• Home
  • About
  • Privacy Policy
  • Contact
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • News
    • E-Business
    • Security
    • Digital Culture
  • How To
  • Guide
  • Device
    • Accessories
    • Smartphone
    • Cameras
    • Laptops
    • Smartwatch
  • Apps
  • Game
  • Social Media
  • Electric Vehicles
No Result
View All Result
  • Home
  • News
    • E-Business
    • Security
    • Digital Culture
  • How To
  • Guide
  • Device
    • Accessories
    • Smartphone
    • Cameras
    • Laptops
    • Smartwatch
  • Apps
  • Game
  • Social Media
  • Electric Vehicles
No Result
View All Result
Teknowire
No Result
View All Result
Home News Security

Another security vulnerability found in Intel-based PCs

Alan Johnson by Alan Johnson
January 19, 2022
in Security
Reading Time: 2 mins read
A A
0
Another security vulnerability found in Intel-based PCs
2.3k
VIEWS
Share on FacebookShare on Twitter

Recently security researchers revealed the presence of a new vulnerability for PC and laptop users. Reportedly, this vulnerability is classified as a fairly severe vulnerability.

This new vulnerability was discovered at the Java level (Log4Shell). The hackers are said to be able to execute commands remotely on the exploited machine. It was the National Institute of Standards and Technology (NIST) that discovered this vulnerability.

RelatedPosts

Microsoft Edge 97 Released, There Are 29 Security Vulnerabilities Fixed

Microsoft Add Free VPN Service from Cloudflare to Edge Browser

May 1, 2022
Google prepares AR headset, launches 2024

Google Makes Several Updates For Personal Data Security

May 1, 2022
Elon Musk: Twitter DM Must Have End-to-End Encryption

Elon Musk: Twitter DM Must Have End-to-End Encryption

April 30, 2022
Research Says App Tracking Transparency Features Can Still Be Cracked

Research Says App Tracking Transparency Features Can Still Be Cracked

April 24, 2022

Researchers say that this Java vulnerability affects the flying library in Apache. This vulnerability compromises any system accessible directly from a browser, mobile device, or application programming interface (or API) call.

This vulnerability is said to attack users of Intel-based PCs and laptops. And here are some parts that hackers can use to carry out attacks:

  • Intel Audio Development Kit
  • Intel Datacenter Manager
  • Intel oneAPI sample browser plugin for Eclipse
  • Intel System Debugger
  • Intel Secure Device Onboard (mitigation available on GitHub)
  • Intel Genomics Kernel Library
  • Intel System Studio
  • Computer Vision Annotation Tool maintained by Intel
  • Intel Sensor Solution Firmware Development Kit

Quoted from Tom’s Hardware (21/12), AMD has announced that its software products are safe from this exploit. However, they will still carry out further investigations to ensure that their platform is safe from these vulnerabilities.

On the other hand, NVIDIA is also affected by this vulnerability. However, those who use the latest software versions for services and subservices of each application, users are temporarily safe from these vulnerabilities.

However, NVIDIA also posted four products that are suspected of having a “Log4Shell” vulnerability if outdated. And here are the four products they suspect were attacked:

  • CUDA Toolkit Visual Profiler and Nsight Eclipse Edition
  • DGX Systems
  • NetQ
  • vGPU Software License Server

Meanwhile, Microsoft has issued an update for two of its products that are suspected of being affected by this vulnerability, one of which is Azure Spring Cloud because it uses certain Log4J elements in the boot process. They have also mitigated the Azure DevOps application to avoid this exploit.

Google News icon Follow Teknowire on Google News
Tags: IntelPCsecurity
Alan Johnson

Alan Johnson

Alan has been covering the technology news scene since 2010. Have passion in cryptocurrency and blockchain technology.

RelatedPosts

Google prepares AR headset, launches 2024
News

Google Makes Several Updates For Personal Data Security

May 1, 2022
Elon Musk: Twitter DM Must Have End-to-End Encryption
Security

Elon Musk: Twitter DM Must Have End-to-End Encryption

April 30, 2022
Research Says App Tracking Transparency Features Can Still Be Cracked
Security

Research Says App Tracking Transparency Features Can Still Be Cracked

April 24, 2022
LinkedIn Becomes Most Popular Brand Used for Phishing Attacks
Security

LinkedIn Becomes Most Popular Brand Used for Phishing Attacks

April 23, 2022

Newsletter

Popular

No Content Available
Teknowire

Teknowire is a technology news portal. We cover consumer tech, digital lifestyle, innovation, scientific breakthroughs, the future, and meaningful analysis for readers.

Tags

android apple Audio battery camera Chip chipset design display facebook Fast Charging game games Gaming google how to Huawei instagram iOS iphone laptop memory Meta microsoft NVIDIA Operating System OS price RAM samsung Screen security smartphone smartwatch snapdragon social media spec specification storage tablet tiktok twitter video WhatsApp Xiaomi

Categories

  • Accessories
  • Apps
  • Cameras
  • Device
  • Digital Culture
  • E-Business
  • Electric Vehicles
  • Game
  • Guide
  • How To
  • Laptops
  • News
  • Security
  • Smartphone
  • Smartwatch
  • Social Media
  • Tablets

Newsletter

  • Home
  • About
  • Privacy Policy
  • Contact

© 2022 Teknowire - Gadget and Technology News by Teknowire.

No Result
View All Result
  • Home
  • News
    • E-Business
    • Security
    • Digital Culture
  • How To
  • Guide
  • Device
    • Accessories
    • Smartphone
    • Cameras
    • Laptops
    • Smartwatch
  • Apps
  • Game
  • Social Media
  • Electric Vehicles

© 2022 Teknowire - Gadget and Technology News by Teknowire.

Go to mobile version
Hey Friend! Get the latest technology news straight into your inbox!

Don't worry, we don't spam

Close this popup