Intel has revealed a set of high-severity flaws impacting Intel NUC firmware and Intel RAID Web Console 3 (RWC3) for Windows.
On Tuesday, the tech giant released a set of security advisories for the issues, of which RWC3 patches are now available for download.
The bulk of the update, however, relates to Intel Next Unit of Computing (NUC) firmware, used in a variety of PCs with small form factors.
A total of 39 products based on NUC firmware including NUC Kit NUC8i3BEx, Compute Stick STK2MV64CC, NUC Kit NUC5CPYH, and Compute Card CD1IV128MK are impacted.
The first vulnerability of note, CVE-2019-11127, is a buffer overflow issue which can permit privilege escalation if local access is available. The second local vulnerability, CVE-2019-11128, has been caused by insufficient input validation which can not only result in privilege escalation but also denial of service or information disclosure.
Both bugs have been issued a CVSS score of 8.2 and are deemed critical.
A further five vulnerabilities, all of which have been issued a critical severity score of 7.5, have also been resolved in the latest NUC firmware update.
A failure to properly validate sessions (CVE-2019-11123), two out of bound read/write issues (CVE-2019-11124, CVE-2019-11129), an insufficient input validation error (CVE-2019-11125), and pointer corruption (CVE-2019-11126) have all been resolved.
If left unpatched, these bugs can lead to privilege escalation, denial of service, and information disclosure. However, threat actors must already have access to an account with a level of user privilege in place to pull off an attack.
Intel has released firmware updates to resolve these security problems.
A lack of session validation in the service API "may allow an unauthenticated user to potentially enable escalation of privilege via network access," according to Intel, leading to the bug being awarded a critical severity rating of 8.9.
Intel thanked Alexander Ermolov, Ruslan Zakirov, Malyutin Maksim for finding and reporting the vulnerabilities.
In April, Intel responded to what researchers called the "Spoiler" attack (CVE-2019-0162), in which inherent weaknesses in Intel's memory systems could be exploited to expose virtual address mapping to physical memory addresses.
While the company was keen to emphasize that private data could not be compromised through Spoiler, the issue does impact Intel CPUs back to the first generation of the hardware.
Intel gave the vulnerability a low-severity rating and recommended that "side-channel safe software development practices" be employed to mitigate the risk of exploit.
Previous and related coverage
- All Intel chips open to new Spoiler non-Spectre attack: Don't expect a quick fix
- Windows 10 graphics: Intel warns, patch 19 severe driver flaws now
- Intel CPUs impacted by new Zombieload side-channel attack
Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0