Intel has patched a remote execution bug that dates back to 2008. According to Intel millions of Intel workstation and server chips could be potentially exploited to remotely control and infect systems with spyware.
From Nehalem (2008) to Kaby Lake (2017), every Intel CPU built, using the Core microarchitecture has been compromised with a security bug allowing attackers to remotely gain system privileges. This was possible due to with the Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM), two features that are usually used to remotely manage IT assets. The bug relates to a flaw in the Management Engine (Intel ME).
While most machines will be updated with an OEM firmware patches, gamers and enthusiast users have to patch their PC themselves. If you want to do so, you have to visit Intel's download center and follow the instructions. If you haven't found a specific patch for your PC, you can run Intel's vulnerability detection tool and it will check everything for you.
Source:
KitGuru