[RndTbl] big Intel bug with SMT firmware
Trevor Cordes
trevor at tecnopolis.ca
Wed May 17 01:13:47 CDT 2017
Intel has announced a big (VCSSv3 8.4 and 9.8 critical) bug in their
AMT/ISM/SBT technologies, which are mostly only in their business lines.
Most consumer desktops will not be affected. It seems more laptops than
you would think are affected so if you have an Intel-based laptop from 0-6
years old you might want to check this out. If you have a desktop with a
"Q" chipset (aka vPro) then you also are probably affected.
I'll repeat this so as to not cause undo alarm: MOST HOME DESKTOP SYSTEMS
ARE *NOT* AFFECTED.
Looks like this flaw could let an attacker take full control of the
system, probably including remote BIOS/desktop and/or OS image control
(not sure about file system?). Not sure if exploits are actually in the
wild yet, but once they are, just using any public wifi could get you
hosed. And this isn't just a Windows user problem like all the
RansomWare: this one is at the hardware/BIOS level so it affects all OS
users.
Patched firmware coming soon, or are already out.
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
Here's direct links to the list of affected systems for brands relevant to
my customers (other brands are at the link above):
https://support.lenovo.com/ca/en/product_security/len-14963
https://www.intel.com/content/www/us/en/support/boards-and-kits/000024181.html
https://www.asus.com/News/uztEkib4zFMHCn5r
Note, for Lenovo laptops: W series W520 and up are affected, and most T
and X series.
There are Windows (and maybe Ubuntu) programs you can d/l to check if you
have an affected system. Check the firmware site for your system often
until a fix is posted and then apply it.
-- Your friendly neighbourhood MUUG security announcer
More information about the Roundtable
mailing list