Vulnerability hits Intel enterprise PCs going back 10 years

The security hole involves enterprise IT management features in the chipmaker’s firmware

Intel is reporting a firmware vulnerability that could let attackers take over remote management functions on computers built over nearly the past decade.

The vulnerability, disclosed on Monday, affects features in Intel firmware that are designed for enterprise IT management.

Enterprises using Intel Active Management Technology, Intel Small Business Technology and Intel Standard Manageability on their systems should patch them as soon as possible, the company says.

The vulnerable firmware features can be found in some current Core processors and all the way back to Intel's first-generation Core, called Nehalem, which shipped in 2008. They're part of versions 6.0 through 11.6 of Intel's manageability firmware.

No consumer PCs are affected, the company said. Nor are data-center servers running Intel Server Platform Services.

Intel Active Management Technology is a feature in Core processors that lets organizations remotely track, manage and secure whole fleets of connected computers.

For example, it can be used to monitor and repair retail checkout systems, digital signage and PCs at places like stores, offices and schools.

Intel didn’t provide technical details of the vulnerability, but it said a hacker could use the flaw to take over the remote management functions.

In an email, Intel said it learned about the vulnerability from a security researcher in March. “We are not aware of any exploitation of this vulnerability,” the company said.

Intel said it has prepared a patch and is working with manufacturers to roll it out to users as soon as possible.

Intel’s security advisory also lays out steps users can take to find out if they’re affected. For example, PCs built with its vPro technology will have the vulnerable Intel Active Management feature.

In addition, the advisory has tips for what to do if there's no firmware update available from the system manufacturer. Disabling or removing a Windows service called Local Manageability Service can mitigate the vulnerability, Intel said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Michael Kan

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?