The bigger-rated advisories target on privilege-escalation bugs in CPU firmware: Rough to patch, tricky to exploit, tempting to a savvy attacker.
Intel has unleashed 29 security advisories to plug up some really serious bugs in the BIOS firmware for Intel processors, as perfectly as in its Bluetooth items, Active Administration Technology instruments, the NUC Mini Computer system line, and, ironically, in its possess security library.
Particulars about the advisories can be located at Intel’s Product Security Middle.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Intel’s senior director of communications, Jerry Bryant, claimed in a blog article on Wednesday that Intel’s generally digging these security issues up internally – as in, 95 per cent – through its personal diligence, with significant chunks of them coming through its bugs bounty plan and the company’s have analysis.
“Today we released 29 security advisories addressing 73 vulnerabilities,” Bryant wrote. “Forty of people, or 55 p.c, were being discovered internally as a result of our very own proactive security analysis. Of the remaining 33 CVEs currently being resolved, 29, or 40 p.c, ended up claimed by means of our bug-bounty program. In general, 95 percent of the issues remaining addressed now are the end result of our ongoing investments in security assurance, which is constant with our 2020 Solution Security Report.”
Pats Alone on the Back
The June patch established from Intel provides its vulnerabilities total to 132 for the first 6 months of 2021, with 70 p.c of those having been found and mitigated right before they ended up publicly disclosed, Bryant said.
Peaceful, nonpublic discovery and mitigation is a awesome turnaround for Intel, Bryant claimed. He observed that 56 of the 132 issues dealt with on Tuesday were being identified in graphics, networking and Bluetooth factors. Although issues in these solutions ended up generally found internally by Intel security scientists and products engineers – at 75 per cent – that was not essentially the scenario in its 2019 and 2020 product security reports. In those people previous number of many years, a big percentage of issues in these products were being uncovered externally and noted by means of the company’s bug-bounty method.
Bryant credited Intel’s Security Improvement Lifecycle (SDL) software for this turnaround. “Through the SDL, we choose learnings from identified vulnerabilities and make enhancements to matters like automatic code scanning and schooling as well as using this data to inform our inner Pink-Workforce situations,” he described.
The Undesirable Bugs
Numerous of the 29 vulnerabilities are rated as higher-severity – together with 4 regional privilege escalation vulnerabilities in firmware for Intel’s CPU solutions a different community privilege escalation vulnerability in Intel Virtualization Technology for Directed I/O (VT-d) a network-exploitable privilege escalation vulnerability in the Intel Security Library yet another domestically exploitable privilege escalation in the NUC relatives of computer systems nevertheless a lot more in its Driver and Aid Assistant (DSA) application and RealSense ID platform and a denial-of-services (DoS) vulnerability in selected Thunderbolt controllers.
Below are more facts on those substantial-severity bugs:
- CVE-2021-24489 Some Intel Virtualization Technology for Directed I/ (VT-d) products and solutions may allow escalation of privilege. The issue is triggered by incomplete cleanup in some Intel VT-d items that could permit authenticated attackers to escalate privileges through nearby access. Rating: Higher / CVSS 8.8
The following 4 bugs are brought on by poor initialization, race problem, inappropriate input validation and inadequate manage move administration in the CPU BIOS firmware, enabling escalation of privilege through area or actual physical entry:
- CVE-2020-12357 Rating: Superior / CVSS 7.5
- CVE-2020-8670 Ranking: Significant / CVSS 7.5
CVE-2020-8700 Ranking: Higher / CVSS 7.5
CVE-2020-12359 Ranking: High / CVSS 7.5
The Undesirable Security Library Bug
Intel also patched a higher-severity bug in Intel Security Library that impacts iterations just before version 3.3 and may well enable escalation of privilege, denial of assistance or data disclosure. It is triggered by a important exchange without entity authentication that permits authenticated attackers to escalate privilege by using network obtain. CVE-2021-0133 was issued a CVSS ranking of 7.7.
Intel also patched 11 other large-severity security that impact Intel NUCs, Intel Driver and Assistance Assistant (DSA), Intel RealSense ID, Intel Area Programmable Gate Array (FPGA) Open Programmable Acceleration Motor (OPAE) driver for Linux, and Intel Thunderbolt controllers.
Emphasis on Privilege Escalation
Immersive Labs’ Kevin Breen, director of cyber threat investigate, famous that the concept for Intel’s June patch set appears to be privilege escalation. “The larger-rated vulnerabilities in this launch feel to target around resolving privilege escalation vulnerabilities,” he observed to Threatpost by using email on Wednesday.
“Interestingly, it is in the firmware that controls the CPUs, not in the host operating process,” he continued. “We’re made use of to mechanically making use of updates for running programs and software products and solutions – and even then we still once in a while see updates that result in the dreaded blue display screen of death.”
Making use of firmware updates is not as effectively-managed as computer software updates, he pointed out, most likely simply because they are more durable to examination … which indicates they pack extra inherent risk. “As these have a reduced degree of interaction with your hardware, there’s no straightforward way to check them right before deploying throughout your network,” Breen said. “This implies there is additional inherent risk with these forms of patches and updates.”
When hardware exploitation is “a ton more challenging for attackers to weaponize,” Breen stated, attackers know that firmware is not up-to-date as usually as running programs. That makes firmware exploits a tempting goal for threat teams with the technological savvy to produce exploits, he predicted: “Creating these exploits would be large on their checklist for progress.”
The frequent “patch fast” assistance applies, Breen mentioned: “As normally, realize your risk and use patches in the shortest time feasible,” he said. “If you have to delay patching to accommodate a lot more screening, consider including more monitoring all over the expert services and hosts that would be susceptible to shorten reaction situations.”
Dirk Schrader, world vice president of security research at New Net Systems, agreed that focusing on privilege escalation is the vital to Intel’s June 2021 security advisories launch. He instructed Threatpost on Wednesday that these newly patched flaws may possibly not be the most critical vulnerabilities an attacker would want to exploit, but “they are definitely of use in an attack script.”
By means of email, Schrader pointed out that “any attack works by using a few of vulnerabilities, and those making it possible for for privilege escalation are sought just after in the later on levels of an attack immediately after original exploits or phishes have opened a door.”
He proposed that proscribing consumer privileges is a central element of any security guideline, be it NIST, CIS, or any sector-particular just one. “Having exploits in their arsenal to escape from these constraints is critical to attackers, and corporations are perfectly-recommended to comply with up on the security advisories introduced by Intel currently,” Schrader recommended. “Any corporation should really make it tricky for attackers, as really hard as doable all alongside the way into the infrastructure, and not just construct up a challenging to crack perimeter (btw: there is no these types of point as a hard to crack perimeter). Regard the cyber get rid of chain, abide by by means of on people other controls in the guidelines, patch and control any improve to your infrastructure.”
Down load our unique Absolutely free Threatpost Insider Book, “2021: The Evolution of Ransomware,” to assistance hone your cyber-defense approaches in opposition to this developing scourge. We go past the position quo to uncover what is future for ransomware and the associated emerging pitfalls. Get the complete story and Obtain the E book now – on us!
Some sections of this article are sourced from:
threatpost.com