{"id":11421,"date":"2019-10-11T00:15:00","date_gmt":"2019-10-10T22:15:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=11421"},"modified":"2023-07-19T17:04:11","modified_gmt":"2023-07-19T15:04:11","slug":"security-updates-for-intel-nucs-and-server-tool","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/10\/11\/security-updates-for-intel-nucs-and-server-tool\/","title":{"rendered":"Security updates for Intel NUCs and Server tool"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">Intel has released 2 patches to fix vulnerabilities in his NUC PCs \u2013 but one flaw hasn't been fixes. And the Active System Console tool has a security issue. <\/p>\n<p><!--more--><\/p>\n<h2>Intel NUC advisory<\/h2>\n<p>Intel has released a security advisory INTEL-SA-00296 for hin NUC systems on October 8, 2019. There are potential security vulnerabilities in system firmware for Intel\u00ae NUC may allow Escalation of Privilege, Denial of Service and Information Disclosure vulnerabilities \u2013 which are classified as high. <\/p>\n<ul>\n<li>CVEID: <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-14569\">CVE-2019-14569<\/a>: Description: Pointer corruption in system firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege, denial of service and\/or information disclosure via local access. CVSS Base Score: 7.5 High\n<li>CVEID: <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-14570\">CVE-2019-14570<\/a>: Description: Memory corruption in system firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege, denial of service and\/or information disclosure via local access. CVSS Base Score: 7.5 High<\/li>\n<\/ul>\n<table cellspacing=\"0\" cellpadding=\"2\" width=\"640\" border=\"1\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"451\"><b>Affected Products <\/b><\/td>\n<td valign=\"top\" width=\"189\"><b>Updated Firmware<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"451\">Intel\u00ae NUC 8 Mainstream Game Kit<\/td>\n<td valign=\"top\" width=\"189\">INWHL357<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"451\">Intel\u00ae NUC 8 Mainstream Game Mini Computer<\/td>\n<td valign=\"top\" width=\"189\">INWHL357<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"451\">Intel\u00ae NUC Board DE3815TYBE (H26998-500 &amp; later)<\/td>\n<td valign=\"top\" width=\"189\">TY0022<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"451\">Intel\u00ae NUC Kit DE3815TYKHE (H27002-500 &amp; later)<\/td>\n<td valign=\"top\" width=\"189\">TY0022<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"451\">Intel\u00ae NUC Board DE3815TYBE<\/td>\n<td valign=\"top\" width=\"189\">TY0067<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"451\">Intel\u00ae NUC Kit DE3815TYKHE<\/td>\n<td valign=\"top\" width=\"189\">TY0067<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"451\">Intel\u00ae NUC Kit DN2820FYKH<\/td>\n<td valign=\"top\" width=\"189\">\n<p>FY0069<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Intel recommends that users update to the latest version. There is also a 2nd advisory INTEL-SA-00286 (Intel\u00ae Smart Connect Technology for Intel\u00ae NUC Advisory):<\/p>\n<blockquote>\n<p>CVEID: <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11167\">CVE-2019-11167<\/a>: Description: Improper file permission in software installer for Intel(R) Smart Connect Technology for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. CVSS Base Score: 6.3 Medium<\/p>\n<\/blockquote>\n<p>There is no fix available. Intel recommends that users of Intel\u00ae Smart Connect Technology for Intel\u00ae NUC uninstall or discontinue use at their earliest convenience.<\/p>\n<p>And there is another Escalation of Privilege vulnerability CVE-2019-11120 in Intel's Active System Console. Intel has released advisory INTEL-SA-00261 and quotes the vulnerability as 'medium'<\/p>\n<blockquote>\n<p>CVEID: <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11120\">CVE-2019-11120<\/a>: Description: Insufficient path checking in the installer for Intel(R) Active System Console before version 8.0 Build 24 may allow an authenticated user to potentially enable escalation of privilege via local access. CVSS Base Score: 6.7 Medium<\/p>\n<\/blockquote>\n<h4>Affected Products: Intel\u00ae Active System Console for Intel\u00ae Server Boards and Systems based on Intel\u00ae 62X Chipset before version 8.0 Build 24. Intel recommends that users of Intel\u00ae Active System Console for Intel\u00ae Server Boards and Systems based on Intel\u00ae 62X Chipset update to 8.0 Build 24 or later.<\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Intel has released 2 patches to fix vulnerabilities in his NUC PCs \u2013 but one flaw hasn't been fixes. And the Active System Console tool has a security issue.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,22],"tags":[69,1544,195],"class_list":["post-11421","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-update","tag-security","tag-software","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/11421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=11421"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/11421\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=11421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=11421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=11421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}