>Affected products:
> 6th, 7th & 8th Generation Intel® Core™ Processor Family
> Intel® Xeon® Processor E3-1200 v5 & v6 Product Family
> Intel® Xeon® Processor Scalable Family
> Intel® Xeon® Processor W Family
> Intel® Atom® C3000 Processor Family
> Apollo Lake Intel® Atom Processor E3900 series
> Apollo Lake Intel® Pentium™
> Celeron™ N and J series Processors
>Based on the items identified through the comprehensive security review, an attacker could gain unauthorized access to platform, Intel® ME feature, and 3rd party secrets protected by the Intel® Management Engine (ME), Intel® Server Platform Service (SPS), or Intel® Trusted Execution Engine (TXE).
>This includes scenarios where a successful attacker could:
>Impersonate the ME/SPS/TXE, thereby impacting local security feature attestation validity.
>Load and execute arbitrary code outside the visibility of the user and operating system.
>Cause a system crash or system instability.
>For more information, please see this Intel Support article
Recommendations:
>The following CVE IDs are covered in this security advisory:
>Intel® Manageability Engine Firmware 11.0.x.x/11.5.x.x/11.6.x.x/11.7.x.x/11.10.x.x/11.20.x.x
TOP WEW