{"id":10403,"date":"2019-07-10T10:33:01","date_gmt":"2019-07-10T08:33:01","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=10403"},"modified":"2023-07-19T16:24:11","modified_gmt":"2023-07-19T14:24:11","slug":"intel-verffentlich-sicherheitsupdates-9-juli-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/07\/10\/intel-verffentlich-sicherheitsupdates-9-juli-2019\/","title":{"rendered":"Intel Releases Security Updates (July 9, 2019)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2019\/07\/10\/intel-verffentlich-sicherheitsupdates-9-juli-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Intel has released several security updates on July 9, 2019 to fix vulnerabilities in Intel Solid State Drives for Data Centers and Intel Processor Diagnostic Tool. One of the vulnerabilities is rated as high. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg01.met.vgwort.de\/na\/34802a64dcde4aae9923d19a700be548\" width=\"1\" height=\"1\">I came across a message from the <a href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2019\/07\/09\/intel-releases-security-updates\" target=\"_blank\" rel=\"noopener noreferrer\">US-CERT<\/a> via a private Twitter notification, which refers to the security updates for fixing vulnerabilities in Intel Solid State Drives for Data Centers and Intel Processor Diagnostic Tool. <\/p>\n<p>An attacker could exploit these vulnerabilities to escalate permissions on a previously infected computer. The Cybersecurity and Infrastructure Security Agency (CISA) recommends that users and administrators review the Intel Security Advisories INTEL-SA-00267 and INTEL-SA-00268and perform the necessary updates.<\/p>\n<h2>INTEL-SA-00267<\/h2>\n<p>INTEL-SA-00267 describes a possible vulnerability (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-18095\" rel=\"noopener noreferrer\" target=\"_blank\">CVE-2018-18095<\/a>) in Intel\u00ae Solid State Drives (SSD) firmware of the S4500\/S4600 data center (DC) series. A vulnerability in the firmware may allow permissions to escalate.<\/p>\n<p>CVSS Base Score: 5.3 Medium, affected products:<br \/>Intel\u00ae SSD DC S4500 Series firmware before SCV10150<br \/>Intel\u00ae SSD DC S4600 Series firmware before SCV10150<\/p>\n<p>Updates can be downloaded here<\/p>\n<h2>INTEL-SA-00268<\/h2>\n<p>INTEL-SA-00268 describes a potential vulnerability (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11133\" rel=\"noopener noreferrer\" target=\"_blank\">CVE-2019-11133<\/a>) in the Intel\u00ae Processor Diagnostic Tool. This can allow an escalation of privileges, denial of service or information disclosure.<\/p>\n<p>CVSS Base Score: 8.2 High, affected products:<br \/>Intel\u00ae Processor Diagnostic Tool for 32-bit before version 4.1.2.24_32bit<br \/>Intel\u00ae Processor Diagnostic Tool for 64-bit before version 4.1.2.24_64bit<\/p>\n<p>Updates can be downloaded here<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Intel has released several security updates on July 9, 2019 to fix vulnerabilities in Intel Solid State Drives for Data Centers and Intel Processor Diagnostic Tool. One of the vulnerabilities is rated as high.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71,580,22],"tags":[599,69,195],"class_list":["post-10403","post","type-post","status-publish","format-standard","hentry","category-computer","category-security","category-update","tag-intel","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=10403"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10403\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=10403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=10403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=10403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}