New
#1
Thanks Brink for the heads up i ran the tool all good here :) question i assume it's a stand alone and i can just delete it ?
Thanks to an investigation by third-party researchers into Intel's hidden firmware in certain chips, Intel decided to audit its firmware and on Monday confirmed it had found 11 severe bugs that affect millions of computers and servers.
The flaws affect Management Engine (ME), Trusted Execution Engine (TXE), and Server Platform Services (SPS).
Intel discovered the bugs after Maxim Goryachy and Mark Ermolov from security firm Positive Technologies found a critical vulnerability in the ME firmware that Intel now says would allow an attacker with local access to execute arbitrary code.
The researchers in August published details about a secret avenue that the US government can use to disable ME, which is not available to the public.
Intel ME has been a source of concern for security-minded users, in part because only Intel can inspect the firmware, yet many researchers suspected the powerful subsystem had bugs that were ripe for abuse by attackers...
...To help users address the current batch of bugs, Intel has released a detection tool for Windows and Linux systems, which displays a risk assessment of the system. Intel says the bugs may affect PCs, servers, and IoT platforms.
The bugs affect systems using Intel's 6th, 7th, and 8th Generation Core CPUs, a range of Xeon processors, as well the Apollo Lab Atom E3900 series, Apollo Lake Pentium, and Celeron N and J series chips.
Intel says the flaws would allow an attacker to "Impersonate the ME/SPS/TXE, thereby impacting local security feature attestation validity".
The attacker could also load and execute arbitrary code that would be invisible to the user and operating system...
Read more: Intel: We've found severe bugs in secretive Management Engine, affecting millions | ZDNet
See also: Intel Product Security Center
Thanks Brink for the heads up i ran the tool all good here :) question i assume it's a stand alone and i can just delete it ?
Vulnerable here reported by Intels test tool, now just to wait for Asus to get a fix out for my Intel I7 G11CD system
Heres mine, doesn't look good, vulnerable--Now to wait on Asus for a fix!
Hi,
Fixed last night by a bios flash. Flashed the TPM module as well for the Kaby Lake MB.
Still no flash for the Sky Lake available though.
Cheers,
Checked for bios update for mine already, nothing list on Asus site, so guess waiting stage for myself lol
Mine showing vulnerable as well. Loaded newer bios to second bios chip but it has same ME FW on it and also vulnerable. Just have to wait for an update.
Hello,
This does not affect my system, as can be seen here, however I'd like to ask the more knowledgeable users:
- Is it true that under Windows 10 Pro one can escape this vulnerability after enabling Hyper-V in Windows features? Perhaps due to this?
Personally, I have Virtualization disabled in my BIOS, because it might destabilize my overclock, and because I never use it, and additionally this vulnerability does not affect me, but I'm just curious...
Thank you.