<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Remote security exploit in all 2008+ Intel platforms &#8211; SemiAccurate</title>
	<atom:link href="http://www.epanorama.net/blog/2017/05/02/remote-security-exploit-in-all-2008-intel-platforms-semiaccurate/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/05/02/remote-security-exploit-in-all-2008-intel-platforms-semiaccurate/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 09 Apr 2026 15:47:07 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/02/remote-security-exploit-in-all-2008-intel-platforms-semiaccurate/comment-page-1/#comment-1545648</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 04 May 2017 07:10:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54785#comment-1545648</guid>
		<description><![CDATA[Is Intel’s Management Engine Broken?
http://hackaday.com/2017/05/02/is-intels-management-engine-broken/

Betteridge’s Law of Headlines states, “Any headline that ends in a question mark can be answered by the word no.” This law remains unassailable. However, recent claims have called into question a black box hidden deep inside every Intel chipset produced in the last decade.

Yesterday, on the Semiaccurate blog, [Charlie Demerjian] announced a remote exploit for the Intel Management Engine (ME). This exploit covers every Intel platform with Active Management Technology (AMT) shipped since 2008. This is a small percentage of all systems running Intel chipsets, and even then the remote exploit will only work if AMT is enabled. [Demerjian] also announced the existence of a local exploit.

https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/]]></description>
		<content:encoded><![CDATA[<p>Is Intel’s Management Engine Broken?<br />
<a href="http://hackaday.com/2017/05/02/is-intels-management-engine-broken/" rel="nofollow">http://hackaday.com/2017/05/02/is-intels-management-engine-broken/</a></p>
<p>Betteridge’s Law of Headlines states, “Any headline that ends in a question mark can be answered by the word no.” This law remains unassailable. However, recent claims have called into question a black box hidden deep inside every Intel chipset produced in the last decade.</p>
<p>Yesterday, on the Semiaccurate blog, [Charlie Demerjian] announced a remote exploit for the Intel Management Engine (ME). This exploit covers every Intel platform with Active Management Technology (AMT) shipped since 2008. This is a small percentage of all systems running Intel chipsets, and even then the remote exploit will only work if AMT is enabled. [Demerjian] also announced the existence of a local exploit.</p>
<p><a href="https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/" rel="nofollow">https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/02/remote-security-exploit-in-all-2008-intel-platforms-semiaccurate/comment-page-1/#comment-1545636</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 04 May 2017 06:59:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54785#comment-1545636</guid>
		<description><![CDATA[Intel Warns of Critical Vulnerability in Processor Firmware
http://www.securityweek.com/intel-warns-critical-vulnerability-processor-firmware

Nine-Year-Old Critical Vulnerability Affects Intel Active Management Technology

Intel issued a critical alert  Monday concerning an escalation of privilege vulnerability affecting Intel Active Management Technology (AMT), Intel Small Business Technology (SBT), and Intel Standard Manageability. Firmware updates are available in all cases -- but that&#039;s not the end of the story.

While the Intel alert states, &quot;This vulnerability does not exist on Intel-based consumer PCs,&quot; security commentators such as Charlie Demerjian suggest &quot;there is literally no Intel box made in the last 9+ years that isn&#039;t at risk. This is somewhere between nightmarish and apocalyptic.&quot; The vulnerability affects every Intel system from Nehalem in 2008 to Kaby Lake in 2017.

According to Intel, the vulnerability (CVE-2017-5689) can be accessed in two ways. Where AMT and ISM have been provisioned, an unprivileged network attacker could gain system privileges. Where not provisioned, a local attacker could provision them and gain local system privileges on AMT, ISM and SBT. Intel gives no details on the vulnerability itself.

AMT is intended to give IT departments a means to manage client systems. When enabled, packets sent to ports 16992 or 16993 are redirected through Intel&#039;s Management Engine (a small, separate processor independent of the main CPU) and passed to AMT. The operating system never sees these packets. AMT can be used to install media, reboot the machine and more, remotely. It requires a password for access; but this vulnerability suggests that the password can be bypassed.]]></description>
		<content:encoded><![CDATA[<p>Intel Warns of Critical Vulnerability in Processor Firmware<br />
<a href="http://www.securityweek.com/intel-warns-critical-vulnerability-processor-firmware" rel="nofollow">http://www.securityweek.com/intel-warns-critical-vulnerability-processor-firmware</a></p>
<p>Nine-Year-Old Critical Vulnerability Affects Intel Active Management Technology</p>
<p>Intel issued a critical alert  Monday concerning an escalation of privilege vulnerability affecting Intel Active Management Technology (AMT), Intel Small Business Technology (SBT), and Intel Standard Manageability. Firmware updates are available in all cases &#8212; but that&#8217;s not the end of the story.</p>
<p>While the Intel alert states, &#8220;This vulnerability does not exist on Intel-based consumer PCs,&#8221; security commentators such as Charlie Demerjian suggest &#8220;there is literally no Intel box made in the last 9+ years that isn&#8217;t at risk. This is somewhere between nightmarish and apocalyptic.&#8221; The vulnerability affects every Intel system from Nehalem in 2008 to Kaby Lake in 2017.</p>
<p>According to Intel, the vulnerability (CVE-2017-5689) can be accessed in two ways. Where AMT and ISM have been provisioned, an unprivileged network attacker could gain system privileges. Where not provisioned, a local attacker could provision them and gain local system privileges on AMT, ISM and SBT. Intel gives no details on the vulnerability itself.</p>
<p>AMT is intended to give IT departments a means to manage client systems. When enabled, packets sent to ports 16992 or 16993 are redirected through Intel&#8217;s Management Engine (a small, separate processor independent of the main CPU) and passed to AMT. The operating system never sees these packets. AMT can be used to install media, reboot the machine and more, remotely. It requires a password for access; but this vulnerability suggests that the password can be bypassed.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
