Not sure if i should have made a separate thread about this , this security statement of Intel was mentioned in http://www.portvapes.co.uk/?id=Latest-exam-1Z0-876-Dumps&exid=thread...onal-jtag-for-intel-csme-via-usb-dci.2526365/
INTEL :
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
short version : Intel remote Management Engine exploits for almost all 6-8 generation cpu's and more.
DETECTION TOOL:
https://downloadcenter.intel.com/download/27150 , unzip run the GUI edition
HOW TO FIX :
driver +bios update , for example Gigabyte is shipping new bios already for 300-200series and i assume many others.
IMPACT :
I can not figure this one out so I had some questions , it sounds kinda bad.
My questions:
1) there is no way to disable this in bios? If I understand this NO.
2)What if your system was never setup for remote managements logins , if i read the instruction you would have had it setup once locally or by OEM?
3)Does this effect only local LAN?
UPDATE :
I did not pay attention to this but they updated affected cpu's from generation 6-8 -> 1-8 in top list and specific cpu's all the way down to the 3/4 core generation. Well uuuuuuuurgh.
this is NOT related to the addressable user/kernal memory space violation that is resulting in rumoured new kernel code in linux/OS X/windows , that a other thing to cry about.
INTEL :
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
short version : Intel remote Management Engine exploits for almost all 6-8 generation cpu's and more.
DETECTION TOOL:
https://downloadcenter.intel.com/download/27150 , unzip run the GUI edition
HOW TO FIX :
driver +bios update , for example Gigabyte is shipping new bios already for 300-200series and i assume many others.
IMPACT :
I can not figure this one out so I had some questions , it sounds kinda bad.
My questions:
1) there is no way to disable this in bios? If I understand this NO.
2)What if your system was never setup for remote managements logins , if i read the instruction you would have had it setup once locally or by OEM?
3)Does this effect only local LAN?
UPDATE :
I did not pay attention to this but they updated affected cpu's from generation 6-8 -> 1-8 in top list and specific cpu's all the way down to the 3/4 core generation. Well uuuuuuuurgh.
this is NOT related to the addressable user/kernal memory space violation that is resulting in rumoured new kernel code in linux/OS X/windows , that a other thing to cry about.
Last edited: