<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Intel AMT Firmware Vulnerability CVE-2017-5689</title>
	<atom:link href="http://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 22:35:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1583334</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:36:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1583334</guid>
		<description><![CDATA[Siemens Releases BIOS Updates to Patch Intel Chip Flaws
https://www.securityweek.com/siemens-releases-bios-updates-patch-intel-chip-flaws

Siemens has released BIOS updates for several of its industrial devices to patch vulnerabilities discovered recently in Intel chips, including Meltdown, Spectre and flaws affecting the company’s Management Engine technology.

Following the disclosure of the Meltdown and Spectre attack methods, industrial control systems (ICS) manufacturers immediately started analyzing the impact of the flaws on their products. Advisories have been published by companies such as Siemens, Rockwell Automation, Schneider Electric, ABB, and Pepperl+Fuchs.

Siemens has determined that the security holes expose many of its product lines to attacks, including RUGGEDCOM, SIMATIC, SIMOTION, SINEMA, and SINUMERIK.]]></description>
		<content:encoded><![CDATA[<p>Siemens Releases BIOS Updates to Patch Intel Chip Flaws<br />
<a href="https://www.securityweek.com/siemens-releases-bios-updates-patch-intel-chip-flaws" rel="nofollow">https://www.securityweek.com/siemens-releases-bios-updates-patch-intel-chip-flaws</a></p>
<p>Siemens has released BIOS updates for several of its industrial devices to patch vulnerabilities discovered recently in Intel chips, including Meltdown, Spectre and flaws affecting the company’s Management Engine technology.</p>
<p>Following the disclosure of the Meltdown and Spectre attack methods, industrial control systems (ICS) manufacturers immediately started analyzing the impact of the flaws on their products. Advisories have been published by companies such as Siemens, Rockwell Automation, Schneider Electric, ABB, and Pepperl+Fuchs.</p>
<p>Siemens has determined that the security holes expose many of its product lines to attacks, including RUGGEDCOM, SIMATIC, SIMOTION, SINEMA, and SINUMERIK.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1578095</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 15 Jan 2018 10:39:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1578095</guid>
		<description><![CDATA[January 12, 2018 &#124; Business Security
https://press.f-secure.com/2018/01/12/intel-amt-security-issue-lets-attackers-bypass-login-credentials-in-corporate-laptops/

Intel AMT Security Issue Lets Attackers Bypass Login Credentials in Corporate Laptops
Insecure defaults in Intel AMT allow an intruder to completely bypass user and BIOS passwords and TPM and Bitlocker PINs to backdoor almost any corporate laptop in a matter of seconds.

Helsinki, Finland – January 12, 2018: F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation. It exists within Intel’s Active Management Technology (AMT) and potentially affects millions of laptops globally.

The security issue “is almost deceptively simple to exploit, but it has incredible destructive potential,” said Harry Sintonen, who investigated the issue in his role as Senior Security Consultant at F-Secure. “In practice, it can give an attacker complete control over an individual’s work laptop, despite even the most extensive security measures.”

To exploit this, all an attacker needs to do is reboot or power up the target machine and press CTRL-P during bootup. The attacker then may log into Intel Management Engine BIOS Extension (MEBx) using the default password, “admin,” as this default is most likely unchanged on most corporate laptops. The attacker then may change the default password, enable remote access and set AMT’s user opt-in to “None.” The attacker can now gain remote access to the system from both wireless and wired networks, as long as they’re able to insert themselves onto the same network segment with the victim. Access to the device may also be possible from outside the local network via an attacker-operated CIRA server.

Although the initial attack requires physical access, Sintonen explained that the speed with which it can be carried out makes it easily exploitable in a so-called “evil maid” scenario. “You leave your laptop in your hotel room while you go out for a drink. The attacker breaks into your room and configures your laptop in less than a minute, and now he or she can access your desktop when you use your laptop in the hotel WLAN. And since the computer connects to your company VPN, the attacker can access company resources.” Sintonen points out that even a minute of distracting a target from their laptop at an airport or coffee shop is enough to do the damage.

Sintonen stumbled upon the issue in July 2017, and notes that another researcher* also mentioned it in a more recent talk.]]></description>
		<content:encoded><![CDATA[<p>January 12, 2018 | Business Security<br />
<a href="https://press.f-secure.com/2018/01/12/intel-amt-security-issue-lets-attackers-bypass-login-credentials-in-corporate-laptops/" rel="nofollow">https://press.f-secure.com/2018/01/12/intel-amt-security-issue-lets-attackers-bypass-login-credentials-in-corporate-laptops/</a></p>
<p>Intel AMT Security Issue Lets Attackers Bypass Login Credentials in Corporate Laptops<br />
Insecure defaults in Intel AMT allow an intruder to completely bypass user and BIOS passwords and TPM and Bitlocker PINs to backdoor almost any corporate laptop in a matter of seconds.</p>
<p>Helsinki, Finland – January 12, 2018: F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation. It exists within Intel’s Active Management Technology (AMT) and potentially affects millions of laptops globally.</p>
<p>The security issue “is almost deceptively simple to exploit, but it has incredible destructive potential,” said Harry Sintonen, who investigated the issue in his role as Senior Security Consultant at F-Secure. “In practice, it can give an attacker complete control over an individual’s work laptop, despite even the most extensive security measures.”</p>
<p>To exploit this, all an attacker needs to do is reboot or power up the target machine and press CTRL-P during bootup. The attacker then may log into Intel Management Engine BIOS Extension (MEBx) using the default password, “admin,” as this default is most likely unchanged on most corporate laptops. The attacker then may change the default password, enable remote access and set AMT’s user opt-in to “None.” The attacker can now gain remote access to the system from both wireless and wired networks, as long as they’re able to insert themselves onto the same network segment with the victim. Access to the device may also be possible from outside the local network via an attacker-operated CIRA server.</p>
<p>Although the initial attack requires physical access, Sintonen explained that the speed with which it can be carried out makes it easily exploitable in a so-called “evil maid” scenario. “You leave your laptop in your hotel room while you go out for a drink. The attacker breaks into your room and configures your laptop in less than a minute, and now he or she can access your desktop when you use your laptop in the hotel WLAN. And since the computer connects to your company VPN, the attacker can access company resources.” Sintonen points out that even a minute of distracting a target from their laptop at an airport or coffee shop is enough to do the damage.</p>
<p>Sintonen stumbled upon the issue in July 2017, and notes that another researcher* also mentioned it in a more recent talk.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1576932</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Jan 2018 10:29:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1576932</guid>
		<description><![CDATA[Also AMD has something somewhat similar management and vulnerability in it:

Security hole in AMD CPUs&#039; hidden secure processor code revealed ahead of patches
Googler drops bug bomb in public – but don&#039;t panic
https://www.theregister.co.uk/2018/01/06/amd_cpu_psp_flaw/

Cfir Cohen, a security researcher from Google&#039;s cloud security team, on Wednesday disclosed a vulnerability in the fTMP of AMD&#039;s Platform Security Processor (PSP), which resides on its 64-bit x86 processors and provides administrative functions similar to the Management Engine in Intel chipsets.

This sounds bad. It&#039;s not as bad as you think.

The fTMP is a firmware implementation of the Trusted Platform Module, a security-oriented microcontroller specification. Cohen said he reported the flaw to AMD in late September last year, and the biz apparently had a fix ready by December 7. Now that the 90-day disclosure window has passed seemingly without any action by AMD, details about the flaw have been made public.

A firmware update emerged for some AMD chips in mid-December, with an option to at least partially disable the PSP. However, a spokesperson for the tech giant said on Friday this week that the above fTMP issue will be addressed in an update due out this month, January 2018.

As AMD explains it, the PSP – referred to as AMD Secure Technology – monitors the security environment for the processor, managing the boot process, initializing security mechanisms, and checking for suspect activity. 

It includes an embedded ARM microcontroller, cryptographic coprocessor, local memory, registers, and interfaces, not to mention the Environment Management Control block that oversees processor security checking. It runs the Trustonic TEE (Trusted Execution Environment) as its security kernel. It can also access system RAM and IO.

The flaw, identified through manual static analysis, involves a stack-based overflow in a function called EkCheckCurrentCert, which is called from another function TPM2_CreatePrimary with an endorsement key (EK) certificate stored in non-volatile storage.

An AMD spokesperson told The Register that an attacker would first have to gain access to the motherboard and then modify SPI-Flash before the issue could be exploited. But given those conditions, the attacker would have access to the information protected by the TPM, such as cryptographic keys.]]></description>
		<content:encoded><![CDATA[<p>Also AMD has something somewhat similar management and vulnerability in it:</p>
<p>Security hole in AMD CPUs&#8217; hidden secure processor code revealed ahead of patches<br />
Googler drops bug bomb in public – but don&#8217;t panic<br />
<a href="https://www.theregister.co.uk/2018/01/06/amd_cpu_psp_flaw/" rel="nofollow">https://www.theregister.co.uk/2018/01/06/amd_cpu_psp_flaw/</a></p>
<p>Cfir Cohen, a security researcher from Google&#8217;s cloud security team, on Wednesday disclosed a vulnerability in the fTMP of AMD&#8217;s Platform Security Processor (PSP), which resides on its 64-bit x86 processors and provides administrative functions similar to the Management Engine in Intel chipsets.</p>
<p>This sounds bad. It&#8217;s not as bad as you think.</p>
<p>The fTMP is a firmware implementation of the Trusted Platform Module, a security-oriented microcontroller specification. Cohen said he reported the flaw to AMD in late September last year, and the biz apparently had a fix ready by December 7. Now that the 90-day disclosure window has passed seemingly without any action by AMD, details about the flaw have been made public.</p>
<p>A firmware update emerged for some AMD chips in mid-December, with an option to at least partially disable the PSP. However, a spokesperson for the tech giant said on Friday this week that the above fTMP issue will be addressed in an update due out this month, January 2018.</p>
<p>As AMD explains it, the PSP – referred to as AMD Secure Technology – monitors the security environment for the processor, managing the boot process, initializing security mechanisms, and checking for suspect activity. </p>
<p>It includes an embedded ARM microcontroller, cryptographic coprocessor, local memory, registers, and interfaces, not to mention the Environment Management Control block that oversees processor security checking. It runs the Trustonic TEE (Trusted Execution Environment) as its security kernel. It can also access system RAM and IO.</p>
<p>The flaw, identified through manual static analysis, involves a stack-based overflow in a function called EkCheckCurrentCert, which is called from another function TPM2_CreatePrimary with an endorsement key (EK) certificate stored in non-volatile storage.</p>
<p>An AMD spokesperson told The Register that an attacker would first have to gain access to the motherboard and then modify SPI-Flash before the issue could be exploited. But given those conditions, the attacker would have access to the information protected by the TPM, such as cryptographic keys.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1573972</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 11 Dec 2017 18:08:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1573972</guid>
		<description><![CDATA[An open and updated letter to Intel by Andrew S. Tanenbaum - Creator of MINIX. Minix is used by Intel ME as a spy engine. Why is Intel not listing to its customers? Why not release a patch/firmware updated that allows to disable Intel ME? Does Intel have some hidden agenda or agreement with the governments to keep spy engine running on my PC? http://www.cs.vu.nl/~ast/intel/]]></description>
		<content:encoded><![CDATA[<p>An open and updated letter to Intel by Andrew S. Tanenbaum &#8211; Creator of MINIX. Minix is used by Intel ME as a spy engine. Why is Intel not listing to its customers? Why not release a patch/firmware updated that allows to disable Intel ME? Does Intel have some hidden agenda or agreement with the governments to keep spy engine running on my PC? <a href="http://www.cs.vu.nl/~ast/intel/" rel="nofollow">http://www.cs.vu.nl/~ast/intel/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1573687</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 08 Dec 2017 19:50:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1573687</guid>
		<description><![CDATA[https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine.pdf

Over the past 12 years, 
only one 
vulnerability allowing execution of 
arbitrary code 
on ME has been found!

15
Now we have two of them!

Potential attack vectors
(ways to impact)

•
Local communication interface (HECI)
•
Network (vPro only)
•
IPMI/MCTP
•
Host memory (UMA)
•
Firmware SPI layout
•
Internal file system


HECI
•
Main interface for communication between host and 
ME
•
Represented as PCI device 
•
Transports dozens of ME service protocols 
•
Undocumented; some protocol formats can be found in 
coreboot
•
MEBx and BIOS use HECI to set up ME
•
Used by Intel tools for updating and manufacture
-
line 
configuring]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine.pdf" rel="nofollow">https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine.pdf</a></p>
<p>Over the past 12 years,<br />
only one<br />
vulnerability allowing execution of<br />
arbitrary code<br />
on ME has been found!</p>
<p>15<br />
Now we have two of them!</p>
<p>Potential attack vectors<br />
(ways to impact)</p>
<p>•<br />
Local communication interface (HECI)<br />
•<br />
Network (vPro only)<br />
•<br />
IPMI/MCTP<br />
•<br />
Host memory (UMA)<br />
•<br />
Firmware SPI layout<br />
•<br />
Internal file system</p>
<p>HECI<br />
•<br />
Main interface for communication between host and<br />
ME<br />
•<br />
Represented as PCI device<br />
•<br />
Transports dozens of ME service protocols<br />
•<br />
Undocumented; some protocol formats can be found in<br />
coreboot<br />
•<br />
MEBx and BIOS use HECI to set up ME<br />
•<br />
Used by Intel tools for updating and manufacture<br />
-<br />
line<br />
configuring</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1573686</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 08 Dec 2017 19:47:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1573686</guid>
		<description><![CDATA[Another Defeat of the Intel Management Engine
https://hackaday.com/2017/12/07/another-defeat-of-the-intel-management-engine/

If you have a computer with an Intel processor that’s newer than about 2007, odds are high that it also contains a mystery software package known as the Intel Management Engine (ME). The ME has complete access to the computer below the operating system and can access a network, the computer’s memory, and many other parts of the computer even when the computer is powered down. If you’re thinking that this seems like an incredible security vulnerability then you’re not alone, and a team at Black Hat Europe 2017 has demonstrated yet another flaw in this black box (PDF), allowing arbitrary code execution and bypassing many of the known ME protections.

[Mark Ermolov] and [Maxim Goryachy] are the two-man team that discovered this exploit, only the second of its kind in the 12 years that the ME has been deployed. Luckily, this exploit can’t be taken advantage of (yet) unless an attacker has physical access to the device. Intel’s firmware upgrades also do not solve the problem because the patches still allow for use of older versions of the ME. 

https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine.pdf]]></description>
		<content:encoded><![CDATA[<p>Another Defeat of the Intel Management Engine<br />
<a href="https://hackaday.com/2017/12/07/another-defeat-of-the-intel-management-engine/" rel="nofollow">https://hackaday.com/2017/12/07/another-defeat-of-the-intel-management-engine/</a></p>
<p>If you have a computer with an Intel processor that’s newer than about 2007, odds are high that it also contains a mystery software package known as the Intel Management Engine (ME). The ME has complete access to the computer below the operating system and can access a network, the computer’s memory, and many other parts of the computer even when the computer is powered down. If you’re thinking that this seems like an incredible security vulnerability then you’re not alone, and a team at Black Hat Europe 2017 has demonstrated yet another flaw in this black box (PDF), allowing arbitrary code execution and bypassing many of the known ME protections.</p>
<p>[Mark Ermolov] and [Maxim Goryachy] are the two-man team that discovered this exploit, only the second of its kind in the 12 years that the ME has been deployed. Luckily, this exploit can’t be taken advantage of (yet) unless an attacker has physical access to the device. Intel’s firmware upgrades also do not solve the problem because the patches still allow for use of older versions of the ME. </p>
<p><a href="https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine.pdf" rel="nofollow">https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1573128</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 Dec 2017 10:55:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1573128</guid>
		<description><![CDATA[System76 to Disable Intel ME on Laptops Due to Security Flaws
http://www.securityweek.com/system76-disable-intel-me-laptops-due-security-flaws

Following the discovery of several potentially serious vulnerabilities in Intel’s Management Engine (ME), computer seller System76 announced its intention to disable the feature on its laptops with a future firmware update.

In the past months, Intel and third party security researchers discovered a significant number of flaws in ME and Active Management Technology (AMT), which allow users to remotely manage devices. The security holes can be exploited to execute arbitrary code without being detected by the user or the operating system, bypass security features, and crash systems.

Intel has released patches for these vulnerabilities and vendors such as Acer, Dell, Fujitsu, HPE, Lenovo, and Panasonic informed customers that they are also working on firmware updates that address the weaknesses.

System76, which provides Linux-powered laptops, desktops and servers, has decided to address the risks introduced by Intel ME by disabling the feature altogether.]]></description>
		<content:encoded><![CDATA[<p>System76 to Disable Intel ME on Laptops Due to Security Flaws<br />
<a href="http://www.securityweek.com/system76-disable-intel-me-laptops-due-security-flaws" rel="nofollow">http://www.securityweek.com/system76-disable-intel-me-laptops-due-security-flaws</a></p>
<p>Following the discovery of several potentially serious vulnerabilities in Intel’s Management Engine (ME), computer seller System76 announced its intention to disable the feature on its laptops with a future firmware update.</p>
<p>In the past months, Intel and third party security researchers discovered a significant number of flaws in ME and Active Management Technology (AMT), which allow users to remotely manage devices. The security holes can be exploited to execute arbitrary code without being detected by the user or the operating system, bypass security features, and crash systems.</p>
<p>Intel has released patches for these vulnerabilities and vendors such as Acer, Dell, Fujitsu, HPE, Lenovo, and Panasonic informed customers that they are also working on firmware updates that address the weaknesses.</p>
<p>System76, which provides Linux-powered laptops, desktops and servers, has decided to address the risks introduced by Intel ME by disabling the feature altogether.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1572811</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Dec 2017 13:32:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1572811</guid>
		<description><![CDATA[Linux laptop-flinger says bye-bye to buggy Intel Management Engine
&#039;Disabling the ME will reduce future vulnerabilities&#039;
https://www.theregister.co.uk/2017/12/01/system76_bans_bugridden_intel_management_engine/

In a slap to Intel, custom Linux computer seller System76 has said it will be disabling the Intel Management Engine in its laptops.

Last month, Chipzilla admitted the existence of firmware-level bugs in many of its processors that would allow hackers to spy on and meddle with computers.

One of the most important vulnerabilities is in the black box coprocessor – the Management Engine – which has its own CPU and operating system that has complete machine control. It&#039;s meant for letting network admins remotely log into servers and workstations to fix any problems (such as not being able to boot).

The bugs – as security researchers discovered – allow for installing rootkits and spyware on machines that could steal or tamper with information. So, perhaps unsurprisingly, several vendors – including Lenovo – have been quick to patch the bugs.

Denver, Colorado-based System76, meanwhile, has just banned the Management Engine outright.

http://blog.system76.com/post/168050597573/system76-me-firmware-updates-plan]]></description>
		<content:encoded><![CDATA[<p>Linux laptop-flinger says bye-bye to buggy Intel Management Engine<br />
&#8216;Disabling the ME will reduce future vulnerabilities&#8217;<br />
<a href="https://www.theregister.co.uk/2017/12/01/system76_bans_bugridden_intel_management_engine/" rel="nofollow">https://www.theregister.co.uk/2017/12/01/system76_bans_bugridden_intel_management_engine/</a></p>
<p>In a slap to Intel, custom Linux computer seller System76 has said it will be disabling the Intel Management Engine in its laptops.</p>
<p>Last month, Chipzilla admitted the existence of firmware-level bugs in many of its processors that would allow hackers to spy on and meddle with computers.</p>
<p>One of the most important vulnerabilities is in the black box coprocessor – the Management Engine – which has its own CPU and operating system that has complete machine control. It&#8217;s meant for letting network admins remotely log into servers and workstations to fix any problems (such as not being able to boot).</p>
<p>The bugs – as security researchers discovered – allow for installing rootkits and spyware on machines that could steal or tamper with information. So, perhaps unsurprisingly, several vendors – including Lenovo – have been quick to patch the bugs.</p>
<p>Denver, Colorado-based System76, meanwhile, has just banned the Management Engine outright.</p>
<p><a href="http://blog.system76.com/post/168050597573/system76-me-firmware-updates-plan" rel="nofollow">http://blog.system76.com/post/168050597573/system76-me-firmware-updates-plan</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1572244</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 27 Nov 2017 15:18:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1572244</guid>
		<description><![CDATA[Security
Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets
Bugs can be exploited to extract info, potentially insert rootkits
https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/]]></description>
		<content:encoded><![CDATA[<p>Security<br />
Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets<br />
Bugs can be exploited to extract info, potentially insert rootkits<br />
<a href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/" rel="nofollow">https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/06/intel-amt-firmware-vulnerability-cve-2017-5689/comment-page-2/#comment-1572001</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Nov 2017 19:29:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54889#comment-1572001</guid>
		<description><![CDATA[https://www.viestintavirasto.fi/kyberturvallisuus/haavoittuvuudet/2017/haavoittuvuus-2017-038.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.viestintavirasto.fi/kyberturvallisuus/haavoittuvuudet/2017/haavoittuvuus-2017-038.html" rel="nofollow">https://www.viestintavirasto.fi/kyberturvallisuus/haavoittuvuudet/2017/haavoittuvuus-2017-038.html</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
