First published: Thu Dec 08 2016(Updated: )
SMM call out in all Intel Branded NUC Kits allows a local privileged user to access the System Management Mode and take full control of the platform.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel City Bios | <=ccsklm5v.86a | |
Intel Stk2m3w64cc | ||
Intel Canyon Bios | <=kyskli70.86a | |
Intel Nuc6i7kyb | ||
Intel Canyon Bios | <=pybwcel.86a | |
Intel Nuc5cpyh | ||
Intel Nuc5pgyh | ||
Intel Nuc5ppyh | ||
Intel City Bios | =ccsklm30.86a | |
Intel Stk2mv64cc | ||
Intel Canyon Bios | <=fybyt10h.86a | |
Intel Dn2820fyb | ||
Intel City Bios | <=ccsklm30.86a | |
Intel Swift Canyon Bios | <=syskli35.86a | |
Intel Nuc6i3syb | ||
Intel Nuc6i5syb | ||
Intel Citry Bios | <=scchtax5.86a | |
Intel Stk1aw32sc | ||
Intel Canyon Bios | <=mybdwi5v.86a | |
Intel Nuc5i3mybe | ||
Intel Canyon Bios | <=mybdwi30.86a | |
Intel City Bios | <=scchtax5.86a | |
Intel Stk1a32sc | ||
Intel Canyon Bios | <=rybdwi35.86a | |
Intel Nuc5i3ryb | ||
Intel Nuc5i5ryb | ||
Intel Nuc5i7rykh |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.