The majority of the Thunderbolt vulnerabilities, along with other identified firmware issues, necessitate local access to exploit, meaning an attacker would need either physical or remote access to the affected system. This requirement somewhat mitigates the risk, as it limits the potential for exploitation to those who can gain direct access to the hardware. The disclosure by Intel follows the company's protocol of reporting vulnerabilities post-patch release for actively maintained software and firmware, ensuring that risks are minimized before public acknowledgment. This batch of vulnerabilities also includes issues found in software applications like the battery life diagnostic tool, further highlighting the extensive nature of the security concerns addressed.
Intel has addressed vulnerabilities in all but one affected software and firmware item, the System Usage Report for Gameplay tool. Due to its discontinuation, Intel advises uninstalling this application as it will not be updated. Given the diverse nature of these vulnerabilities, without a single underlying cause, users must individually update each listed Intel software and firmware component. While the average user may only need to update Thunderbolt, certain drivers, and possibly Intel Unison, more advanced users and developers may find a broader range of updates necessary for their systems.