The Intel security team recently published an industry-wide advisory highlighting a vulnerability that can affect systems which support system manageability via Intel Active Management Technology (iAMT), Intel Small Business Technology, or Intel Standard Manageability. These technologies are industry wide and are used by some customers to remotely manage the configuration of client and some enterprise systems.
Dell Engineering has determined that the vast majority of Enterprise products do not support AMT with the exception of the T20 & T30 platforms. All other Dell PowerEdge platforms and remote management controllers are unaffected. Planned BIOS releases are forthcoming and will patch the reported vulnerability.
Details about the vulnerability, immediate mitigation, and detection recommendations are available via Intel’s advisory website.
Dell recommends that customers follow best practices for securing internal networks and protecting systems from unauthorized physical access.
Dell recommends customers follow the Intel published Detection Guide and Mitigation Guide for these systems immediately. Intel has released a Discovery Tool that can be used by local users or IT administrators to determine whether a system is vulnerable to INTEL-SA-00075.
Customers should update to the latest BIOS by downloading the patched releases from Dell.com/support as they become available.
Dell is in the process of releasing BIOS updates for the affected platforms. This list is provided for customer planning purposes and will be updated with release information when available:
Dell Enterprise System | BIOS Version | BIOS Release Date |
PowerEdge T20 | A12 | 15 May 2017 |
PowerEdge T30 | 1.0.5 | 11 May 2017 |
Intel Security Advisory (INTEL-SA-00075): https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
Intel Mitigation Guide: https://downloadcenter.intel.com/download/26754
Intel Detection Guide and Discovery Tool: https://downloadcenter.intel.com/download/26755
CVE-2017-5689:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5689