Vulnerability identifier: #VU46554
Vulnerability risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
8th Generation Intel Core Processors
Hardware solutions /
Firmware
10th Generation Intel Core Processors
Hardware solutions /
Firmware
Intel® Celeron® Processor 5000 Series
Hardware solutions /
Firmware
Intel Celeron Processor 4000 Series
Hardware solutions /
Firmware
9th Generation Intel Core Processors
Client/Desktop applications /
Web browsers
Vendor: Intel
Description
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors. A remote user on the local network can pass specially crafted data to the system and perform a denial of service (DoS) attack.
Mitigation
Intel recommends that users of above Intel® products update to the
latest BIOS version provided by the system manufacturer that addresses
these issues.
Vulnerable software versions
8th Generation Intel Core Processors: 15.33.49.5100 - 3349
9th Generation Intel Core Processors: 15.33.49.5100 - 26.20.100.7755
10th Generation Intel Core Processors: 15.33.49.5100 - 26.20.100.7755
Intel® Celeron® Processor 5000 Series: All versions
Intel Celeron Processor 4000 Series: All versions
External links
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00356.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.