News - Wiwynn

Wiwynn Statement on Security Vulnerability (Intel-SA-00233/00213/00223)

Written by Press | May 15, 2019 9:50:52 AM

Wiwynn have been notified of several security vulnerabilities and several Wiwynnn’s Intel-processor based servers are affected. Details and further reference are as below.
We are working with Intel for mitigations by updating system firmware in the coming future. Customers can contact techsupport@wiwynn.com for further supports.

  1. Intel-SA-00233
Summary This is related to a sub-class of speculative execution side-channel vulnerabilities called Microarchitectural Data Sampling (MDS) for several Intel processors. MDS is similar to previously disclosed speculative execution side channel vulnerabilities. A potential security vulnerability in CPUs may allow information disclosure.
Related CVEs CVE-2018-12127, CVE-1018-12126, CVE-2018-12130, CVE-2019-11091.
Impacted processors Skylake SP, Skylake-D, Broadwell EP, Haswell EP, Avoton, Ivy Bridge EP and Sandy Bridge EP
Further information Intel Security Advisory Intel-SA-00233

 

Intel Security First–MDS

  1. Intel-SA-00213
Summary Multiple potential security vulnerabilities in Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology may allow users to potentially escalate privileges, disclose information or cause a denial of service.
Related CVEs CVE-2019-0089, CVE-2019-0090, CVE-2019-0086, CVE-2019-0091, CVE-2019-0092, CVE-2019-0093, CVE-2019-0094, CVE-2019-0096, CVE-2019-0097, CVE-2019-0098, CVE-2019-0099, CVE-2019-0153, CVE-2019-0170
Impacted processors Skylake SP, Skylake-D, Broadwell EP, Haswell EP
Further information Intel Security Advisory Intel-SA-00213
  1. Intel-SA-00223
Summary Multiple potential security vulnerabilities in Intel firmware may allow for escalation of privilege or denial of service
Related CVEs CVE-2019-0119, CVE-2019-0120, CVE-2019-0126.
Impacted processors Skylake SP and Skylake-D
Further information Intel Security Advisory Intel-SA-00223