Security Advisories for Intel Products 2022-05-10 2022.1 IPU

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On 10. May 2022, Intel released several Security Advisories for various Intel products as part of the 2022.1 IPU (Intel Platform Update). Some of these security advisories require firmware updates. In this article you will find information about these security advisories and where you will find updates for Thomas-Krenn products.

Security Advisories

Intel Security Advisory Titel CVE Affected systems Further information
INTEL-SA-00601

2022.1 IPU – BIOS Advisory

CVE-2021-0153
CVE-2021-0154
CVE-2021-0155
CVE-2021-0159
CVE-2021-0188
CVE-2021-0189
CVE-2021-0190
CVE-2021-33103
CVE-2021-33122
CVE-2021-33123
CVE-2021-33124

  • 3rd Generation Intel Xeon Scalable Processor Family
  • 2nd Generation Intel Xeon Scalable Processor Family
  • Intel Xeon Scalable Processor Family
  • Intel Xeon Processor W Family
  • Intel Xeon Processor E Family
  • Intel Xeon Processor D Family
  • Intel Xeon Processor E7 v4 Family
  • Intel Xeon Processor E5 v4 Family
  • Intel Xeon Processor E3 v6 Family
  • Intel Xeon Processor E3 v5 Family
  • 11th Generation Intel Core Processor Family
  • 10th Generation Intel Core Processor Family
  • 9th Generation Intel Core Processor Family
  • 8th Generation Intel Core Processor Family
  • 7th Generation Intel Core Processor Family
  • 6th Generation Intel Core processor Family
  • Intel Core X-series Processor Family
  • Intel Atom Processor C3XXX Family
  • Intel Core Processors with Intel Hybrid Technology
  • Intel Pentium Silver N6000 Processor Family, Intel Celeron N4000 and N5000 Processor Families
INTEL-SA-00613

2022.1 IPU – Intel Processor Debug Advisory

CVE-2022-0004

CSME Software (Mitigated version or higher):
16.0.15
15.40.20
15.0.40
14.1.65
13.50.20
13.30.30
13.0.60
12.0.90
11.22.92
11.12.92
11.8.92
TXE:
4.0.45
3.1.92
INTEL-SA-00614

2022.1 IPU – Intel SGX Advisory

CVE-2022-0005

  • 3rd Gen Intel Xeon Scalable Processor Family
  • Intel Xeon E Processor Family
  • Intel Xeon W Processor Family
  • 11th Generation Intel Core Processor Family
  • 10th Generation Intel Core Processor Family
  • 9th Generation Intel Core Processor Family
  • 8th Generation Intel Core Processor Family
  • 7th Generation Intel Core Processor Family
  • 6th Generation Intel Core Processor Family
  • Intel Core X-series Processors
  • Intel Pentium Gold Processor Series
  • Intel Pentium Processor Family
  • Intel Celeron Processor 5000 Series
  • Intel Celeron Processor G Series
  • Intel Celeron Processor Family
INTEL-SA-00616

2022.1 IPU – Intel Xeon Advisory

CVE-2021-21131
CVE-2021-21136

  • Intel Xeon Scalable Processors (CVE-2022-21131, CVE-2022-21136)
  • Intel Xeon D-2100 Processor (CVE-2022-21131, CVE-2022-21136)
  • 2nd Generation Intel Xeon Scalable Processors (CVE-2022-21131)
  • Intel Core i9, 79xxX, 78xxX (CVE-2022-21131, CVE-2022-21136)
INTEL-SA-00617

2022.1 IPU – Intel Processor Advisory

CVE-2022-21151

  • 3rd Generation Intel Xeon Scalable Processor Family
  • 10th Generation Intel Core Processor Family
  • 9th Generation Intel Core Processor Family
  • 8th Generation Intel Core Processor Family
  • 7th Generation Intel Core Processor Family
  • 6th Generation Intel Core processor Family
  • Intel Pentium Processor Silver Series
  • Intel Celeron Processor J Series
  • Intel Celeron Processor N Series

Updates for products from Thomas-Krenn

Information about updates will be published in the following Wiki article as soon as updates are available:

Foto Thomas Niedermeier.jpg

Author: Thomas Niedermeier

Thomas Niedermeier working in the product management team at Thomas-Krenn, completed his bachelor's degree in business informatics at the Deggendorf University of Applied Sciences. Since 2013 Thomas is employed at Thomas-Krenn and takes care of OPNsense firewalls, the Thomas-Krenn-Wiki and firmware security updates.


Related articles

Intel ARK Product Database
Security Advisories for Intel Products 2020-09-08
Security Advisories for Intel Products 2023.1 IPU