Intel on Tuesday announced the release of updates that patch tens of vulnerabilities across many of the company’s software and hardware products.
The chipmaker’s Patch Tuesday updates for February 2021 were described in 19 advisories, including four that cover high-severity vulnerabilities.
The list of high-severity flaws includes a privilege escalation issue in the Intel Solid State Drive (SSD) Toolbox, and a denial-of-service (DoS) flaw in the XMM 7360 Cell Modem that can be exploited by an unauthenticated attacker who has network access.
In its graphics drivers, Intel patched nearly two dozen vulnerabilities, including five high-severity bugs that can be exploited by authenticated attackers — four of them allow privilege escalation and one can be exploited for DoS attacks.
Intel also informed customers about five vulnerabilities in Server Board, Server System and Compute Modules Baseboard Management Controller (BMC) products, including two high-severity privilege escalation issues.
Medium-severity vulnerabilities have been patched in RealSense Depth Camera Manager (DCM), Ethernet I210 Controller series network adapters, Trace Analyzer and Collector, SOC Driver Package for STK1A32SC, Ethernet E810 adapter drivers for Linux and Windows, 722 Ethernet controllers, Software Guard Extensions (SGX), Extreme Tuning Utility (XTU), Quartus Prime software, PROSet/Wireless WiFi and Killer drivers for Windows 10, Enhance Privacy ID (EPID) SDK, Server Board Onboard Video driver for Windows, Collaboration Suite for WebRTC, and the Optane DC Persistent Memory installer for Windows.
These security holes can lead to privilege escalation, DoS attacks and information disclosure, but exploitation in many cases requires a privileged user and local access.
Software and firmware updates have been released by Intel to patch these vulnerabilities. Intel has replaced SSD Toolbox with the Memory and Storage (MAS) tool, so SSD Toolbox will not be updated to patch the high-severity privilege escalation flaw.
Many of the vulnerabilities disclosed this week were discovered by Intel employees.
Microsoft’s Patch Tuesday updates for February 2021 fix over 50 vulnerabilities, including an actively exploited Windows kernel flaw. Adobe has also addressed more than 50 security holes, including a Reader vulnerability that has been exploited in limited attacks against Windows users.
Related: Vulnerability in Intel Chipsets Allows Hackers to Obtain Protected Data
Related: Load Value Injection: Intel CPUs Vulnerable to Reverse Meltdown Attack
Related: Intel Releases Firmware Updates to Patch Critical Vulnerability in AMT, ISM

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
