{"id":5885,"date":"2018-06-17T00:42:00","date_gmt":"2018-06-16T22:42:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=5885"},"modified":"2021-05-13T13:37:16","modified_gmt":"2021-05-13T11:37:16","slug":"tip-update-your-intel-sa-00086-detection-tool","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/06\/17\/tip-update-your-intel-sa-00086-detection-tool\/","title":{"rendered":"Update your INTEL-SA-00086 Detection Tool"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/06\/14\/tipp-intel-sa-00086-detection-tool-updaten\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]If you are using the INTEL-SA-00086 Detection Tool to analyze the computer for vulnerabilities, you should update the tool. Older versions do not recognize certain vulnerabilities.<\/p>\n<p><!--more--><\/p>\n<p>I've introduced the INTEL-SA-00086 detection tool within my German blog post <a href=\"https:\/\/www.borncity.com\/blog\/2017\/11\/21\/neuer-bug-in-intels-management-engine\/\">Neuer Bug in Intels Management Engine (Intel SA-00086)<\/a> a while ago. It scans computers with Intel CPU and shows whether it has found vulnerabilities.<\/p>\n<p><img decoding=\"async\" title=\"Intel ME-Detection Tool\" src=\"https:\/\/i.imgur.com\/F6956wt.jpg\" alt=\"Intel ME-Detection Tool\" \/><\/p>\n<p>A German blog reader mentioned within a <a href=\"https:\/\/www.borncity.com\/blog\/2017\/11\/21\/neuer-bug-in-intels-management-engine\/#comment-58877\" target=\"_blank\" rel=\"noopener noreferrer\">comment<\/a> that old versions of this tool doesn't recognise serveral vulnerabilities. The <a href=\"https:\/\/web.archive.org\/web\/20190906093003\/https:\/\/downloadcenter.intel.com\/download\/27150?v=t\">Intel download page<\/a> mentions that:<\/p>\n<blockquote><p>\u00a0<strong>Note:<\/strong> Versions of the INTEL-SA-00086 Detection Tool earlier than 1.0.0.146 did not check for CVE-2017-5711 and CVE-2017-5712. These CVE's only affect systems with Intel\u00ae Active Management Technology (Intel\u00ae AMT) version 8.x-10.x. Users of systems with Intel AMT 8.x-10.x are encouraged to install version 1.0.0.146, or later, to help verify the status of their system in regards to the INTEL-SA-00086 Security Advisory.<\/p><\/blockquote>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5711\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2017-5711<\/a> and CVE-2017-5712 are addressing vulnerabilities in Intel's Active Management Technology (AMT). So it's a good pratice, to download the most recent version of this tool from this <a href=\"https:\/\/web.archive.org\/web\/20190906093003\/https:\/\/downloadcenter.intel.com\/download\/27150?v=t\">Intel download site<\/a> before starting a diagnosis.<\/p>\n<blockquote><p>But I also should mentions, that this Intel tool doesn't satisfy security experts. I received a harsh <a href=\"https:\/\/www.borncity.com\/blog\/2018\/06\/14\/tipp-intel-sa-00086-detection-tool-updaten\/#comment-59066\" target=\"_blank\" rel=\"noopener noreferrer\">comment<\/a> to my German blog post, that recommends to dump this tool. The reason: It's vulnerable to DLL hijacking as <a href=\"http:\/\/seclists.org\/fulldisclosure\/2017\/Jul\/11\" target=\"_blank\" rel=\"noopener noreferrer\">described here<\/a>\u00a0for some other stuff.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>[German]If you are using the INTEL-SA-00086 Detection Tool to analyze the computer for vulnerabilities, you should update the tool. Older versions do not recognize certain vulnerabilities.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22],"tags":[1453,1452,30,195,194],"class_list":["post-5885","post","type-post","status-publish","format-standard","hentry","category-security","category-update","tag-detection-tool","tag-intel-me","tag-tip","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=5885"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5885\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=5885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=5885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=5885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}