Difference between revisions of "Security updates"
From fit-PC wiki
Line 4: | Line 4: | ||
'''Applies to'''<br> | '''Applies to'''<br> | ||
− | Below is the list of affected models: | + | Below is the list of affected models and update instructions: |
− | * Intense PC ( | + | * [[Intense PC (MintBox 2) security update 170523 | Intense PC (MintBox 2) ]] |
− | * IPC2 (4th gen Core models) | + | * [[IPC2 Haswell security update 170523 | IPC2 Haswell (4th gen Core models) ]] |
− | * IPC2 (5th gen Core models) | + | * [[IPC2 Broadwell security update 170523 | IPC2 Broadwell (5th gen Core models) ]] |
Models above with BIOS earlier than 20-May-2017 have this vulnerability. | Models above with BIOS earlier than 20-May-2017 have this vulnerability. | ||
Line 17: | Line 17: | ||
A BIOS update prevents unauthorized access to firmware Flash memory. | A BIOS update prevents unauthorized access to firmware Flash memory. | ||
Owners of affected models are advised to update BIOS. | Owners of affected models are advised to update BIOS. | ||
− | |||
− | |||
− | |||
− | |||
− |
Revision as of 12:00, 7 June 2017
Security update 170523
Date: 30-May-2017
Security update for IPC, IPC2, IPC2B
Applies to
Below is the list of affected models and update instructions:
Models above with BIOS earlier than 20-May-2017 have this vulnerability.
Vulnerability description
In case an affected model is exposed to malicious software running inside the operating system, the malicious software is able to read or write to Flash memory storing BIOS and Intel ME firmware and may corrupt or alter them.
Fix
A BIOS update prevents unauthorized access to firmware Flash memory.
Owners of affected models are advised to update BIOS.