Insyde's Security Pledge
Since our inception 20 years ago, security has been essential. Hundreds of OEMs and ODM partners have trusted us with enabling the platforms that form the foundation of their products, knowing we share their commitment to make them secure. Product security is a top priority with our company and an area of focus that we continue to improve upon every day.
- We sit on the security review team of the industry’s leading firmware standards body; the UEFI Security Response Team.
- We have internal product security experts that drive our Security Development Lifecycle (SDL) process within our BIOS and BMC firmware teams and evaluate existing and emerging threats.
- We issue regular and timely security alert bulletins when mitigations to vulnerabilities are discovered.
- We work closely with all of our silicon vendor partners to ensure the timely and critical delivery of microcode updates and other patches.
At Insyde, we work with the broader industry to identify, report, mitigate and disclose security vulnerabilities. We support you, our customers and partners, in closing the door to anything which compromises the security or privacy in your platforms. We take this role seriously, because if your firmware is not secure, your product is not secure.
This is our pledge to you. If you have any questions about Insyde Software’s commitment to security, I urge you to reach out to us at security.report@insyde.com
Tim Lewis, Chief Technology Officer
Please know that Insyde Software is working closely with Intel, AMD and other partners to provide timely updates to help mitigate these recent issues and many more.
Insyde Software Tool Security Advisory:
Document and CVE #s to be provided when available
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Insyde Security Advisory (SA) | Original Date | Last Revised |
CVE-2019-12532 | 6.9 | Improper access control in the Insyde software tools may allow an authenticated user to potentially enable escalation of privilege, or information disclosure via local access. | INSYDE-SA-2019001 | 08/12/2019 | - |
Various Side Channel Exploits:
Document and CVE #s to be provided when available
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Intel Security Advisory (SA) | Original Date | Last Revised |
CVE-2019-0170 | 8.2 | Buffer overflow in subsystem in Intel(R) Dynamic Application Loader before [12.0.35] may allow privileged user to potentially enable escalation of privilege via local access. | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0153 | 9.0 | Buffer overflow in subsystem in Intel(R) CSME before 12.0.35 may allow unauthenticated user to potentially enable escalation of privilege via network access. | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0126 | 7.2 | Insufficient access control in Silicon Reference firmware for Intel (R) Xeon (R) Scalable Processor, Intel (R) Xeon (R) Processor D Family may allow privileged user to potentially enable escalation of privilege or denial of service via local access | INTEL-SA-00223 | 05/14/2019 | 05/14/2019 |
CVE-2019-0120 | 5.3 | Insufficient key protection vulnerability in Silicon Reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor E3900 Series, Intel(R) Pentium(R) Processor Silver Series may allow privileged user to potentially enable denial of service via local access. | INTEL-SA-00223 | 05/14/2019 | 05/14/2019 |
CVE-2019-0119 | 5.7 | Buffer overflow vulnerability in system firmware for Intel (R) Xeon (R) Processor D Family, Intel (R) Xeon (R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable escalation of privilege or denial of service via local access. | INTEL-SA-00223 | 05/14/2019 | 05/14/2019 |
CVE-2019-0098 | 5.7 | Logic bug vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) TXE before 3.1.65, 4.0.15may allow unauthenticated user to potentially enable escalation of privilege via physical access. | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0097 | 4.9 | Insufficient input validation vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before version 12.0.35 may allow privileged user to potentially enable denial of service via network access. | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0096 | 6.7 | Out of bound write vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow authenticated user to potentially enable escalation of privilege via adjacent network access. | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0094 | 4.3 | Insufficient input validation vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow unauthenticated user to potentially enable denial of service via adjacent network access | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0093 | 2.3 | Insufficient data sanitization vulnerability in HECI subsystem for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35, Intel(R) Server Platform Services before version SPS_E3_05.00.04.027.0 may allow privileged user to potentially enable information disclosure via local access | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0092 | 6.8 | Insufficient input validation vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow unauthenticated user to potentially enable escalation of privilege via physical access | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0091 | 6.6 | Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow unprivileged user to potentially enable escalation of privilege via local access. | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0086 | 7.8 | Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow unprivileged user to potentially enable escalation of privilege via local access | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0090 | 7.1 | Insufficient access control vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) Server Platform Services before version SPS_E3_05.00.04.027.0 may allow unauthenticated user to potentially enable escalation of privilege via physical access | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
CVE-2019-0089 | 8.1 | Improper data sanitization vulnerability in subsystem in Intel(R) Server Platform Services before versions SPS_E5_04.00.04.381.0, SPS_E3_04.01.04.054.0, SPS_SoC-A_04.00.04.181.0, and SPS_SoC-X_04.00.04.086.0 may allow privileged user to potentially enable escalation of privilege via local access | INTEL-SA-00213 | 05/14/2019 | 04/14/2020 |
N/A | 4.3 | Type confusion in HECI service for Intel(R) Server Platform Services Tools may allow authenticated user to potentially enable escalation of privilege via local access. | N/A | 03/04/2019 | - |
CVE-2018-11091 | 3.8 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access | INTEL-SA-00233 | 05/14/2019 | 07/14/2020 |
CVE-2018-12130 | 6.5 | Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. | INTEL-SA-00233 | 05/14/2019 | 07/14/2020 |
CVE-2018-12127 | 6.5 | Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. | INTEL-SA-00233 | 05/14/2019 | 07/14/2020 |
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Intel Security Advisory (SA) | Original Date | Last Revised |
CVE-2018-3615 | 7.3 | Systems with microprocessors utilizing speculative execution and Intel® software guard extensions (Intel® SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis. | INTEL-SA-00161 | 08/14/2018 | 09/29/2020 |
CVE-2018-3620 | 6.5 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis | INTEL-SA-00161 | 08/14/2018 | 09/29/2020 |
CVE-2018-3646 | 6.5 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis | INTEL-SA-00161 | 08/14/2018 | 09/29/2020 |
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Intel Security Advisory (SA) | Original Date | Last Revised |
CVE-2018-3628 | 8.1 | Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet | INTEL-SA-00112 | 07/10/2018 | 07/10/2018 |
CVE-2018-3629 | 7.5 | Buffer overflow in event handler in Intel® Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x,4.x,5.x,6.x,7.x,8.x,9.x, 10.x,11.x may allow an attacker to cause a denial of service via the same subnet | INTEL-SA-00112 | 07/10/2018 | 07/10/2018 |
CVE-2018-3632 | 6.4 | Memory corruption in Intel® Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x/7.x/8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 could be triggered by an attacker with local administrator permission on system | INTEL-SA-00112 | 07/10/2018 | 07/10/2018 |
NA | 8.2 | Incorrect handling of memory types in Tianocore firmware potentially allows a local attacker to bypass SMM protections on memory | INTEL-SA-00159 | 07/10/2018 | 07/10/2018 |
NA | 6.1 | Insecure handling of UEFI variables in Intel® Xeon® Scalable processors, Intel® Xeon® Processor E5 v4 Family, Intel® Xeon® Processor E5 v3 Family system firmware potentially allows a local attacker to disable security features of the platform. Intel reference firmware implemented setup options to enable/disable security features. These options are used in the validation environments to relax security when running tests in a lab environment. If used by malware on a production system, these features may result in elevation of privilege by disabling protection of the system configuration or denial of service. | INTEL-SA-00112 | 07/10/2018 | 07/10/2018 |
NA | 7.6 | Platform sample code firmware included with 4th Gen Intel® Core™ Processor (Haswell), 5th Gen Intel® Core™ Processor (Broadwell), 6th Gen Intel® Core™ Processor (Skylake), and 7th Gen Intel® Core™ Processor (Kaby Lake) contains a logic error potentially allowing a physical attacker to bypass firmware authentication. | INTEL-SA-00152 | 07/10/2018 | 07/10/2018 |
NA | 6.8 | Logic error in platform sample code firmware included with 4th Gen Intel® Core™ Processor (Haswell), 5th Gen Intel® Core™ Processor (Broadwell), 6th Gen Intel® Core™ Processor (Skylake), and 7th Gen Intel® Core™ Processor (Kaby Lake) potentially allows a physical attacker to exploit incorrect TPM measurement of system firmware. | INTEL-SA-00152 | 07/10/2018 | 07/10/2018 |
CVE-2017-5704 | 7.2 | Platform sample code firmware included with 4th Gen Intel® Core™ Processor (Haswell), 5th Gen Intel® Core™ Processor (Broadwell), 6th Gen Intel® Core™ Processor (Skylake), and 7th Gen Intel® Core™ Processor (Kaby Lake) potentially exposes password information in memory to a local attacker with administrative privileges. | INTEL-SA-00160 | 07/10/2018 | 07/10/2018 |
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Intel Security Advisory (SA) | Original Date | Last Revised |
CVE-2018-3639 | 4.3 | Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. | INTEL-SA-00115 | 05/21/2018 | 09/29/2020 |
CVE-2018-3640 | 4.3 | Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis | INTEL-SA-00115 | 05/21/2018 | 09/29/2020 |
Disclosed by Google Project Zero
Variant 1 (Spectre), Variant 2 (Spectre), Variant 3 (Meltdown)
INTEL-SA-0088
Unsafe Opcodes exposed in Intel SPI based products
INTEL-SA-0087