Since our inception 20 years ago, security has been essential. Hundreds of OEMs and ODM partners have trusted us with enabling the platforms that form the foundation of their products, knowing we share their commitment to make them secure. Product security is a top priority with our company and an area of focus that we continue to improve upon every day.

  • We sit on the security review team of the industry’s leading firmware standards body; the UEFI Security Response Team.
  • We have internal product security experts that drive our Security Development Lifecycle (SDL) process within our BIOS and BMC firmware teams and evaluate existing and emerging threats.
  • We issue regular and timely security alert bulletins when mitigations to vulnerabilities are discovered.
  • We work closely with all of our silicon vendor partners to ensure the timely and critical delivery of microcode updates and other patches.

At Insyde, we work with the broader industry to identify, report, mitigate and disclose security vulnerabilities. We support you, our customers and partners, in closing the door to anything which compromises the security or privacy in your platforms. We take this role seriously, because if your firmware is not secure, your product is not secure.

This is our pledge to you. If you have any questions about Insyde Software’s commitment to security, I urge you to reach out to us at security.report@insyde.com

Tim Lewis, Chief Technology Officer


Please know that Insyde Software is working closely with Intel, AMD and other partners to provide timely updates to help mitigate these recent issues and many more.

Insyde Software Tool Security Advisory:
Document and CVE #s to be provided when available

Common Vulnerabilities and Exposures (CVE) CVSS v3 Vulnerability Severity Description Insyde Security Advisory (SA) Original Date Last Revised
CVE-2019-12532 6.9 Improper access control in the Insyde software tools may allow an authenticated user to potentially enable escalation of privilege, or information disclosure via local access. INSYDE-SA-2019001 08/12/2019 -

Various Side Channel Exploits:
Document and CVE #s to be provided when available

Common Vulnerabilities and Exposures (CVE) CVSS v3 Vulnerability Severity Description Intel Security Advisory (SA) Original Date Last Revised
CVE-2019-0170 8.2 Buffer overflow in subsystem in Intel(R) Dynamic Application Loader before [12.0.35] may allow privileged user to potentially enable escalation of privilege via local access. PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0153 9.0 Buffer overflow in subsystem in Intel(R) CSME before 12.0.35 may allow unauthenticated user to potentially enable escalation of privilege via network access. PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0126 7.2 Insufficient access control in Silicon Reference firmware for Intel (R) Xeon (R) Scalable Processor, Intel (R) Xeon (R) Processor D Family may allow privileged user to potentially enable escalation of privilege or denial of service via local access PSIRT-TA-201901-006 05/14/2019 -
CVE-2019-0120 5.3 Insufficient key protection vulnerability in Silicon Reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor E3900 Series, Intel(R) Pentium(R) Processor Silver Series may allow privileged user to potentially enable denial of service via local access. PSIRT-TA-201901-006 05/14/2019 -
CVE-2019-0119 5.7 Buffer overflow vulnerability in system firmware for Intel (R) Xeon (R) Processor D Family, Intel (R) Xeon (R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable escalation of privilege or denial of service via local access. PSIRT-TA-201901-006 05/14/2019 -
CVE-2019-0098 5.7 Logic bug vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) TXE before 3.1.65, 4.0.15may allow unauthenticated user to potentially enable escalation of privilege via physical access. PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0097 4.9 Insufficient input validation vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before version 12.0.35 may allow privileged user to potentially enable denial of service via network access. PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0096 6.7 Out of bound write vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow authenticated user to potentially enable escalation of privilege via adjacent network access. PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0094 4.3 Insufficient input validation vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow unauthenticated user to potentially enable denial of service via adjacent network access PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0093 2.3 Insufficient data sanitization vulnerability in HECI subsystem for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35, Intel(R) Server Platform Services before version SPS_E3_05.00.04.027.0 may allow privileged user to potentially enable information disclosure via local access PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0092 6.8 Insufficient input validation vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow unauthenticated user to potentially enable escalation of privilege via physical access PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0091 6.6 Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow unprivileged user to potentially enable escalation of privilege via local access. PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0086 7.8 Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow unprivileged user to potentially enable escalation of privilege via local access PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0090 7.1 Insufficient access control vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) Server Platform Services before version SPS_E3_05.00.04.027.0 may allow unauthenticated user to potentially enable escalation of privilege via physical access PSIRT-TA-201901-002 05/14/2019 -
CVE-2019-0089 8.1 Improper data sanitization vulnerability in subsystem in Intel(R) Server Platform Services before versions SPS_E5_04.00.04.381.0, SPS_E3_04.01.04.054.0, SPS_SoC-A_04.00.04.181.0, and SPS_SoC-X_04.00.04.086.0 may allow privileged user to potentially enable escalation of privilege via local access PSIRT-TA-201901-002 05/14/2019 -
N/A 4.3 Type confusion in HECI service for Intel(R) Server Platform Services Tools may allow authenticated user to potentially enable escalation of privilege via local access. PSIRT-TA-201903-001 03/04/2019 -
CVE-2018-11091 3.8 Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access PSIRT-TA-2019-02-002 05/14/2019 -
CVE-2018-12130 6.5 Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. PSIRT-TA-2019-02-002 05/14/2019 -
CVE-2018-12127 6.5 Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. PSIRT-TA-2019-02-002 05/14/2019 -
Common Vulnerabilities and Exposures (CVE) CVSS v3 Vulnerability Severity Description Intel Security Advisory (SA) Original Date Last Revised
CVE-2018-3615 7.3 Systems with microprocessors utilizing speculative execution and Intel® software guard extensions (Intel® SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis. INTEL-SA-00161 8/14/2018 8/23/2018
CVE-2018-3620 6.5 Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis INTEL-SA-00161 8/14/2018 8/23/2018
CVE-2018-3646 6.5 Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis INTEL-SA-00161 8/14/2018 8/23/2018
Common Vulnerabilities and Exposures (CVE) CVSS v3 Vulnerability Severity Description Intel Security Advisory (SA) Original Date Last Revised
CVE-2018-3628 8.1 Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet INTEL-SA-00112 7/10/2018 7/10/2018
CVE-2018-3629 7.5 Buffer overflow in event handler in Intel®  Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x,4.x,5.x,6.x,7.x,8.x,9.x, 10.x,11.x  may allow an attacker to cause a denial of service via the same subnet INTEL-SA-00112 7/10/2018 7/10/2018
CVE-2018-3632 6.4 Memory corruption in Intel® Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x/7.x/8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 could be triggered by an attacker with local administrator permission on system INTEL-SA-00112 7/10/2018 7/10/2018
NA 8.2 Incorrect handling of memory types in Tianocore firmware potentially allows a local attacker to bypass SMM protections on memory INTEL-SA-00159 7/10/2018 7/10/2018
NA 6.1 Insecure handling of UEFI variables in Intel® Xeon® Scalable processors, Intel® Xeon® Processor E5 v4 Family, Intel® Xeon® Processor E5 v3 Family system firmware potentially allows a local attacker to disable security features of the platform. Intel reference firmware implemented setup options to enable/disable security features. These options are used in the validation environments to relax security when running tests in a lab environment. If used by malware on a production system, these features may result in elevation of privilege by disabling protection of the system configuration or denial of service. INTEL-SA-00112 7/10/2018 7/10/2018
NA 7.6 Platform sample code firmware included with 4th Gen Intel® Core™ Processor (Haswell), 5th Gen Intel® Core™ Processor (Broadwell), 6th Gen Intel® Core™ Processor (Skylake), and 7th Gen Intel® Core™ Processor (Kaby Lake) contains a logic error potentially allowing a physical attacker to bypass firmware authentication. INTEL-SA-00152 7/10/2018 7/10/2018
NA 6.8 Logic error in platform sample code firmware included with 4th Gen Intel® Core™ Processor (Haswell), 5th Gen Intel® Core™ Processor (Broadwell), 6th Gen Intel® Core™ Processor (Skylake), and 7th Gen Intel® Core™ Processor (Kaby Lake) potentially allows a physical attacker to exploit incorrect TPM measurement of system firmware. INTEL-SA-00152 7/10/2018 7/10/2018
CVE-2017-5704 7.2 Platform sample code firmware included with 4th Gen Intel® Core™ Processor (Haswell), 5th Gen Intel® Core™ Processor (Broadwell), 6th Gen Intel® Core™ Processor (Skylake), and 7th Gen Intel® Core™ Processor (Kaby Lake) potentially exposes password information in memory to a local attacker with administrative privileges. INTEL-SA-00160 7/10/2018 7/10/2018
Common Vulnerabilities and Exposures (CVE) CVSS v3 Vulnerability Severity Description Intel Security Advisory (SA) Original Date Last Revised
CVE-2018-3639 4.3 Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. INTEL-SA-00115 5/21/2018 6/25/2018
CVE-2018-3640 4.3 Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis INTEL-SA-00115 5/21/2018 6/25/2018

Disclosed by Google Project Zero
Variant 1 (Spectre), Variant 2 (Spectre), Variant 3 (Meltdown)
INTEL-TA-201710-003, Intel Doc # 575035, CVE-2017-5715

Unsafe Opcodes exposed in Intel SPI based products
PSIRT-TA-201708-001, Intel Doc # 574208