Pasar al contenido principal
Intel Platform Update (IPU) Update 2024.3, August 2024

More Information:

Security Advisories that affect BIOS:

  • INTEL-SA-01038 – 2024.2 IPU - Intel® Core™ Ultra Processor Stream Cache Advisory
    • Summary: A potential security vulnerability in the Intel® Core™ Ultra Processor stream cache mechanism may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability.
    • Severity: High
  • INTEL-SA-01046 – 2024.2 IPU - Intel® Processor Stream Cache Advisory
    • Summary: A potential security vulnerability in some Intel® Processor stream cache mechanisms may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability.
    • Severity: High
  • INTEL-SA-00999 – 2024.3 IPU - Intel® Chipset Firmware Advisory
    • Summary: Potential security vulnerabilities in Intel® Converged Security and Manageability Engine (CSME), Intel® Active Management Technology (AMT), Intel® Standard Manageability, Intel® PROSet/Wireless and Intel® Killer™ Wi-Fi software may allow escalation of privilege, denial of service, or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
    • Severity: Medium
  • INTEL-SA-01083 – 2024.3 IPU - SMI Transfer Monitor Advisory
    • Summary: A potential security vulnerability in SMI Transfer monitor (STM) may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability.
    • Severity: High
  • INTEL-SA-01100 – 2024.3 IPU - Intel® Xeon® Processor Advisory
    • Summary: A potential security vulnerability in some 3rd, 4th, and 5th Generation Intel® Xeon® Processors may allow escalation of privilege. Intel is releasing firmware updates to mitigate this potential vulnerability.
    • Severity: Medium
  • INTEL-SA-01118 – 2024.3 IPU - 3rd Generation Intel® Xeon® Scalable Processor Advisory
    • Summary: A potential security vulnerability in some 3rd Generation Intel® Xeon® Scalable Processors may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability.
    • Severity: Medium

Affected Platforms and BIOS version numbers that contain the fix:

X13-CatlowBIOS version that contains the fix
X13SCL-IFv 2.0
X13SCL-Fv 2.0
X13SCHv 2.0
X13SCD-Fv 2.0
X13SCWv 2.0
B4SC1v 2.0
X12-Cedar IslandBIOS version that contains the fix
X12QCH+v 2.0
X13-Eagle StreamBIOS version that contains the fix
X13DEHv 2.4
X13DEG-OADv 2.4
X13DEG-OAv 2.4
X13DGUv 2.4
X13QEH+v 2.4
X13DAi-Tv 2.4
X13DDWv 2.4
B13DEEv 2.4
B13DETv 2.4
B13SEE-CPU-25Gv 2.4
B13SEGv 2.4
X13DEG-Mv 2.4
X13DEG-QTv 2.4
X13DEG-Rv 2.4
X13DEG-PVCv 2.4
X13DEi(-T)v 2.4
X13DEMv 2.4
X13DET-Bv 2.4
X13DSF-Av 2.4
X13SEDW-Fv 2.4
X13SEED-F/SFv 2.4
X13SEFR-Av 2.4
X13SEI-TF/-Fv 2.4
X13SEM-TFv 2.4
X13SET-G/-GCv 2.4
X13SET-PTv 2.4
X13SEVR-SP13Fv 2.4
X13SEWv 2.4
X13SEW-TF-OS1v 2.4
X13OEiv 2.4
X11-Greenlow refresh ServerBIOS version that contains the fix
X11SSD-Fv 3.4
X11SSH-(C)TFv 3.4
X11SSH-(LN4)Fv 3.4
X11SSL(-F)v 3.4
X11SSL-C/nFv 3.4
X11SSM(-F)v 3.4
X11SSW-(4)TFv 3.4
X11SSW-Fv 3.4
X11SSA-F/X11SSi-LN4Fv 3.4
X11SSE-Fv 3.4
X11SSH-G(T)F-1585(L)v 3.4
X11SSV-M4Fv 3.4
B2SS2-Fv 3.4
B2SS2-CPU/-(C)Fv 3.4
B2SS1/2(-H)-MTFv 3.4
X12-IdavilleBIOS version that contains the fix
X12SDV-SPT4Fv 1.8
X12SDV-SP6Fv 1.8
X12SDV-SPT8Fv 1.8
B3SD1v 1.8
X11-Mehlow ServerBIOS version that contains the fix
X11SCWv 2.5
X11SCDv 2.5
X11SCMv 2.5
X11SCL-LN4Fv 2.5
X11SCEv 2.5
X11SCHv 2.5
X11SCL-Fv 2.5
X11SCLv 2.5
X11-Mehlow WorkstationBIOS version that contains the fix
X11SCA-Fv 2.6
X11SCQ/Lv 2.6
X11SCV-Q/Lv 2.6
X11SCZ-F/Qv 2.6
B2SC1v 2.6
B2SC2v 2.6
B11SCG-CTFv 2.6
B11SCG-ZTFv 2.6
X13-Raptor LakeBIOS version that contains the fix
X13SRN-H/-E/-WOHSv 3.3
X12-TatlowBIOS version that contains the fix
X12STWv 2.1
X12STHv 2.1
X12STDv 2.1
X12STEv 2.1
X12STL-IFv 2.1
X12STL-Fv 2.1
B3ST1v 2.1
X12-Tiger LakeBIOS version that contains the fix
X12STNv 1.8
X11-Whiskey LakeBIOS version that contains the fix
X11SWNv 2.1
X12-WhitleyBIOS version that contains the fix
B12DPE-6v 2.1
B12DPT-6v 2.1
B12SPE-CPUv 2.1
X12DAi-N6v 2.1
X12DGO-6v 2.1
X12DGQ-Rv 2.1
X12DPG-ARv 2.1
X12DPG-OA6v 2.1
X12DPG-OA6-GD2v 2.1
X12DPG-QRv 2.1
X12DPG-QBT6v 2.1
X12DPG-QT6v 2.1
X12DPG-U6v 2.1
X12DPi-N(T)6v 2.1
X12DPL-i6/NT6v 2.1
X12DDW-A6v 2.1
X12DGUv 2.1
X12DHM-6v 2.1
X12DPD-A/AM25v 2.1
X12DPFR-AN6v 2.1
X12DPT-B6v 2.1
X12DPT-PT6/-PT46v 2.1
X12DPU-6v 2.1
X12DSC-6v 2.1
X12DSC-A6v 2.1
X12SPO-(NT)Fv 2.1
X12SPM Seriesv 2.1
X12SPW-(T)F, X12SPW-(T)Fv 2.1
X12SPL-LN4Fv 2.1
X12SPZ-SPLN6F/LN4Fv 2.1
X12SPi-TFv 2.1
X12SPA-TFv 2.1
X12SPED-Fv 2.1
X12SPG-NFv 2.1
X12SPT-PTv 2.1
X12SPT-Gv 2.1
X12DPiv 2.1
X11-Purley RefreshBIOS version that contains the fix
X11SPi-TFv 4.4
X11SPG-TFv 4.4
X11SPH-nCT(P)Fv 4.4
X11SPL-Fv 4.4
X11SPM-(T)F/TPFv 4.4
X11SPW-(C)TFv 4.4
X11DPi-N/NT/Niv 4.4
X11DAi-Nv 4.4
X11DGQ-Rv 4.4
X11DPG-HGX2v 4.4
X11DPG-OTv 4.4
X11DPS-REv 4.4
X11DACv 4.4
X11DGOv 4.4
X11QPH+v 4.4
X11QPLv 4.4
X11OPiv 4.4
B11DPTv 4.4
B11DPEv 4.4
B11QPI/-Tv 4.4
X11DPD-L/M25v 4.4
X11DPG-QT (32MB)v 4.4
X11DPG-QT (64MB)v 4.4
X11DPL-iv 4.4
X11DPUv 4.4
X11DPU-Vv 4.4
X11DPU-Rv 4.4
X11DPX-Tv 4.4
X11DSC+v 4.4
X11DDW-L/N(T)v 4.4
X11DPFF-SNv 4.4
X11DPFR-S(N)v 4.4
X11DPH-T(Q)(F)v 4.4
X11DPT-Bv 4.4
X11DPT-PSv 4.4
X11DPU-Z+v 4.4
B11SPEv 4.4
X13-Alder LakeBIOS version that contains the fix
B4SA1-CPUv 3.3
X13SAEv 3.3
X13SAE-Fv 3.3
X13SAN-H/-E/-L/-Cv 3.3
X13SAQv 3.3
X13SAV-LVDSv 3.3
X13SAV-PSv 3.3
X13SAZ-Fv 3.3
X13SAZ-Qv 3.3
X12/C9-Comet LakeBIOS version that contains the fix
X12SAE/X12SCA-Fv 3.1
X12SCQv 3.1
X12SCV-LVDSv 3.1
X12SCV-Wv 3.1
X12SCZ-TLN4F/QF/Fv 3.1
C9Z490-PGWv 3.1
X12/C9-Rocket LakeBIOS version that contains the fix
X12SAE-5v 1.7
X12SCA-5Fv 1.7
C9Z590-CG(W)v 1.7