The security review identified ways an attacker could gain unauthorized access to the platforms that would allow the attacker to impersonate the ME/SPS/TXE, which could compromise local security feature attestation validity. They also identified the potential for loading and executing arbitrary code undetected by the user and operating system, or cause system crashes or instability.
The affected products included:
- 6th, 7th & 8th Generation Intel® Core™ Processor Family
- Intel® Xeon® Processor E3-1200 v5 & v6 Product Family
- Intel® Xeon® Processor Scalable Family
- Intel® Xeon® Processor W Family
- Intel® Atom® C3000 Processor Family
- Apollo Lake Intel® Atom Processor E3900 series
- Apollo Lake Intel® Pentium™
- Celeron™ N and J series Processors
For more information contact Intel support.
No comments:
Post a Comment