When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Intel finally patches a security vulnerability that has existed for almost ten years

Security vulnerabilities can lead to some rather unpleasant uses by third parties with a nefarious agenda. Though some of these vulnerabilities are usually patched within weeks, others take much longer. Intel has just unveiled a patch for a flaw in its chips that dates back nearly a decade.

In an advisory published May 1, the company calls this an "escalation of privilege vulnerability", giving it a "critical" security rating. Products affected by it are Intel's manageability firmware versions 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, 11.5, and 11.6, made for the firm's Active Management Technology, Intel Small Business Technology, as well as Intel Standard Manageability solutions. The versions before 6 and after 11.6 are not impacted, the chip maker goes on to say.

Intel has stated that in order for an attacker to gain control of the features provided by AMT, ISM, and Small Business Technology, he or she could take one of these routes:

  • An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel® Active Management Technology (AMT) and Intel® Standard Manageability (ISM).

CVSSv3 9.8 Critical /AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

  • An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small Business Technology (SBT).

CVSSv3 8.4 High /AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Although SemiAccurate claims the vulnerability affects all chips from the firm's Nehalem processor architecture, launched in November 2008, all the way to current-generation Kaby Lake processors, Intel has stated that this flaw "does not exist on Intel-based consumer PCs".

In order to determine if you are affected, the chip maker recommends you check out this document, to see if you have an AMT, ISM or SBT-capable system. To discover if you are running an impacted version of the firmware, check this guide.

Source: Intel via TechSpot

Report a problem with article
Next Article

Full Office 365 desktop applications are "coming soon" to the Windows Store

Previous Article

Here are the prices for all Surface Laptop configurations; 1TB model "coming soon"

Join the conversation!

Login or Sign Up to read and post a comment.

8 Comments - Add comment