Mobile and Desktop Processors
Intel® Core™ processors, Intel Atom® processors, tools, and utilities
16499 Discussions

Bios update for Intel identified potential security vulnerability in SMI Transfer monitor (STM) may

VARADHARAJAN
Valued Contributor I
716 Views

On 13th August 2024, Intel published in security advisory SA-01083 that a potential security vulnerability in the SMI Transfer monitor (STM) may allow privilege escalation. Intel is releasing microcode updates to mitigate this potential vulnerability.

Affected processors list

2nd Generation Intel® Xeon® Scalable processor family

3rd Generation Intel® Xeon® Scalable processor family

6th Generation Intel® Core™ Processor Family

7th Generation Intel® Core™ Processor Family

8th Generation Intel® Core™ Processor Family

9thGeneration Intel® Core™ Processor Family

10th Generation Intel® Core™ Processor Family

11th Generation Intel® Core™ Processor Family

Intel® Xeon® Processor Family

Intel® Xeon® W processor family

Intel® Core™ X-series Processor

Intel® Xeon® D Processor

Intel® Pentium® Gold Processor Series

Intel® Celeron® Processor 5000 Series

Intel® Xeon® E processor family

Intel® Celeron® Processor G Serie

Intel® Xeon® E-2300 processor family

Intel® Xeon® W-1300 processor family

 

sa01083.jpg

For Windows users

Intel recommends that users of affected Intel® Processors update to the latest version of firmware provided by the system manufacturer that addresses these issues.

 

Source link

INTEL-SA-01083

 

Thanking you

Varadharajan K M.Sc B.Ed

 

0 Kudos
1 Reply
DeancR_Intel
Moderator
611 Views

Hi VARADHARAJAN,


Thank you for posting and informing our community members.


If have you any other concerns or questions, please let us know.


Best regards,

 

Dean R.

Intel Customer Support Technician


0 Kudos
Reply