Wiwynn Statement on Security Vulnerability (Intel-SA-00233/00213/00223)

Wiwynn have been notified of several security vulnerabilities and several Wiwynnn’s Intel-processor based servers are affected. Details and further reference are as below.
We are working with Intel for mitigations by updating system firmware in the coming future. Customers can contact techsupport@wiwynn.com for further supports.

  1. Intel-SA-00233
SummaryThis is related to a sub-class of speculative execution side-channel vulnerabilities called Microarchitectural Data Sampling (MDS) for several Intel processors. MDS is similar to previously disclosed speculative execution side channel vulnerabilities. A potential security vulnerability in CPUs may allow information disclosure.
Related CVEsCVE-2018-12127, CVE-1018-12126, CVE-2018-12130, CVE-2019-11091.
Impacted processorsSkylake SP, Skylake-D, Broadwell EP, Haswell EP, Avoton, Ivy Bridge EP and Sandy Bridge EP
Further informationIntel Security Advisory Intel-SA-00233

Intel Security First–MDS

  1. Intel-SA-00213
SummaryMultiple potential security vulnerabilities in Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology may allow users to potentially escalate privileges, disclose information or cause a denial of service.
Related CVEsCVE-2019-0089, CVE-2019-0090, CVE-2019-0086, CVE-2019-0091, CVE-2019-0092, CVE-2019-0093, CVE-2019-0094, CVE-2019-0096, CVE-2019-0097, CVE-2019-0098, CVE-2019-0099, CVE-2019-0153, CVE-2019-0170
Impacted processorsSkylake SP, Skylake-D, Broadwell EP, Haswell EP
Further informationIntel Security Advisory Intel-SA-00213
  1. Intel-SA-00223
SummaryMultiple potential security vulnerabilities in Intel firmware may allow for escalation of privilege or denial of service
Related CVEsCVE-2019-0119, CVE-2019-0120, CVE-2019-0126.
Impacted processorsSkylake SP and Skylake-D
Further informationIntel Security Advisory Intel-SA-00223