Intel patches nine year-old security bug

Better late than never

Intel has patched a remote execution bug that dates back to 2008. According to Intel millions of Intel workstation and server chips could be potentially exploited to remotely control and infect systems with spyware.


From Nehalem (2008) to Kaby Lake (2017), every Intel CPU built, using the Core microarchitecture has been compromised with a security bug allowing attackers to remotely gain system privileges. This was possible due to with the Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM), two features that are usually used to remotely manage IT assets. The bug relates to a flaw in the Management Engine (Intel ME).

While most machines will be updated with an OEM firmware patches, gamers and enthusiast users have to patch their PC themselves. If you want to do so, you have to visit Intel's download center and follow the instructions. If you haven't found a specific patch for your PC, you can run Intel's vulnerability detection tool and it will check everything for you.




Source: KitGuru

News by Luca Rocchi and Marc Büchel - German Translation by Paul Görnhardt - Italian Translation by Francesco Daghini


Previous article - Next article
comments powered by Disqus
Intel patches nine year-old security bug - Intel - News - ocaholic