京都大学東南アジア地域研究研究所 情報処理室

[Critical Issue]: Please check your PC whether Intel vulnerability “Intel-SA-00086” involves or not.

Windows / Linux Users

Intel ME/TXE Elevation of Privileges vulnerabilities were discovered. An attacker can do a remote control a PC regardless of the power off or sleep using these vulnerabilities.
The information processing office discovered on new purchased PC while initial setting.
Therefore, please check

Related Information

Step 1. Check the vulnerability “Intel-SA-00086”.

  1. Download “Intel-SA-00086 Detection Tool” on https://www.intel.co.jp/content/www/jp/ja/support/articles/000025619/software.html
  2. Extract the downloaded file and Open “Intel-SA-00086-GUI” .
  3. If the result is “not applied the security patch”, please go to  Step 2.

Step 2. Update the security patch

BIOS update is needed.
If you find out the BIOS / Drive update tool provided by a PC vender, please carry out it.
The information processing office informs the information on Lenovo, DELL, and Fujitsu.

 

Step 3. Check the vulnerability “Intel-SA-00086” again.

  1. Download “Intel-SA-00086 Detection Tool” on https://www.intel.co.jp/content/www/jp/ja/support/articles/000025619/software.html
  2. Extract the downloaded file and Open “Intel-SA-00086-GUI” .
  3. If the result is “the security patch was applied.”, the operation is done.

6th December, 2017 Information Processing Office.

Exit mobile version