A potential security vulnerability in some Intel® Virtualization Technology for Directed I/0 (VT-d) products may allow escalation of privilege. Intel is releasing firmware updates to mitigate this potential vulnerability.
Description: Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 8.8. High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
10th Generation Intel® Core™ Processors
11th Generation Intel® Core™ Processors
Intel® Pentium® Processor J Series
Intel® Pentium® Processor N Series Intel® Celeron® Processor J Series
Intel® Celeron® Processor N Series Intel® Atom® Processor
A Series Intel® Atom® Processor E3900 Series
Intel® Pentium® Processor N Series
Intel® Celeron® Processor N Series
Intel® Atom® Processor E3900 Series
Intel® Pentium® Processor Silver Series/ J&N Series
Intel® Pentium® Processor Silver Series/ J&N – Refresh
Intel® Core™ Processors with Intel® Hybrid Technology
Intel recommends that users of Intel® VT-d update to the latest version provided by the system manufacturer that addresses these issues.
These issues were found internally by Intel employees.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.