They discover 41 vulnerabilities in Intel hardware, are they dangerous?

Intel has just released a series of patches to resolve a number of security issues that have been discovered in various of its hardware. And they have been discovered 41 vulnerabilities in Intel hardware that affect both processors, NUC systems and solid state drives of the brand. Are they dangerous for users? Which users are affected and when will the manufacturer release the solution?

Hardware security problems are the most important of all, since in many cases they are the last barrier when it comes to protecting our data. That is why when security problems are discovered in a processor, it is necessary to release a patch. That is, a change in the firmware code of the devices and components affected by the security bug. Being one of the reasons why it is worth having it updated. Especially if we usually work with sensitive data.

Therefore, security problems in the hardware are continually being searched for. Many of them are discovered years after the release of a processor, component, peripheral, or even an entire system. This is the case at hand. In any case, we must clarify that the problems we are talking about in this news andhave been resolved.

41 security vulnerabilities discovered in Intel hardware

From Intel they have reported that they have discovered 41 security vulnerabilities. Which affects a large number of brand products. Among those who include firmware for Intel Optane SSDs and some Intel NUC MiniPC modelsLinux drivers and even the XTU optimization software. As for the hardware affected by this problem, you can see it in the image below these lines. Where, as you can see, It affects several generations of Core processors, from the sixth to the tenth generation.

41 Intel Hardware Graphics Vulnerabilities

The security bug allows access to privileged or sensitive information if you know how to take advantage. Fortunately, Intel has already developed the patch and Windows users will be able to have it available with the next update of the operating system. On the other hand, Intel has already distributed the code for the solution to the different manufacturers of motherboards and laptops with the affected processors. In case you are a Linux user, then you can get the corresponding microcode update from GitHub.

This is not a series of high-risk security issues. Since I have given it a medium danger level. Since to take advantage of these vulnerabilities it is required that the attacker has authorized access and in a local network. So it is a minor fact in the background, but if it was not resolved it could have led to much more serious problems in the future. Therefore, it was necessary for Intel to solve the problem so that these do not serve as a springboard for much more advanced security violation mechanisms.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *