[Critical Issue]: Please check your PC whether Intel vulnerability “Intel-SA-00086” involves or not.

Windows / Linux Users

Intel ME/TXE Elevation of Privileges vulnerabilities were discovered. An attacker can do a remote control a PC regardless of the power off or sleep using these vulnerabilities.
The information processing office discovered on new purchased PC while initial setting.
Therefore, please check

Related Information

Step 1. Check the vulnerability “Intel-SA-00086”.

  1. Download “Intel-SA-00086 Detection Tool” on https://www.intel.co.jp/content/www/jp/ja/support/articles/000025619/software.html
  2. Extract the downloaded file and Open “Intel-SA-00086-GUI” .
  3. If the result is “not applied the security patch”, please go to  Step 2.

Step 2. Update the security patch

BIOS update is needed.
If you find out the BIOS / Drive update tool provided by a PC vender, please carry out it.
The information processing office informs the information on Lenovo, DELL, and Fujitsu.

 

Step 3. Check the vulnerability “Intel-SA-00086” again.

  1. Download “Intel-SA-00086 Detection Tool” on https://www.intel.co.jp/content/www/jp/ja/support/articles/000025619/software.html
  2. Extract the downloaded file and Open “Intel-SA-00086-GUI” .
  3. If the result is “the security patch was applied.”, the operation is done.

6th December, 2017 Information Processing Office.

記事を評価する(This article is evaluated): [1 Star2 Stars3 Stars4 Stars5 Stars]
*記事評価(This evaluation status): 1 投票 (vote), 平均値/最大値 (Averate/Max): 5.00 / 5
Loading...