系微安全保證
系微自20年前成立以來,產品的安全可靠至關重要。數以百計的OEM及ODM合作夥伴信任我們,使我們能夠建立構成其產品基礎的平台,因為我們知道我們共同致力於確保其產品的安全性。產品安全是我們公司的首要任務,也是我們每天不斷改進的重點領域。
- 我們是業界領先的韌體標準機構安全審核小組成員之一; 即為UEFI安全響應小組。
- 我們擁有內部產品安全專家,可於我們的BIOS及BMC韌體團隊中推動我們的安全開發生命週期(SDL)流程,並評估現有與新出現的安全威脅。
- 當發現漏洞緩解時,我們會定期發布及時的安全警報公告。
- 我們緊密地與所有晶片供應商合作夥伴共同合作,以確保能及時和關鍵地提供微碼(microcode)更新和其他補救方法。
在系微,我們與廣泛的業界廠商合作,以查明、回報、緩解和披露安全漏洞。系微能提供給您與我們的客戶及合作夥伴在任何可能危及其平台安全性或隱私內容上的可靠支援。我們非常認真及嚴謹地擔任這個角色,因為如果您的韌體不安全,那麼您的產品就不安全了。
這是我們對您的保證,如果您對系微安全承諾上有任何疑問時,歡迎隨時透過此信箱 security.report@insyde.com 與我們聯繫。
系微首席技術長, Tim Lewis
Please know that Insyde Software is working closely with Intel, AMD and other partners to provide timely updates to help mitigate these recent issues and many more.
Insyde Software Tool Security Advisory:
Document and CVE #s to be provided when available
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Insyde Security Advisory (SA) | Original Date | Last Revised |
CVE-2019-12532 | 6.9 | Improper access control in the Insyde software tools may allow an authenticated user to potentially enable escalation of privilege, or information disclosure via local access. | INSYDE-SA-2019001 | 08/12/2019 | - |
Various Side Channel Exploits:
Document and CVE #s to be provided when available
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Intel Security Advisory (SA) | Original Date | Last Revised |
CVE-2019-0170 | 8.2 | Buffer overflow in subsystem in Intel(R) Dynamic Application Loader before [12.0.35] may allow privileged user to potentially enable escalation of privilege via local access. | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0153 | 9.0 | Buffer overflow in subsystem in Intel(R) CSME before 12.0.35 may allow unauthenticated user to potentially enable escalation of privilege via network access. | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0126 | 7.2 | Insufficient access control in Silicon Reference firmware for Intel (R) Xeon (R) Scalable Processor, Intel (R) Xeon (R) Processor D Family may allow privileged user to potentially enable escalation of privilege or denial of service via local access | PSIRT-TA-201901-006 | 05/14/2019 | - |
CVE-2019-0120 | 5.3 | Insufficient key protection vulnerability in Silicon Reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor E3900 Series, Intel(R) Pentium(R) Processor Silver Series may allow privileged user to potentially enable denial of service via local access. | PSIRT-TA-201901-006 | 05/14/2019 | - |
CVE-2019-0119 | 5.7 | Buffer overflow vulnerability in system firmware for Intel (R) Xeon (R) Processor D Family, Intel (R) Xeon (R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable escalation of privilege or denial of service via local access. | PSIRT-TA-201901-006 | 05/14/2019 | - |
CVE-2019-0098 | 5.7 | Logic bug vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) TXE before 3.1.65, 4.0.15may allow unauthenticated user to potentially enable escalation of privilege via physical access. | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0097 | 4.9 | Insufficient input validation vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before version 12.0.35 may allow privileged user to potentially enable denial of service via network access. | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0096 | 6.7 | Out of bound write vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow authenticated user to potentially enable escalation of privilege via adjacent network access. | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0094 | 4.3 | Insufficient input validation vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow unauthenticated user to potentially enable denial of service via adjacent network access | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0093 | 2.3 | Insufficient data sanitization vulnerability in HECI subsystem for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35, Intel(R) Server Platform Services before version SPS_E3_05.00.04.027.0 may allow privileged user to potentially enable information disclosure via local access | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0092 | 6.8 | Insufficient input validation vulnerability in subsystem for Intel(R) Active Management Technology (Intel(R) AMT) before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow unauthenticated user to potentially enable escalation of privilege via physical access | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0091 | 6.6 | Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow unprivileged user to potentially enable escalation of privilege via local access. | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0086 | 7.8 | Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow unprivileged user to potentially enable escalation of privilege via local access | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0090 | 7.1 | Insufficient access control vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) Server Platform Services before version SPS_E3_05.00.04.027.0 may allow unauthenticated user to potentially enable escalation of privilege via physical access | PSIRT-TA-201901-002 | 05/14/2019 | - |
CVE-2019-0089 | 8.1 | Improper data sanitization vulnerability in subsystem in Intel(R) Server Platform Services before versions SPS_E5_04.00.04.381.0, SPS_E3_04.01.04.054.0, SPS_SoC-A_04.00.04.181.0, and SPS_SoC-X_04.00.04.086.0 may allow privileged user to potentially enable escalation of privilege via local access | PSIRT-TA-201901-002 | 05/14/2019 | - |
N/A | 4.3 | Type confusion in HECI service for Intel(R) Server Platform Services Tools may allow authenticated user to potentially enable escalation of privilege via local access. | PSIRT-TA-201903-001 | 03/04/2019 | - |
CVE-2018-11091 | 3.8 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access | PSIRT-TA-2019-02-002 | 05/14/2019 | - |
CVE-2018-12130 | 6.5 | Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. | PSIRT-TA-2019-02-002 | 05/14/2019 | - |
CVE-2018-12127 | 6.5 | Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. | PSIRT-TA-2019-02-002 | 05/14/2019 | - |
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Intel Security Advisory (SA) | Original Date | Last Revised |
CVE-2018-3615 | 7.3 | Systems with microprocessors utilizing speculative execution and Intel® software guard extensions (Intel® SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis. | INTEL-SA-00161 | 8/14/2018 | 8/23/2018 |
CVE-2018-3620 | 6.5 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis | INTEL-SA-00161 | 8/14/2018 | 8/23/2018 |
CVE-2018-3646 | 6.5 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis | INTEL-SA-00161 | 8/14/2018 | 8/23/2018 |
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Intel Security Advisory (SA) | Original Date | Last Revised |
CVE-2018-3628 | 8.1 | Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet | INTEL-SA-00112 | 7/10/2018 | 7/10/2018 |
CVE-2018-3629 | 7.5 | Buffer overflow in event handler in Intel® Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x,4.x,5.x,6.x,7.x,8.x,9.x, 10.x,11.x may allow an attacker to cause a denial of service via the same subnet | INTEL-SA-00112 | 7/10/2018 | 7/10/2018 |
CVE-2018-3632 | 6.4 | Memory corruption in Intel® Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x/7.x/8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 could be triggered by an attacker with local administrator permission on system | INTEL-SA-00112 | 7/10/2018 | 7/10/2018 |
NA | 8.2 | Incorrect handling of memory types in Tianocore firmware potentially allows a local attacker to bypass SMM protections on memory | INTEL-SA-00159 | 7/10/2018 | 7/10/2018 |
NA | 6.1 | Insecure handling of UEFI variables in Intel® Xeon® Scalable processors, Intel® Xeon® Processor E5 v4 Family, Intel® Xeon® Processor E5 v3 Family system firmware potentially allows a local attacker to disable security features of the platform. Intel reference firmware implemented setup options to enable/disable security features. These options are used in the validation environments to relax security when running tests in a lab environment. If used by malware on a production system, these features may result in elevation of privilege by disabling protection of the system configuration or denial of service. | INTEL-SA-00112 | 7/10/2018 | 7/10/2018 |
NA | 7.6 | Platform sample code firmware included with 4th Gen Intel® Core™ Processor (Haswell), 5th Gen Intel® Core™ Processor (Broadwell), 6th Gen Intel® Core™ Processor (Skylake), and 7th Gen Intel® Core™ Processor (Kaby Lake) contains a logic error potentially allowing a physical attacker to bypass firmware authentication. | INTEL-SA-00152 | 7/10/2018 | 7/10/2018 |
NA | 6.8 | Logic error in platform sample code firmware included with 4th Gen Intel® Core™ Processor (Haswell), 5th Gen Intel® Core™ Processor (Broadwell), 6th Gen Intel® Core™ Processor (Skylake), and 7th Gen Intel® Core™ Processor (Kaby Lake) potentially allows a physical attacker to exploit incorrect TPM measurement of system firmware. | INTEL-SA-00152 | 7/10/2018 | 7/10/2018 |
CVE-2017-5704 | 7.2 | Platform sample code firmware included with 4th Gen Intel® Core™ Processor (Haswell), 5th Gen Intel® Core™ Processor (Broadwell), 6th Gen Intel® Core™ Processor (Skylake), and 7th Gen Intel® Core™ Processor (Kaby Lake) potentially exposes password information in memory to a local attacker with administrative privileges. | INTEL-SA-00160 | 7/10/2018 | 7/10/2018 |
Common Vulnerabilities and Exposures (CVE) | CVSS v3 Vulnerability Severity | Description | Intel Security Advisory (SA) | Original Date | Last Revised |
CVE-2018-3639 | 4.3 | Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. | INTEL-SA-00115 | 5/21/2018 | 6/25/2018 |
CVE-2018-3640 | 4.3 | Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis | INTEL-SA-00115 | 5/21/2018 | 6/25/2018 |
Disclosed by Google Project Zero
Variant 1 (Spectre), Variant 2 (Spectre), Variant 3 (Meltdown)
INTEL-TA-201710-003, Intel Doc # 575035, CVE-2017-5715
Unsafe Opcodes exposed in Intel SPI based products
PSIRT-TA-201708-001, Intel Doc # 574208