

Related: Retbleed: New Speculative Execution Attack Targets Intel, AMD Processors

Related: Intel Patches High-Severity Vulnerabilities in BIOS, Boot Guard

Related: Intel Software and Firmware Updates Patch 18 High-Severity Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet