Intel reports a critical bug found in CSME and urges users to apply a fix that is now available as soon as possible. The Intel Converged Engineer (CSME) security and management engine is a chipset subsystem that empowers Intel Active Management technologies. An error was detected in the CSME firmware by the Intel security team. Should hackers exploit this error to start escalating privileges, denial of service and information disclosure attacks? This error, identified as CVE-2019-14598, has received a CVSS 8.2 base score, which is the highest severity score. Therefore the error is considered critical.
Intel has released a firmware update to mitigate the error affecting CSME versions before 12.0.49 (including only IoT: 12.0.56), 13.0.21 and 14.0.11.
Intel also recommends updating to CSME versions 12.0.49, 13.0.21, and 14.0.11 or later from the system manufacturer that is addressing these issues. It also advises IoT clients to use CSME version 12.0.55 to update to 12.0.56 or later provided by the manufacturer of the system that addresses these issues.
Another series of updates aim to resolve security issues found in Intel’s RAID Web 2 (RWC2) and Web RAID 3 (RWC3) for Windows.
The first error, CVE-2020-0562, affects all versions of RWC2 and has a seriousness of 6.7, classifying the error as medium seriousness. Locally certified users can exploit the error to scale their privileges.
However, Intel does not intend to fix the problem. Instead, it states that the product will be discontinued and recommends that users upgrade to RWC3.
The second security error is the same with the same possible consequences. Detected as CVE-2020-0564 and affects RWC3 prior to release 7.010.009.000. Intel’s Multicore Platform Stack (MPSS), prior to version 3.8.6, also received a fix for CVE-2020-0563, which was 6.7 with a medium severity. This error can be exploited by hackers to trigger an escalation of privileges through local access due to malicious rights management.
Intel has reported another mid-level security bug that is identified as CVE-2020-0560 and is not prepared to release a patch. This error affects the Intel Renesas Electronics USB 3.0 driver and allows scaling of privileges across all versions. So he recommends that users of Intel Electronics Renesas Electronics USB 3.0 driver uninstall it or discontinue use at the earliest opportunity.
In addition, Intel has fixed a low-severity error in Intel software extensions (SGX). This bug, detected as CVE-2020-0561 and rated 2.5, can allow certified users to scale their privileges through local access.
At the same time, Microsoft also released its monthly batch of security fixes, while the February set fixed a total of 99 bugs, of which 11 were rated critical.
Software including Internet Explorer, Edge browser, Microsoft Exchange Server and Microsoft Office are included in the update.
The Adobe also numerous bugs in software such as Acrobat and Reader, released Flash and Adobe Experience Manager.
Finally, Microsoft released Intel updates for versions of Windows 10, 1909 and 1903 to help Intel distribute firmware that is protected from speculative attacks.