You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As there are only pinned/linked forum threads for CSME and TXE updates (at least there is no link for SPS updates in README.md) I hereby post this data in a GitHub issue (maybe you want to create a pinned/linked forum thread for SPS updates, too):
╔══════════════════════════════════════════╗
║ ME Analyzer v1.85.1 r163 ║
╚══════════════════════════════════════════╝
╔════════════════════════════════════════╗
║ X11SDV9.517 (1/1) ║
╟─────────────────────────┬──────────────╢
║ Family │ CSE SPS ║
╟─────────────────────────┼──────────────╢
║ Version │ 04.00.04.097 ║
╟─────────────────────────┼──────────────╢
║ Release │ Production ║
╟─────────────────────────┼──────────────╢
║ Type │ Region ║
╟─────────────────────────┼──────────────╢
║ SKU │ 3 ║
╟─────────────────────────┼──────────────╢
║ Chipset │ LBG-H B,A ║
╟─────────────────────────┼──────────────╢
║ Security Version Number │ 3 ║
╟─────────────────────────┼──────────────╢
║ Version Control Number │ 0 ║
╟─────────────────────────┼──────────────╢
║ Production Version │ Yes ║
╟─────────────────────────┼──────────────╢
║ OEM RSA Signature │ No ║
╟─────────────────────────┼──────────────╢
║ OEM Unlock Token │ No ║
╟─────────────────────────┼──────────────╢
║ Date │ 2019-02-02 ║
╟─────────────────────────┼──────────────╢
║ File System State │ Configured ║
╟─────────────────────────┼──────────────╢
║ Size │ 0x37E000 ║
╟─────────────────────────┼──────────────╢
║ Flash Image Tool │ 04.00.04.097 ║
╟─────────────────────────┼──────────────╢
║ Chipset Support │ Bakerville ║
╚═════════════════════════╧══════════════╝
Note: This CSE SPS firmware was not found at the database, please report it!
CVEID: CVE-2019-0089 [...] Description: Improper data sanitization vulnerability in subsystem in Intel(R) SPS before versions [...] and SPS_SoC-X_04.00.04.086.0 may allow a privileged user to potentially enable escalation of privilege via local access.
Best regards,
Werner
The text was updated successfully, but these errors were encountered:
I have found a unknown CSE SPS version in the BIOS version 1.1a (X11SDV9.517) for the Supermicro X11SDV-4C-TP8F mainboard (download is https://www.supermicro.com/about/policies/disclaimer.cfm?SoftwareItemID=7720).
As there are only pinned/linked forum threads for CSME and TXE updates (at least there is no link for SPS updates in README.md) I hereby post this data in a GitHub issue (maybe you want to create a pinned/linked forum thread for SPS updates, too):
[UPDATE]: This version 04.00.04.097 seems to be the fix for CVE-2019-0089 as the version before this (04.00.04.086) is listed in https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html like the following:
Best regards,
Werner
The text was updated successfully, but these errors were encountered: