-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1992
                     2020.1 IPU - Intel® SSD Advisory
                               10 June 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Intel SSD
Publisher:         Intel
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
                   Virtualisation
                   Network Appliance
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-0527  

Original Bulletin: 
   https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00266.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Public Security Advisory
Intel Product Security Incident Response Team (PSIRT)
secure@intel.com


Title: 2020.1 IPU - Intel® SSD Advisory
Intel ID: INTEL-SA-00266
Advisory Category: Firmware
Impact of vulnerability: Information Disclosure

Summary:

A potential security vulnerability in Intel® Solid State Drive (SSD) products may allow
information disclosure. Intel is releasing firmware updates to mitigate this potential
vulnerability.

Vulnerability Details:

CVE ID: CVE-2020-0527
Description: Insufficient control flow management in firmware for some Intel(R) Data Center
SSDs may allow a privileged user to potentially enable information disclosure via local access.
CVSS Base Score: 7.9 High
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Affected Products:

Intel® SSD D3-S4510 Series
Intel® SSD DC P4510 Series
Intel® SSD DC P4610 Series
Intel® SSD DC P4618 Series
Intel® SSD DC P4511 Series
Intel® SSD D5-P4326 Series
Intel® SSD D5-P4420 Series
Intel® SSD D5-P4320 Series

Recommendations:

Intel recommends updating Intel® SSD products to the latest firmware (see table).

Product Names                          Mitigated version

Intel® SSD D3-S4510 Series M.2 FF      FW: XC311120

Intel® SSD DC P4510 Series (U.2 only)  FW: VDV10170
Intel® SSD DC P4510 Series OPAL
Intel® SSD DC P4610 Series
Intel® SSD DC P4610 Series OPAL
Intel® SSD DC P4618 Series

Intel® SSD DC P4511 Series (m.2 only)  FW: VDV10170

Updates are available for download at this location:
https://downloadcenter.intel.com/product/35125/Memory-and-Storage

Acknowledgements:

The issue was found internally by Intel.
Intel, and nearly the entire technology industry, follows a disclosure practice called
Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly
disclosed only after mitigations are available.

Revision history:

Revision   Date         Description 
1.0        06/09/2020   Initial Release

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=7O4a
-----END PGP SIGNATURE-----