Wiwynn have been notified of several security vulnerabilities and several Wiwynnn’s Intel-processor based servers are affected. Details and further reference are as below.
We are working with Intel for mitigations by updating system firmware in the coming future. Customers can contact techsupport@wiwynn.com for further supports.
- Intel-SA-00233
Summary |
This is related to a sub-class of speculative execution side-channel vulnerabilities called Microarchitectural Data Sampling (MDS) for several Intel processors. MDS is similar to previously disclosed speculative execution side channel vulnerabilities. A potential security vulnerability in CPUs may allow information disclosure. |
Related CVEs |
CVE-2018-12127, CVE-1018-12126, CVE-2018-12130, CVE-2019-11091. |
Impacted processors |
Skylake SP, Skylake-D, Broadwell EP, Haswell EP, Avoton, Ivy Bridge EP and Sandy Bridge EP |
Further information |
Intel Security Advisory Intel-SA-00233
Intel Security First–MDS
|
- Intel-SA-00213
Summary |
Multiple potential security vulnerabilities in Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology may allow users to potentially escalate privileges, disclose information or cause a denial of service. |
Related CVEs |
CVE-2019-0089, CVE-2019-0090, CVE-2019-0086, CVE-2019-0091, CVE-2019-0092, CVE-2019-0093, CVE-2019-0094, CVE-2019-0096, CVE-2019-0097, CVE-2019-0098, CVE-2019-0099, CVE-2019-0153, CVE-2019-0170 |
Impacted processors |
Skylake SP, Skylake-D, Broadwell EP, Haswell EP |
Further information |
Intel Security Advisory Intel-SA-00213 |
- Intel-SA-00223
Summary |
Multiple potential security vulnerabilities in Intel firmware may allow for escalation of privilege or denial of service |
Related CVEs |
CVE-2019-0119, CVE-2019-0120, CVE-2019-0126. |
Impacted processors |
Skylake SP and Skylake-D |
Further information |
Intel Security Advisory Intel-SA-00223 |