Pakistan Telecommunication Authority (PTA) has issued a critical cyber security advisory regarding multiple vulnerabilities discovered in Intel products. These vulnerabilities pose a significant threat to organizations using Intel software and hardware, as they could be exploited to gain unauthorized access or disrupt operations.
The vulnerabilities affect a range of Intel products, including Intel GPA Software, Intel GPA Framework Software, Intel Server Products UEFI Firmware, and Intel Server Board Onboard Video Driver Software. The advisory warns that these vulnerabilities could be exploited by attackers to gain elevated privileges or launch denial-of-service (DoS) attacks.
The vulnerabilities stem from various technical flaws, such as incorrect default permissions, uncontrolled search paths, and improper input validation. PTA has classified these vulnerabilities as significant threats due to their high potential for local privilege escalation. The vulnerabilities have been assigned Common Vulnerabilities and Exposures (CVEs), including CVE-2023-24460, CVE-2024-21788, and CVE-2023-41961.
To mitigate the risks associated with these vulnerabilities, PTA has issued several recommendations. Organizations are advised to implement strong access controls, ensuring that users have only the necessary privileges to perform their job functions. Comprehensive monitoring systems should be deployed to detect any unusual activities that could indicate a compromise. Limiting physical and network access to affected Intel products to trusted personnel and using multi-factor authentication are also essential preventive measures.
Regular security audits and vulnerability assessments are crucial to identify and address potential weaknesses. PTA has emphasized the importance of user education, particularly regarding the dangers of privilege escalation attacks. Users are urged to avoid password reuse and be vigilant against phishing attempts.
To enhance security, PTA has recommended deploying Host Intrusion Detection Systems (HIDS) to monitor critical files and directories for unauthorized changes. Any suspicious activities or incidents should be reported to PTA via its CERT Portal and email for further investigation and action.
By following these recommendations, organizations can significantly reduce their exposure to the risks associated with these Intel vulnerabilities and protect their systems from potential cyberattacks.