![]() The company credits Hugo Magalhaes from Oracle for reporting half of the disclosed vulnerabilities. Intel is currently working on coordinating firmware updates with several vendors to mitigate these issues, but there's no clear release roadmap as of writing this. However, they do pose a risk in the case of professionals using work-provided laptops. The good news is that none of the flaws can be exploited by an attacker unless they have physical access to the target machine. Intel explains the impacted systems include those powered by 6th to 11th generation Core processors, Xeon models from the W, E, D, and Scalable families, Core X-Series, and models from the Atom C3XXX family. Most of the flaws have a high severity rating, while three are described as medium severity and one is low severity. That means they can be leveraged to bypass many operating system protections as well as traditional endpoint security solutions, allowing hackers to extract sensitive information or lock it with ransomware. Intel says it has discovered no less than 16 new BIOS/UEFI vulnerabilities that allow malicious actors to perform escalation of privilege and denial of service attacks on affected systems. Companies like Intel and AMD are now facing a wave of newly discovered firmware issues that cannot be patched soon enough. The big picture: With the transition to a hybrid work model, security has become a much more complex problem that spans even more variables than before.
0 Comments
Leave a Reply. |