Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence malicious user to potentially access platform secrets via debug interfaces.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
intel xeon e3 1505m v6 |
||
intel xeon e3 1515m v5 |
||
intel xeon e3 1535m v5 |
||
intel xeon e3 1535m v6 |
||
intel xeon e3 1545m v5 |
||
intel xeon e3 1558l v5 |
||
intel xeon e3 1565l v5 |
||
intel xeon e3 1575m v5 |
||
intel xeon e3 1578l v5 |
||
intel xeon e3 1585 v5 |
||
intel xeon e3 1585l v5 |
||
intel xeon e3 1220 v5 - |
||
intel xeon e3 1220 v6 - |
||
intel xeon e3 1225 v5 - |
||
intel xeon e3 1225 v6 - |
||
intel xeon e3 1230 v5 - |
||
intel xeon e3 1230 v6 - |
||
intel xeon e3 1235l v5 - |
||
intel xeon e3 1240 v5 - |
||
intel xeon e3 1240 v6 - |
||
intel xeon e3 1240l v5 - |
||
intel xeon e3 1245 v5 - |
||
intel xeon e3 1245 v6 - |
||
intel xeon e3 1260l v5 - |
||
intel xeon e3 1268l v5 - |
||
intel xeon e3 1270 v5 - |
||
intel xeon e3 1270 v6 - |
||
intel xeon e3 1275 v5 - |
||
intel xeon e3 1275 v6 - |
||
intel xeon e3 1280 v5 - |
||
intel xeon e3 1280 v6 - |
||
intel xeon e3 1285 v6 - |
||
intel xeon e3 1501l v6 - |
||
intel xeon e3 1501m v6 - |
||
intel xeon e3 1505l v5 - |
||
intel xeon e3 1505l v6 - |
||
intel xeon e3 1505m v5 - |
||
intel xeon bronze 3104 - |
||
intel xeon bronze 3106 - |
||
intel xeon gold 5115 |
||
intel xeon gold 5118 |
||
intel xeon gold 5119t |
||
intel xeon gold 5120 |
||
intel xeon gold 5120t |
||
intel xeon gold 5122 |
||
intel xeon gold 6126 |
||
intel xeon gold 6126f |
||
intel xeon gold 6126t |
||
intel xeon gold 6128 |
||
intel xeon gold 6130 |
||
intel xeon gold 6130f |
||
intel xeon gold 6130t |
||
intel xeon gold 6132 |
||
intel xeon gold 6134 |
||
intel xeon gold 6134m |
||
intel xeon gold 6136 |
||
intel xeon gold 6138 |
||
intel xeon gold 6138f |
||
intel xeon gold 6138p |
||
intel xeon gold 6138t |
||
intel xeon gold 6140 |
||
intel xeon gold 6140m |
||
intel xeon gold 6142 |
||
intel xeon gold 6142f |
||
intel xeon gold 6142m |
||
intel xeon gold 6144 |
||
intel xeon gold 6146 |
||
intel xeon gold 6148 |
||
intel xeon gold 6148f |
||
intel xeon gold 6150 |
||
intel xeon gold 6152 |
||
intel xeon gold 6154 |
||
intel xeon platinum 8153 |
||
intel xeon platinum 8156 |
||
intel xeon platinum 8158 |
||
intel xeon platinum 8160 |
||
intel xeon platinum 8160f |
||
intel xeon platinum 8160m |
||
intel xeon platinum 8160t |
||
intel xeon platinum 8164 |
||
intel xeon platinum 8168 |
||
intel xeon platinum 8170 |
||
intel xeon platinum 8170m |
||
intel xeon platinum 8176 |
||
intel xeon platinum 8176f |
||
intel xeon platinum 8176m |
||
intel xeon platinum 8180 |
||
intel xeon platinum 8180m |
||
intel xeon silver 4108 |
||
intel xeon silver 4109t |
||
intel xeon silver 4110 |
||
intel xeon silver 4112 |
||
intel xeon silver 4114 |
||
intel xeon silver 4114t |
||
intel xeon silver 4116 |
||
intel xeon silver 4116t |
||
intel xeon d-1513n |
||
intel xeon d-1518 |
||
intel xeon d-1520 |
||
intel xeon d-1521 |
||
intel xeon d-1523n |
||
intel xeon d-1527 |
||
intel xeon d-1528 |
||
intel xeon d-1529 |
||
intel xeon d-1531 |
||
intel xeon d-1533n |
||
intel xeon d-1537 |
||
intel xeon d-1539 |
||
intel xeon d-1540 |
||
intel xeon d-1541 |
||
intel xeon d-1543n |
||
intel xeon d-1548 |
||
intel xeon d-1553n |
||
intel xeon d-1557 |
||
intel xeon d-1559 |
||
intel xeon d-1567 |
||
intel xeon d-1571 |
||
intel xeon d-1577 |
||
intel xeon d-2123it |
||
intel xeon d-2141i |
||
intel xeon d-2142it |
||
intel xeon d-2143it |
||
intel xeon d-2145nt |
||
intel xeon d-2146nt |
||
intel xeon d-2161i |
||
intel xeon d-2163it |
||
intel xeon d-2166nt |
||
intel xeon d-2173it |
||
intel xeon d-2177nt |
||
intel xeon d-2183it |
||
intel xeon d-2187nt |
||
intel atom c c2308 |
||
intel atom c c2316 |
||
intel atom c c2338 |
||
intel atom c c2350 |
||
intel atom c c2358 |
||
intel atom c c2508 |
||
intel atom c c2516 |
||
intel atom c c2518 |
||
intel atom c c2530 |
||
intel atom c c2538 |
||
intel atom c c2550 |
||
intel atom c c2558 |
||
intel atom c c2718 |
||
intel atom c c2730 |
||
intel atom c c2738 |
||
intel atom c c2750 |
||
intel atom c c2758 |
||
intel atom c c3308 |
||
intel atom c c3336 |
||
intel atom c c3338 |
||
intel atom c c3508 |
||
intel atom c c3538 |
||
intel atom c c3558 |
||
intel atom c c3708 |
||
intel atom c c3750 |
||
intel atom c c3758 |
||
intel atom c c3808 |
||
intel atom c c3830 |
||
intel atom c c3850 |
||
intel atom c c3858 |
||
intel atom c c3950 |
||
intel atom c c3955 |
||
intel atom c c3958 |
The story behind the quietly patched CVE-2018-3652 Intel left a fascinating security flaw in its chips for 16 years – here's how to exploit it
Ex-Intel security dragons have breathed fresh fire into the old maxim: if someone has physical access to your machine, you're pwned. US-based Eclypsium, founded by former Chipzillans Yuriy Bulygin and Alex Bazhaniuk, confirmed this week it is possible to pull off a classic evil maid attack against Intel-powered servers and workstations by abusing a USB-based system debugging mode to commandeer a vulnerable box. In effect, you can jam a widget into a vulnerable machine's USB port and run some cra...