PixieFAIL Vulnerability

CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235
Apr 03, 2024

Giga Computing Technology Co., Ltd. acknowledges the security vulnerabilities affecting GIGABYTE’s server, workstation, and motherboard products. The affected platforms are listed below.

 

Platform

BIOS Release Schedule

AMD EPYC™ 9004 Series Processors

Released

AMD EPYC™ 8004 Series Processors

Apr 2024

AMD EPYC™ 7002/7003 Series Processors

Apr 2024

AMD Ryzen™ 7000 Series Processors

May 2024

AMD Ryzen™ Threadripper™ PRO 3000/5000 WX-Series Processors

May 2024

4th/5th Gen Intel® Xeon® Scalable Processors

Released

Intel® Xeon® CPU Max Series

Released

3rd Gen Intel® Xeon® Scalable Processors

Released

3rd Gen Intel® Xeon® Scalable Processors (QP)

By request

2nd Gen Intel® Xeon® Scalable Processors

Released

12th/13th/14th Gen Intel® Core™ Processors

May 2024

11th Gen Intel® Core™ Processors

May 2024

Intel® Xeon® E-2400 Series & 12th Gen Intel® Pentium® Series Processors

Apr 2024

Intel® Xeon® E-2300 Series & 11th Gen Intel® Pentium® Series Processors

May 2024

Intel® Xeon® W-2400/W-3400 Processors

Apr 2024

NVIDIA Grace™ CPU

Apr 2024

Ampere® Altra®/Altra® Max Processors

Apr 2024

 

The vulnerabilities are listed below. Updated BIOS versions to address the threats will be available on all affected product pages.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-45229

Severity Rating: Medium

Description: EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-45230

Severity Rating: High

Description: EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-45231

Severity Rating: Medium

Description: EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing Neighbor Discovery Redirect message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-45232

Severity Rating: High

Description: EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-45233

Severity Rating: High

Description: EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-45234

Severity Rating: High

Description: EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-45235

Severity Rating: High

Description: EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

 

 

*The release schedule may be adjusted without further notification. Please check this page or contact technical support for any future updates.

*Please navigate to the "Support" section of the relevant product page to download the updated BIOS.

*For any further assistance regarding this issue please contact your Giga Computing sales representative, or create a new support ticket at https://esupport.gigabyte.com