jaemis.blogg.se

Intel management engine interface
Intel management engine interface






Resources from system/motherboard manufacturers Note

  • Intel official security advisory: Technical details on the vulnerability.
  • To determine if the identified vulnerabilities impact your system, download and run the Intel CSME Version Detection tool using the links below.
  • Intel® Celeron® G, N, and J series Processors.
  • Apollo Lake Intel Atom® Processor E3900 series.
  • Intel® Xeon® Processor E3-1200 v5 and v6 Product Family.
  • 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, and 8th generation Intel® Core™ Processor Families.
  • You may find these firmware versions on certain processors from the: Systems using Intel ME Firmware versions 6.x-11.x, servers using SPS Firmware version 4.0, and systems using TXE version 3.0 are impacted. Intel has identified security vulnerabilities that could potentially impact certain PCs, servers, and IoT platforms.
  • Intel® Trusted Execution Engine (Intel® TXE).
  • In response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of the following with the objective of enhancing firmware resilience:

    intel management engine interface

    If you're looking for information on the Meltdown/Spectre issue, go to Side-Channel Analysis Facts and Intel® Products. This article doesn't contain information related to the processor side-channel vulnerability (known as Meltdown/Spectre).

    intel management engine interface

    This article describes issues related to security vulnerabilities found in the Intel® Management Engine Firmware.

    intel management engine interface

    Intel® Management Engine (Intel® ME 6.x/7.x/8.x/9.x/10.x/11.x), Intel® Trusted Execution Engine (Intel® TXE 3.0), and Intel® Server Platform Services (Intel® SPS 4.0) vulnerability (Intel-SA-00086) Note








    Intel management engine interface