Intel has issued a security alert that management firmware on a number of recent PC, server, and internet-of-things processor platforms are vulnerable to remote attack. Using the vulnerabilities, the most severe of which was uncovered by Mark Ermolov and Maxim Goryachy of positive technologies research, remote attackers could launch commands on a host of Intel-based computers, including laptops and desktops shipped with intel core processors since 2015. They could gain access to privileged system information, and millions of computers could essentially be taken over as a result of the bug. Most of the vulnerabilities require physical access to the targeted device, but one allows remote attacks with administrative access.
The company has posted a detection tool on its support website for Windows and Linux to help identify systems that are vulnerable. In the security alert, members of Intel’s security team stated that “in response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of its Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) with the objective of enhancing firmware resilience.”
Four vulnerabilities were discovered that affect intel management engine firmware versions 11.0 through 11.20. Two were found in earlier versions of ME, as well as two in Server Platform Services version 4.0 firmware and two in TXE version 3.0.
The bugs affect the following Intel CPUs:
- Intel Core processors from the 6th generation (“Skylake”), 7th generation (“Kaby Lake”), & 8th Generation (“Kaby Lake-R” and “Coffee Lake”) families—the processors in most desktop and laptop computers since 2015;
- Multiple Xeon processor lines, including the Xeon Processor E3-1200 v5 & v6 Product Family, xeon processor scalable family, and Xeon Processor W family;
- The Atom C3000 Processor Family and Apollo Lake Atom Processor E3900 series for networked and embedded devices and Internet of Things platforms, and
- apollo lake pentium and Celeron™ N and j series processors for mobile computing.
The highest-level vulnerabilities, rated at 8.2 and 7.5 on the common vulnerability security scale (CVSSv3) respectively, are in the most recent versions of Intel Management Engine. They have the broadest impact on PC users: they allow arbitrary remote code execution and privileged information access. Dell has issued a statement on the MX advisory that lists more than 100 affected systems, including a variety of Inspiron, Latitude, AlienWare, and OptiPlex systems; Lenovo has a similarly vast list posted on its site.
The detection tool is meant for enterprises to do widespread check, but the Windows version does provide a graphic interface for individual Dell and Lenovo do not yet have patches available; Dell’s ship dates for new firmware are to be determined, and Lenovo is hoping to have some new firmware available by November 23.
Update, November 22, 12:00 EST: HP, Dell, and other vendors already have completed patches for their respective firmware, and are preparing them for distribution.