On November 12, 2019, Intel disclosed several potential security vulnerabilities. These potential security vulnerabilities may allow escalation of privilege, denial of service or information disclosure. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities. The vulnerability details are as follows:
Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel-SA-00241: CVE-2019-11090(fTPM), CVE-2019-11109
Potential security vulnerabilities(Improper directory permissions、Cryptographic timing conditions) in Intel® Server Platform Services (SPS) may allow escalation of privilege, denial of service or information disclosure.
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
Intel-SA-00280: CVE-2019-11136, CVE-2019-11137
Potential security vulnerabilities(insufficient input validation、insufficient access control) in Intel firmware may allow escalation of privilege, denial of service and/or information disclosure.
Inspur started the relevant investigation work in the first time. Inspur ISRC will update the security notice at any time. Please keep an eye on the security bulletin for this incident.
Inspur Products Affected:
Inspur Server M5 products have vulnerabilities Intel-SA-00240, Intel-SA-00270, Intel-SA-00271, Intel-SA-00280. The detailed affected products are shown in the following table:
|Product Name||Affected Version|
|4.1.07 and earlier|
|SN5161M5||4.1.01 and earlier|
|NF8480M5||4.1.10 and earlier|
|NX5460M5||4.1.03 and earlier|
|NF5288M5||4.1.05 and earlier|
|TS860M5||4.1.09 and earlier|
|NF5280M5||4.1.11 and earlier|
|NF5466M5||4.1.8 and earlier|
|NF5180M5||4.1.5 and earlier|
|NS5162M5||4.1.6 and earlier|
|NF5266M5||3.1.3 and earlier|
|NF5270M5||4.1.2 and earlier|
|NF8380M5||4.1.3 and earlier|
|NF8260M5||4.1.11 and earlier|
|NF5468M5||3.1.6 and earlier|
|3.1.3 and earlier|
|NF5568M5||3.1.0 and earlier|
2019-11-16 V1.1 Increase the list of affected products
2019-11-15 V1.0 InitialInspur Security Procedures：
Inspur is committed to ensuring user safety, working to resolve issues quickly when problems arise, and providing recommendations through security advisories and security notices.
If you have information about a security issue or vulnerability with Inspur products and solutions, please send an e-mail to email@example.com. For details, please visit：
If you require technical support, please visit:
Copyright © 2018 Inspur. All Rights Reserved.