Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell EMC Response to Intel AMT Advisory (INTEL-SA-00075) and CVE-2017-5689 (Common Vulnerabilities and Exposures)

Summary: Dell EMC response to Intel Active Management Technology (iAMT) reported vulnerability: INTEL-SA-00075 and CVE-2017-5689 (Common Vulnerabilities and Exposures). Dell recommends that customers follow best practices for securing internal networks and protecting systems from unauthorized physical access. ...

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Symptoms

 

Cause

 

Resolution

Overview

The Intel security team recently published an industry-wide advisory highlighting a vulnerability that can affect systems which support system manageability via Intel Active Management Technology (iAMT), Intel Small Business Technology, or Intel Standard Manageability. These technologies are industry wide and are used by some customers to remotely manage the configuration of client and some enterprise systems.

Dell Engineering has determined that the vast majority of Enterprise products do not support AMT with the exception of the T20 & T30 platforms. All other Dell PowerEdge platforms and remote management controllers are unaffected. Planned BIOS releases are forthcoming and will patch the reported vulnerability.

Details about the vulnerability, immediate mitigation, and detection recommendations are available via Intel’s advisory website.


Recommendation

Dell recommends that customers follow best practices for securing internal networks and protecting systems from unauthorized physical access.

Dell recommends customers follow the Intel published Detection Guide and Mitigation Guide for these systems immediately. Intel has released a Discovery Tool that can be used by local users or IT administrators to determine whether a system is vulnerable to INTEL-SA-00075.

Customers should update to the latest BIOS by downloading the patched releases from Dell.com/support as they become available.


BIOS Release Details

Dell is in the process of releasing BIOS updates for the affected platforms. This list is provided for customer planning purposes and will be updated with release information when available:

BIOS Release Details
Dell Enterprise System BIOS Version BIOS Release Date
PowerEdge T20 A12 15 May 2017
PowerEdge T30 1.0.5 11 May 2017

References

Intel Security Advisory (INTEL-SA-00075): https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
Intel Mitigation Guide: https://downloadcenter.intel.com/download/26754
Intel Detection Guide and Discovery Tool: https://downloadcenter.intel.com/download/26755
CVE-2017-5689:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5689

Article Properties


Affected Product

PowerEdge T20, PowerEdge T30

Last Published Date

21 Feb 2021

Version

4

Article Type

Solution