Flaws found in Intel Management Engine (ME), TXE and SPS

Page 1 of 20 12311 ... LastLast
    Flaws found in Intel Management Engine (ME), TXE and SPS

    Flaws found in Intel Management Engine (ME), TXE and SPS


    Last Updated: 22 Dec 2018 at 09:53

    Thanks to an investigation by third-party researchers into Intel's hidden firmware in certain chips, Intel decided to audit its firmware and on Monday confirmed it had found 11 severe bugs that affect millions of computers and servers.

    The flaws affect Management Engine (ME), Trusted Execution Engine (TXE), and Server Platform Services (SPS).

    Intel discovered the bugs after Maxim Goryachy and Mark Ermolov from security firm Positive Technologies found a critical vulnerability in the ME firmware that Intel now says would allow an attacker with local access to execute arbitrary code.

    The researchers in August published details about a secret avenue that the US government can use to disable ME, which is not available to the public.

    Intel ME has been a source of concern for security-minded users, in part because only Intel can inspect the firmware, yet many researchers suspected the powerful subsystem had bugs that were ripe for abuse by attackers...

    ...To help users address the current batch of bugs, Intel has released a detection tool for Windows and Linux systems, which displays a risk assessment of the system. Intel says the bugs may affect PCs, servers, and IoT platforms.

    The bugs affect systems using Intel's 6th, 7th, and 8th Generation Core CPUs, a range of Xeon processors, as well the Apollo Lab Atom E3900 series, Apollo Lake Pentium, and Celeron N and J series chips.

    Intel says the flaws would allow an attacker to "Impersonate the ME/SPS/TXE, thereby impacting local security feature attestation validity".

    The attacker could also load and execute arbitrary code that would be invisible to the user and operating system...

    Read more: Intel: We've found severe bugs in secretive Management Engine, affecting millions | ZDNet


    See also: Intel Product Security Center
    Brink's Avatar Posted By: Brink
    21 Nov 2017


  1. Posts : 1,116
    win 10 pro x64 os build 20H2
       #1

    Thanks Brink for the heads up i ran the tool all good here :) question i assume it's a stand alone and i can just delete it ?
      My Computer


  2. Posts : 68,954
    64-bit Windows 11 Pro for Workstations
    Thread Starter
       #2

    Yep, the tool is a standalone that can just be deleted when done with it. :)

    My report:

    Flaws found in Intel Management Engine (ME), TXE and SPS-tool.png
      My Computers


  3. Posts : 1,116
    win 10 pro x64 os build 20H2
       #3

    Here is mine as well looks good.



    Flaws found in Intel Management Engine (ME), TXE and SPS-untitled.png
      My Computer


  4. Posts : 1,481
    Windows 10 Pro 64bit 20H2 19042.844
       #4

    Vulnerable here reported by Intels test tool, now just to wait for Asus to get a fix out for my Intel I7 G11CD system
    Attached Thumbnails Attached Thumbnails Flaws found in Intel Management Engine (ME), TXE and SPS-intel-test.jpg  
      My Computers


  5. Posts : 1,481
    Windows 10 Pro 64bit 20H2 19042.844
       #5

    Heres mine, doesn't look good, vulnerable--Now to wait on Asus for a fix!
    Attached Thumbnails Attached Thumbnails Flaws found in Intel Management Engine (ME), TXE and SPS-intel-test.jpg  
      My Computers


  6. Posts : 2,832
    Windows 10 Pro X64
       #6

    Hi,

    Fixed last night by a bios flash. Flashed the TPM module as well for the Kaby Lake MB.
    Still no flash for the Sky Lake available though.

    Cheers,
      My Computers


  7. Posts : 1,481
    Windows 10 Pro 64bit 20H2 19042.844
       #7

    Checked for bios update for mine already, nothing list on Asus site, so guess waiting stage for myself lol
      My Computers


  8. Posts : 1,113
    win 10
       #8

    Mine showing vulnerable as well. Loaded newer bios to second bios chip but it has same ME FW on it and also vulnerable. Just have to wait for an update.
      My Computer


  9. Posts : 591
    Windows 10 Pro 64bit; Windows 10 TP; KDE Neon
       #9

    Hello,

    This does not affect my system, as can be seen here, however I'd like to ask the more knowledgeable users:

    - Is it true that under Windows 10 Pro one can escape this vulnerability after enabling Hyper-V in Windows features? Perhaps due to this?

    Personally, I have Virtualization disabled in my BIOS, because it might destabilize my overclock, and because I never use it, and additionally this vulnerability does not affect me, but I'm just curious...

    Thank you.
      My Computers


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 05:46.
Find Us




Windows 10 Forums