Windows / Linux Users
Intel ME/TXE Elevation of Privileges vulnerabilities were discovered. An attacker can do a remote control a PC regardless of the power off or sleep using these vulnerabilities.
The information processing office discovered on new purchased PC while initial setting.
Therefore, please check
Related Information
- Intel Management Engine Critical Firmware Update (Intel-SA-00086) (Intel)
Step 1. Check the vulnerability “Intel-SA-00086”.
- Download “Intel-SA-00086 Detection Tool” on https://www.intel.co.jp/content/www/jp/ja/support/articles/000025619/software.html
- Extract the downloaded file and Open “Intel-SA-00086-GUI” .
- If the result is “not applied the security patch”, please go to Step 2.
Step 2. Update the security patch
BIOS update is needed.
If you find out the BIOS / Drive update tool provided by a PC vender, please carry out it.
The information processing office informs the information on Lenovo, DELL, and Fujitsu.
- Lenovo
Intel ME 11.x, SPS 4.0, and TXE 3.0 Cumulative Security Update - DELL Server
Dell PowerEdge Server Statement on Intel ME / TXE Advisory (INTEL-SA-00086) - DELL Client
Dell Client Statement on Intel ME/TXE Advisory (INTEL-SA-00086) - Fujitsu
Intel Q3’17 ME 11.x, SPS 4.0, and TXE 3.0 Security Review Cumulative Update - HP
HPSBHF03571 rev 2 – Intel Management Engine Cumulative Security update and fix for WPA2 vulnerability
Step 3. Check the vulnerability “Intel-SA-00086” again.
- Download “Intel-SA-00086 Detection Tool” on https://www.intel.co.jp/content/www/jp/ja/support/articles/000025619/software.html
- Extract the downloaded file and Open “Intel-SA-00086-GUI” .
- If the result is “the security patch was applied.”, the operation is done.
6th December, 2017 Information Processing Office.