![]() If you can’t switch to the newer RST software series, you should at least get the latest patches for your current software. Ideally it would be the latter (or newer (opens in new tab)), as that’s the current software series. The specific versions to which you should update are: v15.9.8.x, v16.8.3.x, or v17.5.1.x. Intel has released patches for its RST software, including version series 15.x, 16.x, and 17.x. Vulnerability Discovery and Mitigation Timeline As the DLL libraries are supposed to be used by the “trusted” Intel RST software, that means antivirus engines will also ignore it by default. ![]() The attackers could then load the malicious from anywhere in the system.įurthermore, the malware would gain persistence, as Intel RST will continue to load the malicious DLL every time it’s restarted. Intel seems to have made it easy for attackers, too, as when RST can’t find the missing DLLs in the folder where they were supposed to be, it starts searching for them in other folders. Intel’s IAStorDataMgrSvc.exe executable belonging to the RST software tries to load the following non-existent DLLs:Īn attacker could take advantage of this by creating at least one malicious DLL that uses one of those names.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |