A few months back few researchers submitted a report explaining about few severe vulnerabilities present in Intel Processors.
To be more specific researchers found vulnerabilities in intel’s remote administration feature popularly known as “Management Engine,” the vulnerability in the intel’s management engine enabled unauthorized access to the vulnerable systems, which gives an attacker full control over the targeted system.
Some possible attack vector includes impacting local security feature attestation validity, Load and execute arbitrary code outside the visibility of the user and operating system and causing a system crash or system instability.
Intel recently agreed with the researchers after reviewing their firmware, they addressed the community with a security advisor which was released on this Monday.
“In response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of our Intel® Management Engine (ME), Intel® Server Platform Services (SPS), and Intel® Trusted Execution Engine (TXE) with the objective of enhancing firmware resilience.
As a result, Intel has identified security vulnerabilities that could potentially place impacted platforms at risk.” – Intel Security Advisory.
Intel found that these vulnerabilities could allow access to a system using unauthorized ways. Considering the severity of the issue Intel issued patches for most of the CPU generations, so, users are requested to update their firmware in order to reduce the risk.
1. ME Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20
2. SPS Firmware version 4.0
3. TXE version 3.0
Affected Intel Products:
- 6th, 7th & 8th Generation Intel® Core™ Processor Family
- Intel® Xeon® Processor E3-1200 v5 & v6 Product Family
- Intel® Xeon® Processor Scalable Family
- Intel® Xeon® Processor W Family
- Intel® Atom® C3000 Processor Family
- Apollo Lake Intel® Atom Processor E3900 series
- Apollo Lake Intel® Pentium™
- Celeron™ N and J series Processors
Intel also released a Detection Tool to help sys admins and users to check wether their systems are vulnerable or not.
[amazon_link asins=’B01CD5VC92′ template=’ProductCarousel’ store=’hackvisi-21′ marketplace=’UK’ link_id=’49050a98-d216-11e7-a051-97ab9812a316′]