Intel Resolves 73 Vulnerabilities in June Platform Update

June 9, 2021

Intel has fixed 73 security vulnerabilities as part of the June 2021 Patch Tuesday, including serious vulnerabilities affecting several versions of Intel’s Security Library and the BIOS firmware for Intel processors.

In its advisory, Intel includes a list of affected products and recommendations for vulnerable products, as well as contact details for security researchers wishing to report security problems or vulnerabilities in Intel products.

Among the security updates released recently, Intel focused on five serious vulnerabilities affecting Intel Virtualization Technology for Directed I/0 (VT-d) products, the BIOS firmware for some Intel processors, and the Intel Security Library.

The first of them (tracked as CVE-2021-24489) is caused by incomplete purges in some Intel VT-d products that could allow authenticated attackers to elevate privileges over local access.

Intel has patched four other bugs (tracked as CVE-2020-12357, CVE-2020-8670, CVE-2020-8700, and CVE-2020-12359) caused by improper initialization, race condition, improper input validation, and insufficient control flow in the CPU BIOS firmware, allowing for privilege escalation via local or physical access.

Intel has also fixed 11 other vulnerabilities affecting Intel NUCs, Intel Driver and Support Assistant, Intel RealSense ID, Intel Field Programmable Gate Array, Open Programmable Acceleration Engine driver for Linux and Intel Thunderbolt controllers.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

March 5, 2026 Check Point Software on Wednesday launched a dedicated Canada data region for its CloudGuard Web Application Firewall more...

March 5, 2026 A small development company in Mexico says a compromised Google Cloud API key triggered more than $82,000 more...

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn