{"id":2747,"date":"2017-05-02T11:55:11","date_gmt":"2017-05-02T09:55:11","guid":{"rendered":"http:\/\/borncity.com\/win\/?p=2747"},"modified":"2017-05-02T11:55:41","modified_gmt":"2017-05-02T09:55:41","slug":"remote-security-exploit-in-intel-platforms","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2017\/05\/02\/remote-security-exploit-in-intel-platforms\/","title":{"rendered":"Remote security exploit in Intel Platforms"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"http:\/\/www.borncity.com\/blog\/2017\/05\/02\/kritischer-bug-in-intel-chips-patch-fr-exploit-verfgbar\/\" target=\"_blank\">German<\/a>]Intel platforms from Nehalem to Kaby Lake has a critical vulnerability. Attackers can remotely access an exploitable elevation of privilege security hole. While no consumer systems are affected, Intel and it's OEMs ships a firmware update. <\/p>\n<p><!--more--><\/p>\n<p>The critical remote security exploit affects the firmware of Intel\u00ae Active Management Technology (AMT), Intel\u00ae Standard Manageability (ISM), and Intel\u00ae Small Business Technology. The site <a href=\"http:\/\/semiaccurate.com\/2017\/05\/01\/remote-security-exploit-2008-intel-platforms\/\" target=\"_blank\">semiaccurate.com<\/a> has discovered this bug and informed Intel about that. They are also requesting a fix. On May 1, 2017,&nbsp; Intel has published the advisory <a href=\"https:\/\/security-center.intel.com\/advisory.aspx?intelid=INTEL-SA-00075&amp;languageid=en-fr\" target=\"_blank\">INTEL-SA-00075<\/a>, addressing this security issue:<\/p>\n<blockquote>\n<p>Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Escalation of Privilege  <\/p>\n<p>Intel ID: INTEL-SA-00075  <\/p>\n<p>Product family: Intel\u00ae Active Management Technology, Intel\u00ae Small Business Technology, and Intel\u00ae Standard Manageability  <\/p>\n<p>Impact of vulnerability: Elevation of Privilege<br \/>Severity rating: Critical  <\/p>\n<p>Original release: May 01, 2017<br \/>Last revised: May 01, 2017<\/p>\n<\/blockquote>\n<p>Intel says, all firmware versions 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, 11.5, and 11.6 of Intel\u00ae Active Management Technology (AMT), Intel\u00ae Standard Manageability (ISM), and Intel\u00ae Small Business Technology Firmware are affected. An attacker with normal privileges can gain control of the manageability features provided by these products. Intel describes two ways for attacks:<\/p>\n<ul>\n<li>An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel\u00ae Active Management Technology (AMT) and Intel\u00ae Standard Manageability (ISM).\n<ul>\n<li>CVSSv3 9.8 Critical \/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H<\/li>\n<\/ul>\n<li>An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel\u00ae Active Management Technology (AMT), Intel\u00ae Standard Manageability (ISM), and Intel\u00ae Small Business Technology (SBT).\n<ul>\n<li>CVSSv3 8.4 High \/AV:L\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>More details may be read on Intel's <a href=\"https:\/\/security-center.intel.com\/advisory.aspx?intelid=INTEL-SA-00075&amp;languageid=en-fr\" target=\"_blank\">security ddvisory<\/a>. Intel says, firmware updates are provided by OEMs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Intel platforms from Nehalem to Kaby Lake has a critical vulnerability. Attackers can remotely access an exploitable elevation of privilege security hole. While no consumer systems are affected, Intel and it's OEMs ships a firmware update.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71,448,580],"tags":[803,599,69],"class_list":["post-2747","post","type-post","status-publish","format-standard","hentry","category-computer","category-devices","category-security","tag-exploit","tag-intel","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/2747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=2747"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/2747\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=2747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=2747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=2747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}