{"id":14127,"date":"2020-04-16T08:45:32","date_gmt":"2020-04-16T06:45:32","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=14127"},"modified":"2023-08-25T23:01:04","modified_gmt":"2023-08-25T21:01:04","slug":"intel-security-advisories-14-april-2020","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/04\/16\/intel-security-advisories-14-april-2020\/","title":{"rendered":"Intel Security Advisories (April 14, 2020)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/04\/16\/intel-security-advisories-14-april-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Intel has published several security advisories about vulnerabilities in products in the Product Security Center on April 14, 2020. This ranges from drivers to NUC firmware and also includes product discontinuations. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/2d78d49a8c024348b8984cfffdfc49dd\" width=\"1\" height=\"1\">These publications can be found in the <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/default.html\">Product Security Center<\/a>. Here is an excerpt of what is new as of April 14, 2020<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00363.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae NUC Firmware Advisory<\/a> (INTEL-SA-00363): A potential security vulnerability in system firmware for some Intel\u00ae NUC may allow escalation of privilege. Intel is releasing a firmware update to mitigate this potential vulnerability.\n<li><a href=\"https:\/\/web.archive.org\/web\/20230524124118\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00359.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae Binary Configuration Tool for Windows Advisory<\/a> (INTEL-SA-00359): A potential security vulnerability in the Intel\u00ae Binary Configuration Tool for Windows may allow escalation of privilege.&nbsp; Intel is not releasing updates to mitigate this potential vulnerability and has issued a Product Discontinuation Notice for the Intel\u00ae Binary Configuration Tool for Windows.\n<li><a href=\"https:\/\/web.archive.org\/web\/20230524124127\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00351.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae Modular Server Compute Module Advisory<\/a> (INTEL-SA-00351): A potential security vulnerability in Intel\u00ae Modular Server MFS2600KISPP Compute Module may allow escalation of privilege or denial of service.<b> <\/b>Intel is not releasing updates to mitigate this potential vulnerability and has issued a Product Discontinuation Notice for Intel\u00ae Modular Server MFS2600KISPP Compute Module.\n<li><a href=\"https:\/\/web.archive.org\/web\/20230524124127\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00344.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae Driver and Support Assistant Advisory<\/a> (INTEL-SA-00344): A potential security vulnerability in the Intel\u00ae Driver and Support Assistant may allow denial of service.<strong> <\/strong>A race condition in the Intel(R) Driver and Support Assistant before version 20.1.5 may allow an authenticated user to potentially enable denial of service via local access.<strong> <\/strong>Intel is releasing software updates to mitigate this potential vulnerability.\n<li><a href=\"https:\/\/web.archive.org\/web\/20230524124127\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00338.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae PROSet\/Wireless WiFi Software Advisory<\/a> (INTEL-SA-00338): Potential security vulnerabilities in some Intel\u00ae PROSet\/Wireless WiFi products may allow escalation of privilege or denial of service.<b> <\/b>Intel is releasing software updates to mitigate these potential vulnerabilities.\n<li><a href=\"https:\/\/web.archive.org\/web\/20230524124127\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00327.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae Data Migration Software Advisory<\/a> (INTEL-SA-00327): A potential security vulnerability in Intel\u00ae Data Migration Software may allow escalation of privilege.<b> <\/b>Intel is not releasing updates to mitigate this potential vulnerability and has issued a Product Discontinuation Notice for Intel\u00ae Data Migration Software.<\/li>\n<\/ul>\n<p>Details can be found in the respective linked individual pages with the safety instructions. (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/intel-april-platform-update-fixes-high-severity-security-issues\/\" target=\"_blank\" rel=\"noopener noreferrer\">via<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Intel has published several security advisories about vulnerabilities in products in the Product Security Center on April 14, 2020. This ranges from drivers to NUC firmware and also includes product discontinuations.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[599,69],"class_list":["post-14127","post","type-post","status-publish","format-standard","hentry","category-security","tag-intel","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/14127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=14127"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/14127\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=14127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=14127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=14127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}