SB2024081629 - Multiple vulnerabilities in Intel Chipset Firmware
Published: August 16, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Unchecked Return Value (CVE-ID: CVE-2023-40067)
The vulnerability allows an attacker with physical access to escalate privileges on the system.
The vulnerability exists due to unchecked return value in firmware, which leads to security restrictions bypass and privilege escalation.
2) Improper Initialization (CVE-ID: CVE-2023-35061)
The vulnerability allows a remote attacker to gain access to sensitive information on the system.
The vulnerability exists due to improper initialization. A remote attacker on the local network can enable information disclosure.
3) Improper Initialization (CVE-ID: CVE-2023-48361)
The vulnerability allows a local user to gain access to sensitive information on the system.
The vulnerability exists due to improper initialization in firmware. A local administrator can enable information disclosure.
4) Integer overflow (CVE-ID: CVE-2024-21844)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in firmware. A remote attacker on the local network can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.
5) Input validation error (CVE-ID: CVE-2023-34424)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in firmware. A local administrator can pass specially crafted input to the application and perform a denial of service (DoS) attack.
6) Buffer overflow (CVE-ID: CVE-2023-38655)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in firmware. A local administrator can trigger memory corruption and cause a denail of service condition on the target system.
Remediation
Install update from vendor's website.