Windows 10 security: bad bug in our processor diagnostics application, so correct yourself now, says Intel



[ad_1]

Meltdown and Specter: researchers discover seven new variations
Experiments have shown that the processors of AMD, ARM and Intel are affected.

Windows users and administrators who have already downloaded the Intel Processor Diagnostic Tool (IPDT) must update to the latest versions of 32-bit and 64-bit products.

According to Intel, IPDT versions 4.1.2.24 and earlier suffer from an "incorrect access control" that can be exploited by an authenticated local user to elevate privileges, disclose information, or cause a denial of service.

SEE: 10 tips for new cybersecurity pros (Free PDF)

Intel has rated the bug's severity as "high," with a CVSS version 3 score of 8.2, because even though the attacker must be local, the bug does not require a complex attack for the attacker. # 39; use.

Intel offers fixes for the IPDT version 4.1.2.34 bug, available for Windows 10, Windows 8.1, Windows 8, Windows 7, and Windows Server 2008 R2.

The tool is used to check the features and functionality of Intel microprocessors and to check their operating frequency.

The bug was discovered by a researcher from the security company Eclypsium, specializing in firmware security. It was launched by a former threat researcher at Intel, who discovered several new variants of the Spectrum attacks that could exploit Intel's speculative execution routines in its processors.

Intel also revealed a distinct average severity fault affecting the firmware of its SSD DC S4500 and SSD DC S4600 series.

"Incorrect firmware authentication for Intel (R) SSD, S4500 series, and Intel (R) DC S4600 Series SSDs before SCV10150 may allow an unprivileged user to potentially enable escalation of privileges through physical access, "notes Intel.

More about Intel and security

[ad_2]

Source link