Friday, July 10, 23:29
Home security Intel: Security CSME error detected!

Intel: Security CSME error detected!

IntelIntel reports a critical bug found in CSME and urges users to implement a repair, which is now available as soon as possible. The Intel Converged Engineer (CSME) security and management engine is a chipset subsystem that empowers Intel Active Management technologies. An error was detected in the CSME firmware by Intel security team. Should hackers exploit this error to start scaling privileges, denial of service and information leak attacks. This error, identified as CVE-2019-14598, has received a CVSS 8.2 base score, which is the highest severity score. Therefore the error is considered critical.

Intel has released a firmware update to mitigate the error affecting CSME versions prior to 12.0.49 (including only IoT: 12.0.56), 13.0.21 and 14.0.11.

Intel also recommends updating to CSME versions 12.0.49, 13.0.21, and 14.0.11 or later from the system manufacturer that is addressing these issues. It also advises IoT clients to use CSME version 12.0.55 to update to 12.0.56 or later provided by the manufacturer of the system that addresses these issues.

Another series of updates aims to resolve security issues found in Intel's RAID Web 2 (RWC2) and Web RAID 3 (RWC3) for Windows.

The first error, CVE-2020-0562, affects all versions of RWC2 and has a severity rating of 6.7, classifying the error as moderate severity. Locally certified users can exploit the error to scale their privileges.

However, Intel does not intend to fix the problem. Instead, it states that the product will be discontinued and recommends that users do upgrade in RWC3.

The second security error is the same with the same possible consequences. Detected as CVE-2020-0564 and affects RWC3 prior to release Intel's Multicore Platform Stack (MPSS), prior to version 3.8.6, also received a fix for CVE-2020-0563, which was 6,7 with a medium severity. This error can be exploited by hackers to trigger escalation of privileges through local access due to malicious rights management.
Intel has reported another mid-level security bug that is identified as CVE-2020-0560, and is not prepared to release a patch. This error affects the Intel Renesas Electronics USB 3.0 driver and allows scaling of privileges across all versions. So he suggests users of Intel Electronics Renesas Electronics USB 3.0 driver to uninstall or discontinue use at the earliest opportunity.

In addition, Intel has fixed a low-severity error in Intel software extensions (SGX). This bug, detected as CVE-2020-0561 and rated 2,5, can allow certified users to scale their privileges through local access.

At the same time, Microsoft also released its monthly bundle of security fixes, while the February set fixed a total of 99 bugs, of which 11 were rated critical.Microsoft Adobe

Software including Internet Explorer, Edge browser, Microsoft Exchange Server, and Microsoft Office are included in the update.
The Adobe also many software bugs, such as Acrobat and Reader, Flash and Adobe Experience Manager.

Finally, the Microsoft released Intel updates for their versions Windows 10, 1909 and 1903, to help Intel distribute firmware that is protected from speculative attacks.


Please enter your comment!
Please enter your name here


Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.

Spotify, Pinterest and Tinder are "crashing" because of D. Facebook

Popular applications and services, such as Spotify, Pinterest and Tinder, have cracked iOS devices ....

Technology and Teachers: What Do Experts Appreciate?

Too many educators around the world have struggled to adopt the technological tools in the midst of the pandemic to deliver lessons ...

COVID-19 apps: Virus detection applications violate privacy

COVID-19 apps: Beware, they violate private privacy Virus detection applications violate private privacy by recording more data than they need, setting ...

Debian 8 “Jessie”: Another version in End-of-life stage

After a long support of Debian 8 "Jessie", the development team of the operating system announced that it stops ...

Conti ransomware: Is it the successor to Ryuk ransomware?

Conti ransomware is a new threat targeting corporate networks. Its advanced capabilities allow it ...

Smartwatch tracker that helps vulnerable people can be hacked

Researchers have uncovered a number of serious security issues in a smartwatch tracker used in applications, including services designed for ...

WhatsApp: QR codes help you communicate with businesses

Facebook's messaging service, WhatsApp, has introduced two new features to help businesses ...

Zoom: Works to correct zero-day vulnerability

Zoom teleconferencing software works to fix a zero-day vulnerability revealed by the security company ...