Potential security vulnerabilities in System Management Mode (SMM) and Intel® Trusted Execution Technology (TXT) for some Intel® Core™ Processors and Intel® Xeon® Processors may allow escalation of privilege, denial of service or information disclosure.** **Intel is releasing firmware updates to mitigate these potential vulnerabilities.
CVEID: CVE-2019-0152
Description: Insufficient memory protection in System Management Mode (SMM) and Intel® TXT** **for certain Intel® Xeon® Processors may allow a privileged user to potentially enable escalation of privilege via local access.
CVSS Base Score: 8.2 High
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2019-0151
Description: Insufficient memory protection in Intel® TXT for certain Intel® Core Processors and Intel® Xeon® Processors may allow a privileged user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.5 High
CVSS Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
For CVE-2019-0152
Server:
For CVE-2019-0151
Client:
*For Intel® Core™ Processors CVE-2019-0151 only impacts Intel® vPro™ Eligible Processors.
Server:
Intel recommends that users of Intel server products listed above** **update to the latest firmware version provided by the system manufacturer that addresses these issues.
For client platforms listed above updated SINIT modules are available at <https://www.intel.com/content/www/us/en/design/resource-design-center.html>.
This was found internally by Intel. Intel would like to credit Joe Cihula, Gabriel Negreira Barbosa and Rodrigo Rubira Branco (BSDaemon) for CVE–2019-0151. As well as Gabriel Negreira Barbosa and Rodrigo Rubira Branco (BSDaemon) for CVE-2019-0152.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.