SK-CERT Bezpečnostné varovanie V20230222-01

Dôležitosť Kritická
Klasifikácia Neutajované/TLP WHITE
CVSS Skóre
10.0
Identifikátor
Intel produkty – kritická bezpečnostná zraniteľnosť
Popis
Spoločnosť Intel vydala bezpečnostné aktualizácie na svoje portfólio produktov, ktoré opravujú viacero bezpečnostných zraniteľností z ktorých je jedna kritická.
Najzávažnejšia kritická bezpečnostná zraniteľnosť spočíva v nedostatočnej implementácii bezpečnostných mechanizmov a umožňuje vzdialenému, neautentifikovanému útočníkovi prostredníctvom zaslania špeciálne upravených IPMI správ vykonať škodlivý kód s následkom úplného narušenia dôvernosti, integrity a dostupnosti systému.
Dátum prvého zverejnenia varovania
15.02.2023
CVE
CVE-2021-0187, CVE-2021-33104, CVE-2021-39295, CVE-2021-39296, CVE-2022-21163, CVE-2022-21216, CVE-2022-25905, CVE-2022-25987, CVE-2022-25992, CVE-2022-26032, CVE-2022-26052, CVE-2022-26062, CVE-2022-26076, CVE-2022-26343, CVE-2022-26345, CVE-2022-26421, CVE-2022-26425, CVE-2022-26509, CVE-2022-26512, CVE-2022-26837, CVE-2022-26840, CVE-2022-26841, CVE-2022-26843, CVE-2022-26888, CVE-2022-27170, CVE-2022-27234, CVE-2022-27808, CVE-2022-29493, CVE-2022-29494, CVE-2022-29514, CVE-2022-29523, CVE-2022-30339, CVE-2022-30530, CVE-2022-30531, CVE-2022-30539, CVE-2022-30692, CVE-2022-30704, CVE-2022-31476, CVE-2022-32231, CVE-2022-32570, CVE-2022-32575, CVE-2022-32764, CVE-2022-32971, CVE-2022-33190, CVE-2022-33196, CVE-2022-33892, CVE-2022-33902, CVE-2022-33946, CVE-2022-33964, CVE-2022-33972, CVE-2022-34153, CVE-2022-34157, CVE-2022-34346, CVE-2022-34841, CVE-2022-34843, CVE-2022-34849, CVE-2022-34854, CVE-2022-34864, CVE-2022-35729, CVE-2022-35883, CVE-2022-36278, CVE-2022-36287, CVE-2022-36289, CVE-2022-36348, CVE-2022-36369, CVE-2022-36382, CVE-2022-36397, CVE-2022-36398, CVE-2022-36416, CVE-2022-36794, CVE-2022-36797, CVE-2022-37329, CVE-2022-37340, CVE-2022-38056, CVE-2022-38090, CVE-2022-41314, CVE-2022-41614
IOC
Zasiahnuté systémy
Intel® ON Event Series
Intel® oneAPI Toolkits
2023.1 IPU – Intel® Atom® and Intel® Xeon® Scalable Processors
Intel® Quartus®
2023.1 IPU – BIOS
2023.1 IPU – Intel® Chipset
Intel® Integrated Sensor Solution
Intel® DSA
Intel® Battery Life Diagnostic
Intel® Iris® Xe MAX
Intel® FPGA SDK for OpenCL™ Intel® Quartus® Prime Pro Software
Intel® SUR
3rd Generation Intel® Xeon® Scalable Processors
Intel® Media SDK
Intel® Trace Analyzer and Collector
Integrated BMC and OpenBMC Firmware
2023.1 IPU – Intel® Xeon® Processor
FCS Server Software
Crypto API Toolkit for Intel® SGX
Intel® Ethernet VMware Drivers
Intel® Ethernet Controllers and Adapters
Intel® QAT Drivers
Intel® Ethernet Controller Administrative Tools Drivers
Computer Vision Annotation Tool
Intel® EMA Software
QATzip for Intel® QAT
2023.1 IPU – Intel® Processor
Intel® OFU Software
Intel® Network Adapter Software

Presnú špecifikáciu jednotlivých zasiahnutých produktov nájdete na odkaze v sekcii ZDROJE

Následky
Vykonanie škodlivého kódu a úplné narušenie dôvernosti, integrity a dostupnosti systému
Odporúčania
Administrátorom a používateľom odporúčame bezodkladne vykonať aktualizáciu zasiahnutých systémov.
Po odstránení zraniteľností, ktoré mohli spôsobiť vzdialené vykonanie kódu, je dobrou praxou kontrola systému a zmena všetkých hesiel a kľúčov na dotknutom systéme a aj na iných systémoch, kde sa používalo rovnaké heslo či kľúč.
Zdroje
https://www.securityweek.com/dozens-of-vulnerabilities-patched-in-intel-products/
https://www.itnews.com.au/news/intel-patches-dozens-of-bugs-590979
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00776.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00677.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00718.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00721.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00727.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00728.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00731.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00733.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00736.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00739.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00750.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00754.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00761.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00762.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00764.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00765.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00769.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html

« Späť na zoznam