fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Intel Fixes Critical Flaw in Corporate Remote Management Platform

Intel Fixes Critical Flaw in Corporate Remote Management Platform

Intel fixes critical flaw in corporate remote management platform

Image: Intel

Intel today addressed nine security vulnerabilities with the release of the September 2020 Platform Update, one of them being a critical flaw impacting the Active Management Technology (AMT) and Intel Standard Manageability (ISM) platforms.

Intel ATM is part of the Intel vPro platform, which spans Intel Core vPro and Intel Xeon processors, and it is primarily used by IT Ops teams for remotely discovering, repairing, and managing networked corporate systems.

These issues were detailed in five security advisories published by Intel on its Product Security Center, with fixes addressing them having been delivered to customers via the Intel Platform Update (IPU) process before disclosure.

Intel also provides lists of affected products and support for vulnerable products at the end of each advisory, together with contact details for reporting other security issues found to affect Intel products or tech.

Intel AMT remote privilege escalation

The AMT vulnerability tracked as CVE-2020-8758 is rated by Intel as a critical severity security issue with a CVSS base score of 9.8 and it may allow escalation of privilege on vulnerable systems following successful exploitation.

The vulnerability is due to improper buffer restrictions in the network subsystem and it could allow unauthenticated attackers to “escalate privileges on AMT provisioned systems across the corporate network.”

“For customers using Intel vPro systems that do not have AMT provisioned, an authenticated user with local access to the system may still be able to escalate privileges,” Intel’s Director of Communications Jerry Bryant said.

“If the platform is configured to use Client Initiated Remote Access (CIRA) and environment detection is set to indicate that the platform is always outside the corporate network, the system is in CIRA-only mode and is not exposed to the network vector.”

All Intel AMT and Intel ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68, and 14.0.39 are vulnerable to CVE-2020-8758 attacks. Fortunately, the vulnerability is not currently being exploited in the wild according to Bryant.

In June, Intel patched two other critical AMT privilege escalation vulnerabilities with 9.8 CVSS ratings (CVE-2020-0594 and CVE-2020-0595), affecting non-standard configurations where AMT was configured to use Internet Protocol version 6 (IPv6).

Also read: Personal Data Websites: 3 Things That You Must Be Informed

September 2020 Intel Platform Update advisories

Today’s Intel security advisories are listed in the table below, with info on their CVSS range severity rating to help users prioritize patch deployment.

Intel recommends checking the download links provided within the advisories or checking with your system manufacturers and OS vendors to learn how to obtain these updates.

AdvisoryAdvisory IDSeverity ratingCVSS Range
Intel AMT and Intel ISM AdvisoryINTEL-SA-00404CRITICAL7.8-9.8
Intel Driver & Support Assistant AdvisoryINTEL-SA-00405MEDIUM4.4
Intel BIOS AdvisoryINTEL-SA-00356MEDIUM2.0-5.1
Intel BIOS AdvisoryINTEL-SA-00347HIGH5.5-7.6

A full list of computer manufacturer support sites from where you can obtain most updates can be found here.

Intel is not aware of any of the issues addressed today being actively exploited in the wild but customers are still advised to install the security updates released today as soon as possible to block future attacks.

Also read: Computer Misuse Act Singapore: The Truth And Its Offenses

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us