От Интел разпространиха подобрения за сигурност, посредством които целят да адресират уязвимости в множество продукти. Автентикирал се нападател с местен достъп е възможно да се възползва от съответните уязвимости, за да придобие възможност за ескалация на привилегиите.
CERT-BG поощрява потребителите и администраторите да прегледат следните документи и да приложат необходимите подобрения:
- Graphics Drivers Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
- FPGA Programmable Acceleration Card N3000 Advisory:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00319.html
- Snoop Assisted L1D Sampling Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html
- Processors Load Value Injection Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
- NUC Firmware Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
- Max 10 FPGA Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html
- BlueZ Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html
- Smart Sound Technology Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html