{"id":22211,"date":"2021-11-20T00:10:00","date_gmt":"2021-11-19T23:10:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=22211"},"modified":"2021-11-19T23:44:21","modified_gmt":"2021-11-19T22:44:21","slug":"schwerwiegende-bios-fehler-tangieren-intel-cpus","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/11\/20\/schwerwiegende-bios-fehler-tangieren-intel-cpus\/","title":{"rendered":"Serious BIOS errors affect Intel CPUs"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=259617\" target=\"_blank\" rel=\"noopener\">German<\/a>]Another addendum from this week. Intel has released a security advisory saying that its processors are affected by BIOS flaws. Potential vulnerabilities in the BIOS for some Intel processors could allow privilege escalation. Intel issues firmware updates via the board manufacturers to mitigate these potential vulnerabilities.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/918137c7071649a5ac8ef886647e64cc\" width=\"1\" height=\"1\">Security advisory <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00562.html\" target=\"_blank\" rel=\"noopener\">INTEL-SA-00562<\/a>&nbsp; states that potential vulnerabilities in the BIOS reference code for some Intel processors may allow privilege escalation.&nbsp; Intel is issuing firmware updates to mitigate these potential vulnerabilities.<\/p>\n<h2>Vulnerability CVE-2021-0157<\/h2>\n<p>Vulnerability <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-0157\" target=\"_blank\" rel=\"noopener\">CVE-2021-0157 <\/a>is based on the fact that insufficient control flow management in BIOS firmware for some Intel(R) processors may allow a privileged user to perform privilege escalation via local access. The CVSS Base Score for this vulnerability is 8.2 (High).<\/p>\n<h2>Vulnerability CVE-2021-0158<\/h2>\n<p>Vulnerability <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-0158\" target=\"_blank\" rel=\"noopener\">CVE-2021-0158<\/a> results from improper input validation in BIOS firmware for some Intel(R) processors. This could allow a privileged user to escalate privileges via local access. The CVSS Base Score for this vulnerability is 8.2 (High).  <\/p>\n<h2>Affected processors<\/h2>\n<ul>\n<li>Intel\u00ae Xeon\u00ae Processor E Family\n<li>Intel\u00ae Xeon\u00ae Processor E3 v6 Family\n<li>Intel\u00ae Xeon\u00ae Processor W Family\n<li>3rd Generation Intel\u00ae Xeon\u00ae Scalable Processors\n<li>11th Generation Intel\u00ae Core\u2122 Processors\n<li>10th Generation Intel\u00ae Core\u2122 Processors\n<li>8th Generation Intel\u00ae Core\u2122 Processors\n<li>7th Generation Intel\u00ae Core\u2122 Processors\n<li>Intel\u00ae Core\u2122 X-series Processors\n<li>Intel\u00ae Celeron\u00ae Processor N Series\n<li>Intel\u00ae Pentium\u00ae Silver Processor Series<\/li>\n<\/ul>\n<p>Intel recommends users of affected processors update to the latest version provided by the board manufacturer, which fixes these issues. (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/high-severity-bios-flaws-affect-numerous-intel-processors\/\" target=\"_blank\" rel=\"noopener\">via<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Another addendum from this week. Intel has released a security advisory saying that its processors are affected by BIOS flaws. Potential vulnerabilities in the BIOS for some Intel processors could allow privilege escalation. Intel issues firmware updates via the board &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/11\/20\/schwerwiegende-bios-fehler-tangieren-intel-cpus\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-22211","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=22211"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22211\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=22211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=22211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=22211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}