Security Experts:

Intel Patches Tens of Vulnerabilities in Software, Hardware Products

Intel on Tuesday announced the release of updates that patch tens of vulnerabilities across many of the company’s software and hardware products.

The chipmaker’s Patch Tuesday updates for February 2021 were described in 19 advisories, including four that cover high-severity vulnerabilities.

The list of high-severity flaws includes a privilege escalation issue in the Intel Solid State Drive (SSD) Toolbox, and a denial-of-service (DoS) flaw in the XMM 7360 Cell Modem that can be exploited by an unauthenticated attacker who has network access.

In its graphics drivers, Intel patched nearly two dozen vulnerabilities, including five high-severity bugs that can be exploited by authenticated attackers — four of them allow privilege escalation and one can be exploited for DoS attacks.

Intel also informed customers about five vulnerabilities in Server Board, Server System and Compute Modules Baseboard Management Controller (BMC) products, including two high-severity privilege escalation issues.

Medium-severity vulnerabilities have been patched in RealSense Depth Camera Manager (DCM), Ethernet I210 Controller series network adapters, Trace Analyzer and Collector, SOC Driver Package for STK1A32SC, Ethernet E810 adapter drivers for Linux and Windows, 722 Ethernet controllers, Software Guard Extensions (SGX), Extreme Tuning Utility (XTU), Quartus Prime software, PROSet/Wireless WiFi and Killer drivers for Windows 10, Enhance Privacy ID (EPID) SDK, Server Board Onboard Video driver for Windows, Collaboration Suite for WebRTC, and the Optane DC Persistent Memory installer for Windows.

These security holes can lead to privilege escalation, DoS attacks and information disclosure, but exploitation in many cases requires a privileged user and local access.

Software and firmware updates have been released by Intel to patch these vulnerabilities. Intel has replaced SSD Toolbox with the Memory and Storage (MAS) tool, so SSD Toolbox will not be updated to patch the high-severity privilege escalation flaw.

Many of the vulnerabilities disclosed this week were discovered by Intel employees.

Microsoft’s Patch Tuesday updates for February 2021 fix over 50 vulnerabilities, including an actively exploited Windows kernel flaw. Adobe has also addressed more than 50 security holes, including a Reader vulnerability that has been exploited in limited attacks against Windows users.

Related: Vulnerability in Intel Chipsets Allows Hackers to Obtain Protected Data

Related: Load Value Injection: Intel CPUs Vulnerable to Reverse Meltdown Attack

Related: Intel Releases Firmware Updates to Patch Critical Vulnerability in AMT, ISM

view counter
Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.