Home » Tech News » BIOS Updates Started Amid Intel Privilege Security Vulnerabilities

BIOS Updates Started Amid Intel Privilege Security Vulnerabilities

Some manufacturers have started to deliver new firmware versions for their mainboards. The BIOS updates are intended to close recently discovered security gaps in Intel processors. Numerous CPU series are affected by the vulnerabilities.

With the two holes found, attackers have the opportunity to gain higher rights on a system. The vulnerabilities are known under the two names CVE-2021-0157 and CVE-2021-0146. Both security flaws are said to be potentially a high threat. As Phoronix reports, the first gap affects the Xeon series E, E3 v6, and W as well as the third Xeon Scalable generation. In addition, all processors of the seventh, tenth and eleventh core generations are affected. The Core X, Celeron N, and Pentium Silver series are not spared from the weak point either.

The second vulnerability seems to primarily affect low-end processors. The J and N models of the Pentium and Celeron series are unsafe. In addition, the vulnerability can be exploited together with the Atom A and E3900 series and Pentium Silver CPUs.

Users Should Find Patches

Since the threat level is classified as high, all users who have a processor from the affected ranks should check whether the manufacturer of the mainboard has already published a BIOS update. The patches made available prevent exploits.

If you have a processor from the Alder Lake S family, you don’t have to worry. Intel’s latest CPU generation is not affected by the vulnerabilities. Nevertheless, it is advisable to update the BIOS regularly, as the manufacturers may also eliminate further security gaps with the updates.

Yasir Zeb

Manager at Research Snipers, RS-NEWS, Digital marketing enthusiast and industry professional in Digital technologies, Technology News, Mobile phones, software, gadgets with vast experience in the tech industry, I have a keen interest in technology, News breaking.

Leave a Reply

Your email address will not be published. Required fields are marked *