Security researchers from Positive Technologies (PT) have disclosed a high-severity Privilege Escalation vulnerability (CVE-2021-0146) which allows attackers to read encryption keys. We have created this post to let you know which versions of Intel processors are vulnerable to this flaw and how you can fix CVE-2021-0146, a high-severity Privilege Escalation vulnerability.
The vulnerability is rated 7.1 as per the CVSS v3.
CVSS v3 Base Score | 7.1 |
Description | Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. |
Vector | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
Access Vector | Physical |
Access Complexity | High |
Privileges Required | None |
User Interaction | None |
Scope | Changed |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
CVSSv3 Version | 3.1 |
The vulnerability mainly affects the J and N series of Pentium and Celeron Processors. Specially, CPU IDs 506C9, 506CA, 706A1, 706A8, and 506F1.
These chips are used to power laptops, mobile devices, embedded systems, medical devices, and a variety of Internet of Things (IoT).
egment | Chipset/SOC or Processor | CPU ID | Platform ID |
Desktop, Mobile | Intel® Pentium® Processor J Series, N Series Intel® Celeron® Processor J Series, N Series Intel® Atom® Processor A Series Intel® Atom® Processor E3900 Series | 506C9 | 3 |
Embedded | Intel® Pentium® Processor N Series Intel® Celeron® Processor N Series Intel® Atom® Processor E3900 Series | 506CA | 3 |
Desktop, Mobile | Intel® Pentium® Processor Silver Series/ J&N Series | 706A1 | 1 |
Desktop, Mobile | Intel® Pentium® Processor Silver Series/ J&N Series – Refresh | 706A8 | 1 |
Embedded | Intel® Atom® Processor C3000 | 506F1 | 1 |
There are severe negative implications if we list. Since it’s a local privilege escalation vulnerability, attackers may need physical access to abuse the flaw. This vulnerability allows an attacker to extract a device’s encryption key from a stolen laptop and gain access to the encrypted data on the laptop.
Attackers can use this vulnerability to decrypt digital content protected by Intel’s Platform Trust Technology and Enhanced Privacy ID (EPID) technologies by extracting the root EPID encryption key. This allows adversaries to frame a supply chain attack.
To address this vulnerability, Intel has published a security advisory that recommends that users of affected Intel® Processors upgrade their BIOS (provided by the system manufacturer) to the latest version. Please contact the device vendors for more support.
For instance, Dell has published that it has fixed these three vulnerabilities in its new BIOS release in its November security update.
We hope this post will help you in knowing How to Fix CVE-2021-0146- A High Severity Privilege Escalation Vulnerability in Intel Chips. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
How To Fix CVE-2022-24671- A Privilege Escalation Vulnerability In Trend Micro Antivirus
How To Fix CVE-2022-20759- A Privilege Escalation Vulnerability In Cisco ASA And Cisco FTD
What Is A Privilege Escalation Attack? How To Prevent Privilege Escalation Attacks?
How To Fix The Dirty Pipe Vulnerability In Linux Kernel- CVE-2022-0847
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.