CVE-2018-3629: Intel(R) Server Platform Services (SPS) before versions SPS_E3_06.00.03.035.0 and SPS_X5_00.05.00.003.116, when running on an operating system that does not support Intel Software Guard Extensions (SGX), may allow a privileged user to potentially enable a denial of service (DoS) via local access. CVE-2018-3630: Intel(R) Storage Server (SAS) before versions v11.5.20.00, v10.00.18.00, v8.00.17.00 and v7.00.13.00 may allow a privileged user to potentially enable a denial of service (DoS) via local access. CVE-2018-3631: Intel(R) Active Management Technology (AMT) before versions v11.5.20.00, v10.00.18.00, v8.00.17.00 and v7.00.13.00 may allow a privileged user to potentially enable a denial of service (DoS) via local access. CVE-2018-3632: Intel(R) Data Center Networking (DCN) before versions v11.5.20.00, v10.00.18.00, v8.00.17.00 and v7.00.13.00 may allow a privileged user to potentially enable

Vulnerability discovery and analysis

On September 26, 2018, Intel released security updates for 13 different vulnerabilities. All of these vulnerabilities are considered critical because they could lead to a system-wide denial of service (DoS) attack. This type of attack would not only disrupt your business but also cause millions of dollars in damages. In order to avoid these types of attacks, you must prioritize your security and make sure that you are following best practices for protecting your computer systems and data.

Timeline

Published on: 11/11/2022 16:15:00 UTC
Last modified on: 11/17/2022 15:37:00 UTC

References