Intel® Management Engine (Intel® ME 6.x/7.x/8.x/9.x/10.x/11.x), Intel® Trusted Execution Engine (Intel® TXE 3.0), and Intel® Server Platform Services (Intel® SPS 4.0) vulnerability (Intel-SA-00086)
Intel Graphics Driver (do not delete) Intel Trusted Execution Engine Acer Power Management Acer Quick Access Java (all) Microsoft Visual C Runtime (all - You probaby have progs that depend on these) Qualcomm Atheros WLAN and Bluetooth Client (do not delete) Live Updater Realtek Card Reader (do not delete) Logitech Webcam Software. Intel Trusted Execution Technology primary goal is to attest to the authenticity of a platform and its operating system and to assure that an authentic OS starts in a trusted environment. More about Intel Trusted Execution Engine.
In response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of the following with the objective of enhancing firmware resilience:
Intel has identified security vulnerabilities that could potentially impact certain PCs, servers, and IoT platforms.
Systems using Intel ME Firmware versions 6.x-11.x, servers using SPS Firmware version 4.0, and systems using TXE version 3.0 are impacted. You may find these firmware versions on certain processors from the:
Do I Need Intel Trusted Execution Engine Interface
To determine if the identified vulnerabilities impact your system, download and run the Intel CSME Version Detection tool using the links below.
Frequently Asked Questions Section Available resources
Resources for Microsoft and Linux* users
Resources from system/motherboard manufacturers
Frequently asked questions:
Q: The Intel CSME Version Detection Tool reports that my system is vulnerable. What do I do?
A: Intel has provided system and motherboard manufacturers with the necessary firmware and software updates to resolve the vulnerabilities identified in Security Advisory Intel-SA-00086.
Contact your system or motherboard manufacturer regarding their plans for making the updates available to end users.
Some manufacturers have provided Intel with a direct link for their customers to obtain additional information and available software updates (Refer to the list below).
Q: Why do I need to contact my system or motherboard manufacturer? Why can’t Intel provide the necessary update for my system?
A: Intel is unable to provide a generic update due to management engine firmware customizations performed by system and motherboard manufacturers.
Q: My system is reported as may be Vulnerable by the Intel CSME Version Detection Tool. What do I do?
A: A status of may be Vulnerable is usually seen when either of the following drivers aren't installed:
Contact your system or motherboard manufacturer to obtain the correct drivers for your system. World of cubes online game.
Q: My system or motherboard manufacturer is not shown in your list. What do I do?
A: The list below shows links from system or motherboard manufacturers who have provided Intel with information. If your manufacturer is not shown, contact them using their standard support mechanisms (website, phone, email, and so on) for assistance.
Q: What types of access would an attacker need to exploit the identified vulnerabilities?
A: If the equipment manufacturer enables Intel-recommended Flash Descriptor write protections, an attacker needs physical access to platform’s firmware flash to exploit vulnerabilities identified in:
The attacker gains physical access by manually updating the platform with a malicious firmware image through flash programmer physically connected to the platform’s flash memory. Flash Descriptor write-protection is a platform setting usually set at the end of manufacturing. Flash Descriptor write-protection protects settings on the Flash from being maliciously or unintentionally changed after manufacturing is completed.
If the equipment manufacturer doesn't enable Intel-recommended Flash Descriptor write protections, an attacker needs Operating kernel access (logical access, Operating System Ring 0). The attacker needs this access to exploit the identified vulnerabilities by applying a malicious firmware image to the platform through a malicious platform driver.
The vulnerability identified in CVE-2017-5712 is exploitable remotely over the network in conjunction with a valid administrative Intel® Management Engine credential. The vulnerability is not exploitable if a valid administrative credential is unavailable.
If you need further assistance, contact Intel Customer Support to submit an online service request.
What are you seeing?
An error in Device Manager (code 37 or code 28) on the Intel® Trusted Execution Engine Interface (Intel® TXEI).
Why are you seeing it?
Microsoft Kernel-Mode Driver Framework (KMDF*) isn't installed.
How to fix it.
The Intel® TXEI driver is required for Secure Boot and platform security features. KMDF must be installed before the Intel TXEI driver.
To resolve this issue:
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |