{"id":578,"date":"2021-11-16T13:46:18","date_gmt":"2021-11-16T12:46:18","guid":{"rendered":"https:\/\/oz-it.de\/?p=578"},"modified":"2021-11-16T13:55:58","modified_gmt":"2021-11-16T12:55:58","slug":"luecke-in-intel-prozessoren","status":"publish","type":"post","link":"https:\/\/oz-it.de\/?p=578","title":{"rendered":"L\u00fccke in Intel Prozessoren"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Unter den CVE CVE-2021-0157 und CVE-2021-0146 sind zwei L\u00fccken in Intel Prozessoren bekannt gemacht worden die es Angreifern erlauben, sich h\u00f6here Rechte auf einem System zu beschaffen.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Updates sind nur durch Patches f\u00fcr die entsprechenden BIOS Versionen der PCs und Server m\u00f6glich . Besonders prek\u00e4r ist, dass nahezu alle Prozessoren der Baureihen XEON, Core, Pentium, Celeron und Atom betroffen sind. Also das gesamte Portfolio der Intel-Prozessoren. Verbaut sind diese Prozessoren vom Server \u00fcber Workstation, bis hin zu Laptops, Tablets und manch einem Apple-Ger\u00e4t. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Da diese L\u00fccke als sehr kritisch eingestuft wird, ist es dringend geboten, bei den Herstellern der Systeme nach Updates f\u00fcr das BIOS Ausschau zu halten und diese zu installieren.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Details zu den Verwundbarkeiten sind direkt bei Intel ver\u00f6ffentlicht:<br><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00562.html\" target=\"_blank\" rel=\"noreferrer noopener\">INTEL-SA-00562<\/a><br><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00528.html?wapkw=CVE-2021-0146\" target=\"_blank\" rel=\"noreferrer noopener\">INTEL-SA-00528<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Nach den gro\u00dfen L\u00fccken Anfang 2018 und Mitte 2019 ist dieses erneut eine Bedrohung mit hoher Reichweite durch Prozessoren von einem Hersteller.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unter den CVE CVE-2021-0157 und CVE-2021-0146 sind zwei L\u00fccken in Intel Prozessoren bekannt gemacht worden die es Angreifern erlauben, sich h\u00f6here Rechte auf einem System zu beschaffen. Updates sind nur durch Patches f\u00fcr die entsprechenden BIOS Versionen der PCs und Server m\u00f6glich . Besonders prek\u00e4r ist, dass nahezu alle Prozessoren der Baureihen XEON, Core, Pentium, &hellip; <a href=\"https:\/\/oz-it.de\/?p=578\" class=\"more-link\"><span class=\"screen-reader-text\">\u201eL\u00fccke in Intel Prozessoren\u201c <\/span>weiterlesen<\/a><\/p>\n","protected":false},"author":3,"featured_media":241,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25,22],"tags":[],"class_list":["post-578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","category-it-sicherheit"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/oz-it.de\/wp-content\/uploads\/2020\/03\/ransomware-2321110_640.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/oz-it.de\/index.php?rest_route=\/wp\/v2\/posts\/578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oz-it.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oz-it.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oz-it.de\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/oz-it.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=578"}],"version-history":[{"count":3,"href":"https:\/\/oz-it.de\/index.php?rest_route=\/wp\/v2\/posts\/578\/revisions"}],"predecessor-version":[{"id":581,"href":"https:\/\/oz-it.de\/index.php?rest_route=\/wp\/v2\/posts\/578\/revisions\/581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oz-it.de\/index.php?rest_route=\/wp\/v2\/media\/241"}],"wp:attachment":[{"href":"https:\/\/oz-it.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oz-it.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oz-it.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}