Intel Platform Update (IPU) Update 2024.1 and INTEL-TA-00986, March 2024
More Information:
Security Advisories that affect BIOS:
- INTEL-SA-00898 – 2024.1 IPU - Intel® Atom® Processor Advisory
- Summary: A potential security vulnerability in some Intel® Atom® Processors may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability.
- Severity: Medium
- INTEL-SA-00923 – 2024.1 IPU - Intel® Chipset Software and SPS Advisory
- Summary: Potential security vulnerabilities in the Intel® Converged Security Management Engine (CSME) installer, Intel® Local Manageability Service software and Intel® Server Platform Services (SPS) may allow information disclosure, escalation of privilege, or denial of service.
- Severity: Medium
- INTEL-SA-00929 – 2024.1 IPU - BIOS Advisory
- Summary: A potential security vulnerability in BIOS firmware for some Intel® Processors may allow escalation of privilege. Intel is releasing BIOS updates to mitigate this potential vulnerability.
- Severity: High
- INTEL-SA-00950 – 2024.1 IPU OOB - Intel® Processor Advisory
- Summary: A potential security vulnerability in some Intel® Processors may allow escalation of privilege and/or information disclosure and/or denial of service via local access. Intel is releasing firmware updates to mitigate this potential vulnerability.
- Severity: High
- INTEL-SA-00960 – 2024.1 IPU - Intel® Xeon® Processor Advisory
- Summary: A potential security vulnerability in some 3rd and 4th Generation Intel® Xeon® Processors when using Intel® Software Guard Extensions (SGX) or Intel® Trust Domain Extensions (TDX) may allow escalation of privilege. Intel is releasing firmware updates to mitigate this potential vulnerability.
- Severity: Medium
- INTEL-SA-00972 – 2024.1 IPU - Intel® Processor Bus Lock Advisory
- Summary: A potential security vulnerability in the bus lock regulator mechanism for some Intel® Processors may allow denial of service. Intel is releasing firmware updates to mitigate this potential vulnerability.
- Severity: Medium
- INTEL-SA-00982 – 2024.1 IPU - Intel® Processor Return Predictions Advisory
- Summary: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing a firmware update to mitigate this potential vulnerability.
- Severity: Medium
- INTEL-SA-00986 – 4th Gen Intel® Xeon® Processor Advisory
- Summary: Potential security vulnerabilities in some 4th Generation Intel® Xeon® Processors when using Intel® Software Guard Extensions (SGX) or Intel® Trust Domain Extensions (TDX) may allow escalation of privilege or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
- Severity: High
- INTEL-SA-01045 – 2024.1 IPU - Intel® Xeon® D Processor Advisory
- Summary: A potential security vulnerability in some Intel® Xeon® D Processors with Intel® Software Guard Extensions (SGX) may allow information disclosure. Intel is releasing microcode updates to mitigate this potential vulnerability.
- Severity: Medium
Affected Platforms and BIOS version numbers that contain the fix:
X13-Alder Lake | BIOS version that contains the fix |
---|---|
B4SA1-CPU | v 3.2 |
X13SAE | v 3.2 |
X13SAE-F | v 3.2 |
X13SAN-H/-E/-L/-C | v 3.2 |
X13SAQ | v 3.2 |
X13SAV-LVDS | v 3.2 |
X13SAV-PS | v 3.2 |
X13SAZ-F | v 3.2 |
X13SAZ-Q | v 3.2 |
X11-BasinFalls | BIOS version that contains the fix |
---|---|
X11SRM-F | v 2.9 |
X11SRA/-(R)F | v 2.9 |
C9X299-PG(F)/RPGF | v 2.9 |
C9X299-PG300 | v 2.9 |
C9X299-PG300F | v 2.9 |
B11SRE | v 2.9 |
X11SRi-IF | v 2.9 |
X12-Cedar Island | BIOS version that contains the fix |
---|---|
X12QCH+ | v 1.9 |
X11-Coffee Lake | BIOS version that contains the fix |
---|---|
X11SCV-Q/L | v 2.4 |
X11SCQ/-L | v 2.4 |
X11SCZ-F/Q | v 2.4 |
X12/C9-Comet Lake | BIOS version that contains the fix |
---|---|
X12SAE/X12SCA-F | v 2.9a |
X12SCQ | v 2.9a |
X12SCV-LVDS | v 2.9a |
X12SCV-W | v 2.9a |
X12SCZ-TLN4F/QF/F | v 2.9a |
C9Z490-PGW | v 2.9a |
A2-Denverton | BIOS version that contains the fix |
---|---|
A2SDi-H-T(P4)F | v 2.0 |
A2SDi-HLN4F | v 2.0 |
A2SDi-TP8F/LN4F | v 2.0 |
A2SDV-LN8F/LN10PF | v 2.0 |
A2SDV-TLN5F | v 2.0 |
A2SD1-3750F/3955F | v 2.0 |
X13-EagleStream | BIOS version that contains the fix |
---|---|
X13SEi | v 2.2 |
X13DEM | v 2.2 |
X13SEW-TF | v 2.2 |
X13SEM-L | v 2.2 |
X13SEi-TF/-F | v 2.2 |
X13SEDW-F | v 2.2 |
X13SEM-F/-TF | v 2.2 |
X13DDW-A | v 2.2 |
X13SEFR-A | v 2.2 |
X13DSF-A | v 2.2 |
X13DEG-QT | v 2.2 |
X13DEI-(T) | v 2.2 |
X13DET-B | v 2.2 |
X13DET-T(F) | v 2.2 |
X13SEED | v 2.2 |
X13DAI-T | v 2.2 |
X13SET-G/-GC | v 2.2 |
X13SEFR-A | v 2.2 |
A3-Elkhart Lake | BIOS version that contains the fix |
---|---|
A3SEV | v 1.5 |
X13-Fishhawk Falls | BIOS version that contains the fix |
---|---|
X13SWA-T(F) | v 2.1 |
X13SRA-T(F) | v 2.1 |
X11-Greenlow_Workstation | BIOS version that contains the fix |
---|---|
X11SAE(-F) | v 4.1 |
X11SAE-M | v 4.1 |
X11SAT-F | v 4.1 |
X11SSQ | v 4.1 |
X11SSQ-L | v 4.1 |
X11SSV-Q/LVDS | v 4.1 |
X11SSZ-(Q)F/TLN4F | v 4.1 |
X12-Idaville | BIOS version that contains the fix |
---|---|
X12SDV-SPT4F | v 1.7 |
X12SDV-SP6F | v 1.7 |
X12SDV-SPT8F | v 1.7 |
B3SD1 | v 1.7 |
A3-Park Ridge | BIOS version that contains the fix |
---|---|
A3SPI-4C/8C-LN6PF/HLN4F | v 1.3 |
X11-Purley | BIOS version that contains the fix |
---|---|
X11SPi-TF | v 4.3 |
X11SPG-TF | v 4.3 |
X11SPH-nCT(P)F | v 4.3 |
X11SPL-F | v 4.3 |
X11SPM-(T)F/TPF | v 4.3 |
X11SPW-(C)TF | v 4.3 |
X11DPi-N/NT/Ni | v 4.3 |
X11DAi-N | v 4.3 |
X11DGQ-R | v 4.3 |
X11DPG-HGX2 | v 4.3 |
X11DPG-OT | v 4.3 |
X11DPS-RE | v 4.3 |
X11DAC | v 4.3 |
X11DGO | v 4.3 |
X11QPH+ | v 4.3 |
X11QPL | v 4.3 |
X11OPi | v 4.3 |
B11DPT | v 4.3 |
B11DPE | v 4.3 |
B11QPI/-T | v 4.3 |
X11DPD-L/M25 | v 4.3 |
X11DPG-QT (32MB) | v 4.3 |
X11DPG-QT (64MB) | v 4.3 |
X11DPL-i | v 4.3 |
X11DPU | v 4.3 |
X11DPU-V | v 4.3 |
X11DPU-R | v 4.3 |
X11DPX-T | v 4.3 |
X11DSC+ | v 4.3 |
X11DDW-L/N(T) | v 4.3 |
X11DPFF-SN | v 4.3 |
X11DPFR-S(N) | v 4.3 |
X11DPH-T(Q)(F) | v 4.3 |
X11DPT-B | v 4.3 |
X11DPT-PS | v 4.3 |
X11DPU-Z+ | v 4.3 |
B11SPE | v 4.3 |
X13-Raptor Lake | BIOS version that contains the fix |
---|---|
X13SRN-H/-E/-WOHS | v 3.2 |
X12/C9-Rocket Lake | BIOS version that contains the fix |
---|---|
X12SAE-5 | v 1.5 |
X12SCA-5F | v 1.5 |
C9Z590-CG(W) | v 1.5 |
A3-Snow Ridge | BIOS version that contains the fix |
---|---|
A3SSV-8C/16C/24C-SPLN10F | v 1.3 |
X12-Tatlow | BIOS version that contains the fix |
---|---|
X12STW | v 1.9 |
X12STH | v 1.9 |
X12STD | v 1.9 |
X12STE | v 1.9 |
X12STL-IF | v 1.9 |
X12STL-F | v 1.9 |
B3ST1 | v 1.9 |
X12Tiger Lake | BIOS version that contains the fix |
---|---|
X12STN | v 1.6 |
X11-Whiskey Lake | BIOS version that contains the fix |
---|---|
X11SWN-H/E/L | v 2.1 |
X12-Whitley | BIOS version that contains the fix |
---|---|
B12DPE-6 | v 1.9 |
B12DPT-6 | v 1.9 |
B12SPE-CPU | v 1.9 |
X12DAi-N6 | v 1.9 |
X12DGO-6 | v 1.9 |
X12DGQ-R | v 1.9 |
X12DPG-AR | v 1.9 |
X12DPG-OA6 | v 1.9 |
X12DPG-OA6-GD2 | v 1.9 |
X12DPG-QR | v 1.9 |
X12DPG-QBT6 | v 1.9 |
X12DPG-QT6 | v 1.9 |
X12DPG-U6 | v 1.9 |
X12DPi-N(T)6 | v 1.9 |
X12DPL-i6/NT6 | v 1.9 |
X12DDW-A6 | v 1.9 |
X12DGU | v 1.9 |
X12DHM-6 | v 1.9 |
X12DPD-A/AM25 | v 1.9 |
X12DPFR-AN6 | v 1.9 |
X12DPT-B6 | v 1.9 |
X12DPT-PT6/-PT46 | v 1.9 |
X12DPU-6 | v 1.9 |
X12DSC-6 | v 1.9 |
X12DSC-A6 | v 1.9 |
X12SPO-(NT)F | v 1.9 |
X12SPM Series | v 1.9 |
X12SPW-(T)F | v 1.9 |
X12SPL-LN4F | v 1.9 |
X12SPZ-SPLN6F/LN4F | v 1.9 |
X12SPi-TF | v 1.9 |
X12SPA-TF | v 1.9 |
X12SPED-F | v 1.9 |
X12SPG-NF | v 1.9 |
X12SPT-PT | v 1.9 |
X12SPT-G | v 1.9 |
X12DPi | v 1.9 |
Additional Resources
Security Advisories That Are Affecting BIOS:
- Intel Security Advisory Intel-SA-00898
- Intel Security Advisory Intel-SA-00923
- Intel Security Advisory Intel-SA-00929
- Intel Security Advisory Intel-SA-00950
- Intel Security Advisory Intel-SA-00960
- Intel Security Advisory Intel-SA-00972
- Intel Security Advisory Intel-SA-00982
- Intel Security Advisory Intel-SA-00986
- Intel Security Advisory Intel-SA-01045