{"id":13168,"date":"2020-02-14T15:13:17","date_gmt":"2020-02-14T14:13:17","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=13168"},"modified":"2020-02-14T15:13:17","modified_gmt":"2020-02-14T14:13:17","slug":"intel-security-advisories-february-11-2020","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/02\/14\/intel-security-advisories-february-11-2020\/","title":{"rendered":"Intel Security Advisories (February 11, 2020)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/02\/14\/intel-security-advisories-11-februar-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]On February 11, 2020, Intel published several security advisories on vulnerabilities in products in the Product Security Center. These range from Intel\u00ae RAID Web Console 3 (RWC3) for Windows to USB drivers. There will be no more updates for some products; Intel has now discontinued these. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/0ec4acaa99044823a411a2ed15649250\" width=\"1\" height=\"1\">German blog reader Ismail <a href=\"https:\/\/www.borncity.com\/blog\/diskussion-allgemeines\/#comment-85175\" target=\"_blank\" rel=\"noopener noreferrer\">pointed out<\/a> the newly published deatils in <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/default.html\" target=\"_blank\" rel=\"noopener noreferrer\">Product Security Center<\/a> (thanks). <\/p>\n<ul>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00341.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae RWC3 Advisory<\/a> (INTEL-SA-00341): A potential (Escalation of Privilege) vulnerability in Intel\u00ae RAID Web Console 3 (RWC3) for Windows could allow privilege escalation. Intel has released software updates to address this potential vulnerability.\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00340.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae MPSS Advisory<\/a> (INTEL-SA-00340): An Escalation of Privilege vulnerability exists in the Intel\u00ae Manycore Platform Software Stack (MPSS). Improper privileges in the Intel\u00ae Manycore MPSS installer prior to version 3.8.6 may allow an authenticated user to enable privilege escalation via local access.\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00339.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae RWC2 Advisory<\/a> (INTEL-SA-00339): An Escalation of Privilege vulnerability exists in the Intel\u00ae RAID Web Console 2 (RWC2). Intel is not releasing updates to address this potential vulnerability and has issued a product announcement for Intel\u00ae RWC2.\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00336.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae SGX SDK Advisory<\/a> (INTEL-SA-00336): An Escalation of Privilege vulnerability exists in the Intel\u00ae Software Guard Extensions (SGX) SDK. Through improper initialization in the Intel(R) SGX SDK, an authenticated user may be able to achieve an escalation of privileges via local access. Intel is releasing software updates to address this potential vulnerability.\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00307.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae CSME Advisory<\/a> (INTEL-SA-00307): There are three vulnerabilities (Escalation of Privilege, Denial of Service, Information Disclosure) in the CSME subsystem. Improper authentication in the subsystem in Intel(R) CSME versions 12.0 to 12.0.48 (IOT only: 12.0.56), versions 13.0 to 13.0.20, versions 14.0 to 14.0.10 can allow a privileged user to allow an escalation of privileges, denial of service, or information disclosure about local access. Intel releases firmware updates to mitigate this potential vulnerability.\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00273.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae Renesas Electronics\u00ae USB 3.0 Driver Advisory<\/a> (INTEL-SA-00273):\n<p>An Escalation of Privilege vulnerability exists in the Intel\u00ae Renesas Electronics\u00ae USB 3.0 driver. Improper privileges in the installation program for the Intel\u00ae Renesas Electronics\u00ae USB 3.0 driver, all versions, may allow an authenticated user to enable escalation of privileges via local access. Intel is not releasing updates to address this potential vulnerability and has issued a product announcement for this driver.<\/p>\n<\/li>\n<\/ul>\n<p>Details can be found in the respective linked individual pages with the safety instructions. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]On February 11, 2020, Intel published several security advisories on vulnerabilities in products in the Product Security Center. These range from Intel\u00ae RAID Web Console 3 (RWC3) for Windows to USB drivers. There will be no more updates for some &hellip; <a href=\"https:\/\/borncity.com\/win\/2020\/02\/14\/intel-security-advisories-february-11-2020\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[599,69,1544],"class_list":["post-13168","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-intel","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=13168"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13168\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=13168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=13168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=13168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}