Start a Conversation

This post is more than 5 years old

Solved!

Go to Solution

10305

November 23rd, 2017 13:00

Dell, Where is the fix of Intel Management Engine vulnerability for my PC?

Hi, I'm user of Dell Inspiron 7567 and my PC is vulnerable due to Intel Management Engine (as other PCs with processor Intel Core 6-8 gens).

You could check your PC using Intel-SA-00086 Detection Tool:
downloadcenter.intel.com/.../27150

Dell, Where is the fix of Intel Management Engine vulnerability for my PC (Dell Inspiron 7567)?
Thank you.




Intel-SA-00086 Detection Tool results:

Risk Assessment

Based on the analysis performed by this tool: This system is vulnerable.


Explanation:
The detected version of the Intel(R) Management Engine firmware is considered vulnerable for INTEL-SA-00086. Contact your system manufacturer for support and remediation of this system.
For more information refer to the SA-00086 Detection Tool Guide or the Intel security advisory Intel-SA-00086 at the following link: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr

INTEL-SA-00086 Detection Tool

Application Version: 1.0.0.128
Scan date: 11/23/2017 22:05:01

Host Computer Information

Name: SD-PC
Manufacturer: Dell Inc.
Model: Inspiron 15 7000 Gaming
Processor Name: Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
OS Version: Microsoft Windows 10 Home

Intel(R) ME Information

Engine: Intel(R) Management Engine
Version: 11.6.1.1142
SVN: 1

Copyright(C) 2017, Intel Corporation, All rights reserved. 

16 Posts

December 22nd, 2017 11:00

Dell Inspiron 14 7000 and 15 7000 Gaming System BIOS v1.4.0:
http://www.dell.com/support/home/us/en/04/drivers/driversdetails?driverId=YY4FT


Risk Assessment

Based on the analysis performed by this tool: This system is not vulnerable. It has already been patched.

For more information refer to the SA-00086 Detection Tool Guide or the Intel security advisory Intel-SA-00086 at the following link: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr

INTEL-SA-00086 Detection Tool

Application Version: 1.0.0.128
Scan date: 12/22/2017 20:39:09

Host Computer Information

Name: SD-PC
Manufacturer: Dell Inc.
Model: Inspiron 15 7000 Gaming
Processor Name: Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
OS Version: Microsoft Windows 10 Home

Intel(R) ME Information

Engine: Intel(R) Management Engine
Version: 11.8.50.3426
SVN: 3

Copyright(C) 2017, Intel Corporation, All rights reserved. 

10 Elder

 • 

44.4K Posts

November 24th, 2017 17:00

Read this.

16 Posts

November 24th, 2017 18:00

For getting a vulnerability fix users have to way for 3 months without any protection.
Pretty cool (not).

What is the reason of BIOS update (the second table from "Read this.")?
According to Intel-SA-00086_Detection_UG.pdf, it will not help:


Table 2-5. Criteria to determine if a System is Vulnerable to Intel - SA-00086 Using the Intel-SA-00086 Detection Tool 

Value Name 

Vulnerable

Not Vulnerable

ME Version

 ME Versions 11.x.x.x with SVN < 3 

ME Versions: 11.8 and higher with SVN >=3

TXE Version 

TXE Versions 3.0.x.x with SVN < 3 

TXE Versions 3.1 and higher with SVN >=3

SPS Version 
Both the operational and recovery versions must be checked for vulnerability

Operational and Recovery Milestones <=3 For example: • SPS_E5_04.01.03.005.0 • SPS_E5_04.00.03.237.0 • SPS_E3_04.01.03.026.0

Operational and Recovery Milestone >=4 For example: • SPS_E5_04.01.04.001.0 • SPS_E5_04.00.04.001.0 • SPS_E3_04.01.04.001.0

 

2 Intern

 • 

5.8K Posts

November 24th, 2017 18:00

Thanks ALXIMIKS and Ron for the info and links.

To me, it looks like Intel published these vulnerabilities (INTEL-SA-00086) on Nov. 20, and Dell responded on Nov. 23.

Both the Intel Detection Tool, and the list from Dell tell me that my Dell XPS 13 9350 (Win 10 Pro) is at risk, and not yet patched. Users of Secunia PSI 3.0, and of Belarc Advisor should note that these utilities do NOT detect this unpatched vulnerability.

Dell - the clock is ticking.

Incidently, this is my second attempt to post this reply, thanks to Dell's intransigent reCaptcha.

10 Elder

 • 

44.4K Posts

November 24th, 2017 19:00

I don't work for Dell and I have no control over timing for these updates, but consider this...

This vulnerability has existed for a very long time since it affects CPUs all the way back to Core Gen 6. AFAIK, this hole has never been exploited so it's either non-obvious and/or sufficiently difficult to exploit that it hasn't been penetrated. So I don't understand the "urgency" being expressed here.  

Secondly, none of us knows how much work and time are needed to prepare the update for each affected PC model. Keep in mind that this will be a firmware update, not just a (reversible) software patch. Dell has to be very sure that it not only fixes the problem, but also that it doesn't cause new problems or create new holes and/or BRICK a whole lot of motherboards. So a lot of testing will probably be needed before they can safely release these updates to users.

And we all HATE reCaptcha. :emotion-5:

My 2-cents...

 

16 Posts

November 24th, 2017 20:00

Vulnerability in SMB 1.0 has lived until public disclosure for ten years.
It was used in NSA tools.
The results were WannaCry and NotPety viruses.


Did NSA know about this one (INTEL-SA-00086) - YES.
habrahabr.ru/.../

"Positive Technologies" discovered vulnerability.
They have found undocumented posibilities what were developed by Intel for NSA programm "High Assurance Platform".

Intel company answer:
"Mark/Maxim,
In response to requests from customers with specialized requirements we sometimes explore the modification or disabling of certain features. In this case, the modifications were made at the request of equipment manufacturers in support of their customer’s evaluation of the US government’s “High Assurance Platform” program. These modifications underwent a limited validation cycle and are not an officially supported configuration."

2 Intern

 • 

5.8K Posts

November 24th, 2017 21:00

Ron:

I don't work for anybody either. I agree with most of what you say. I have no clue as to the urgency of patching this. I wish I had a buck for every unpatched vulnerability I've read about.

Nonetheless, the publishing of this vulnerability (no matter how longstanding, or as yet unexploited) demands a response. If Intel now tells me my CPU has a vulnerability, then shunts the responsibility to Dell to fix it, then I expect a timely remedy. From somebody. After all, I'm not talking about Win 7 here, but about the latest Windows operating system. Touted to be the most secure ever. So yes ... the clock is ticking.

ALXIMIKS: Sorry, but I can't read your Russian link.

16 Posts

November 25th, 2017 03:00

There was original source link. Nothing more.

Also, the problem becomes more complex when you will understand what is Intel ME.
It is not a software on your HDD.
It is not some BIOS update.

It is separate microcontroller between Intel processor and all other PC devices.
It has its own undocumented architecture.
And vulnerability provides the installation of unsigned programs on this microcontroller.

As a result, you could reinstall your Operation System or update your BIOS but the virus will be still there (on youor PC) and will do whatever it wants.

2 Intern

 • 

5.8K Posts

November 25th, 2017 20:00

Lenovo has issued a fix:

Intel ME 11.x, SPS 4.0, and TXE 3.0 Cumulative Security Update:
support.lenovo.com/.../len-17297

16 Posts

November 26th, 2017 01:00

"Intel gives motherboard manufacturers the ability to specify a small number of ME parameters. To this end, the company provides hardware manufacturers with a special set of software, which includes tools such as Flash Image Tool (FIT) for setting ME parameters and Flash Programming Tool (FPT), which supports the programming of flash memory directly via the built-in SPI controller."
(source link (rus) - https://habrahabr.ru/company/pt/blog/336242/)

Wow, Lenovo needs few day to fix the bug but DELL will fix it for 3 months.
If DELL will be work so intensive as for Intel Optane driver for their Lapbooks BIOS, I'm not sure that we will see any bug-fix at all.

1 Message

December 30th, 2017 22:00

Yes i agree, intel had some bogus ideas in the past but this is the most idiotic one. Using an ancient code to run a modern cpu and a modern operating system on it??? I dont need my bios to have its own web server and full functional IP stack, I want a bios that boots my OS and thats all it should do nothing else. i went with me_cleaner with option (-S) Both on my Alienware 17-R4 and my latitude 14 Rugged 5414 . But i ordered my latitude 14 with Out of band management disabled option, but i could not sure until i dissected the firmware. As soon i got them, both firmware were amputated of intel ME no shutdown or any problems. Obviously i used an SPI programmer (TL866A) with sop8 clip, backed up both firmwares and updated to the latest one backup again than cleaned and written back. I had to install Python for windows (use version 2.7.12 it works) newer will error out on syntax. These guys deserve a donation i think to unveil the hidden computer inside the computer that active even when your computer is off and doing it staff the *** knows what...Can we get back to the computers from the 80's when they didnt had bogus code running below hardware level, in fact they not even had setup for the BIOS it was a floppy disk as they only had 64k/128k  bios that only booted the system.

No Events found!

Top