Intel Resolves 73 Vulnerabilities in June Platform Update

Share post:

Intel has fixed 73 security vulnerabilities as part of the June 2021 Patch Tuesday, including serious vulnerabilities affecting several versions of Intel’s Security Library and the BIOS firmware for Intel processors.

In its advisory, Intel includes a list of affected products and recommendations for vulnerable products, as well as contact details for security researchers wishing to report security problems or vulnerabilities in Intel products.

Among the security updates released recently, Intel focused on five serious vulnerabilities affecting Intel Virtualization Technology for Directed I/0 (VT-d) products, the BIOS firmware for some Intel processors, and the Intel Security Library.

The first of them (tracked as CVE-2021-24489) is caused by incomplete purges in some Intel VT-d products that could allow authenticated attackers to elevate privileges over local access.

Intel has patched four other bugs (tracked as CVE-2020-12357, CVE-2020-8670, CVE-2020-8700, and CVE-2020-12359) caused by improper initialization, race condition, improper input validation, and insufficient control flow in the CPU BIOS firmware, allowing for privilege escalation via local or physical access.

Intel has also fixed 11 other vulnerabilities affecting Intel NUCs, Intel Driver and Support Assistant, Intel RealSense ID, Intel Field Programmable Gate Array, Open Programmable Acceleration Engine driver for Linux and Intel Thunderbolt controllers.

For more information, read the original story in Bleeping Computer.



Related articles

Microsoft announces enhanced security feature for OneNote

Microsoft has released further information on the increased security measures it is deploying for OneNote in order to...

Russian hacker group steals Emails of NATO officials and diplomats

Since February 2023, a Russian hacking gang known as TA473 or 'Winter Vivern' has targeted unpatched Zimbra endpoints...

Canadian cybersecurity accelerator counts its accomplishments

A Canadian university-associated business accelerator for helping early-stage cybersecurity companies says its first two years of operation have been more than satisfactory. The Rogers Cybersecure Catalyst Accelerator has had “an incredible impact” on Canadian cybersecurity entrepreneurs and founders, executive director Charles Finlay said this week in the first report on the program’s progress. Despite having

Crackdown on ransomware gangs yet to show an impact: OpenText

In its annual cybersecurity report OpenText also looked at malware, phishing and infec

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways