CERT mailing list archives
Intel Firmware Vulnerability
From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Mon, 08 May 2017 02:11:54 -0500
U.S. Department of Homeland Security US-CERT National Cyber Awareness System: Intel Firmware Vulnerability [ https://www.us-cert.gov/ncas/current-activity/2017/05/07/Intel-Firmware-Vulnerability ] 05/07/2017 07:00 PM EDT Original release date: May 07, 2017 | Last revised: May 08, 2017 Intel has released recommendations to address a vulnerability in the firmware of the following Intel products: Active Management Technology, Standard Manageability, and Small Business Technology firmware versions 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, 11.5, and 11.6. This vulnerability does not affect Intel-based consumer PCs. An attacker could exploit this vulnerability to take control of an affected system. Users and administrators are encouraged to review Intel Security Advisory INTEL-SA-00075 [ https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr ]and updated mitigations and tools: * Mitigation Guide [ http://downloadcenter.intel.com/download/26754 ]v1.2 (May 5, 2017) * Discovery Tool [ http://downloadcenter.intel.com/download/26755 ] v1.0.1.6 (May 5, 2017) * Unprovisioning Tool [ http://downloadcenter.intel.com/download/26781 ]v1.0 (May 6, 2017) US-CERT recommends users and administrators review Vulnerability Note VU#491375 [ http://www.kb.cert.org/vuls/id/491375 ]for additional information and refer to their original equipment manufacturer (OEM) forupdated firmware. ________________________________________________________________________ This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ http://www.us-cert.gov/privacy/ ] policy. ________________________________________________________________________ A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () ncas us-cert gov to your address book. OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ http://www.us-cert.gov/related-resources ] STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ]
Current thread:
- Intel Firmware Vulnerability US-CERT (May 01)
- <Possible follow-ups>
- Intel Firmware Vulnerability US-CERT (May 08)
- Intel Firmware Vulnerability US-CERT (Nov 21)