Menu
Patch to fix Intel-based PCs with enterprise bug rolls out this week

Patch to fix Intel-based PCs with enterprise bug rolls out this week

Intel is also offering a tool to help IT administrators discover machines built with the vulnerability

IDG

IDG

This week PC vendors will start rolling out patches that fix a severe vulnerability found in certain Intel-based business systems, including laptops, making them easier to hack.

Intel on Friday released a new notice urging clients to take steps to secure their systems.

The chipmaker has also released a downloadable tool that can help IT administrators and users discover whether a machine they own has the vulnerability.

In addition, vendors including Fujitsu, HP, and Lenovo have released lists showing which products are affected and when the patches will roll out.

The products include laptops from Lenovo's ThinkPad line and HP's EliteBook series, along with servers, and desktops. Some of the patches are slated to come in June.

Computers running enterprise management features found in Intel-based firmware from the past eight years will have the bug.

Specifically, the vulnerability resides in past versions of Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability.

Fortunately, the vulnerability can only be exploited if these features have been enabled, according to security firm Embedi, which uncovered the bug.

These enterprise features were designed to help businesses remotely manage, track and repair huge fleets of connected computers, including retail checkout systems, digital signs, and PCs.

However, Intel’s firmware bug could allow a hacker to take over the PCs and devices that use these remote management technologies, the chipmaker said.

In March, Intel learned about the vulnerability from a researcher at Embedi, a security product provider.

On Friday, Embedi released more technical details about the Intel firmware bug, saying it could be exploited to remotely control a machine’s mouse and keyboard and even turn the computer on or off.

“Which means, you can remotely load, execute any program to the target system,” Embedi said.

The vulnerability also bypasses the machine’s authentication processes, so no knowledge of the password is needed, Embedi said.

Until the patch becomes available, Intel is recommending users manually apply temporary fixes to address the threat. Users can also contact Intel’s customer support.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments