
Resources from system/motherboard manufacturers Note
Intel official security advisory: Technical details on the vulnerability. To determine if the identified vulnerabilities impact your system, download and run the Intel CSME Version Detection tool using the links below. Intel® Celeron® G, N, and J series Processors. Apollo Lake Intel Atom® Processor E3900 series. Intel® Xeon® Processor E3-1200 v5 and v6 Product Family. 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, and 8th generation Intel® Core™ Processor Families. You may find these firmware versions on certain processors from the: Systems using Intel ME Firmware versions 6.x-11.x, servers using SPS Firmware version 4.0, and systems using TXE version 3.0 are impacted. Intel has identified security vulnerabilities that could potentially impact certain PCs, servers, and IoT platforms. Intel® Trusted Execution Engine (Intel® TXE). In response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of the following with the objective of enhancing firmware resilience:
If you're looking for information on the Meltdown/Spectre issue, go to Side-Channel Analysis Facts and Intel® Products. This article doesn't contain information related to the processor side-channel vulnerability (known as Meltdown/Spectre).
This article describes issues related to security vulnerabilities found in the Intel® Management Engine Firmware.
Intel® Management Engine (Intel® ME 6.x/7.x/8.x/9.x/10.x/11.x), Intel® Trusted Execution Engine (Intel® TXE 3.0), and Intel® Server Platform Services (Intel® SPS 4.0) vulnerability (Intel-SA-00086) Note