--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerabilities Affecting Intel Firmware' version: '1.0' number: '2017-025' date: 'November 21, 2017' --- _History:_ * _21/11/2017 --- v1.0: Initial publication_ # Summary On the 20th of November 2017, Intel reported that it _has identified security vulnerabilities that could potentially impact various product families of processors_ [1]. The following components are affected: * Intel® Management Engine (Intel® ME) * Intel® Trusted Execution Engine (Intel® TXE) * Intel® Server Platform Services (SPS) # Technical Details The vulnerabilities received several CVEs: CVE-2017-5705, CVE-2017-5708, CVE-2017-5711, CVE-2017-5712, CVE-2017-5711, CVE-2017-5712, CVE-2017-5706, CVE-2017-5709, CVE-2017-5707, CVE-2017-5710 [2]. As the result of the above mentioned vulnerabilities, an attacker could gain unauthorized access to platforms by impersonating the Intel Engines and platforms, it can **execute arbitrary code** or **cause system crash**. Apparently, the **attacks can be conducted even when a computer is powered off** [5]. # Products Affected Systems using Intel ME Firmware versions 11.0.0 through 11.7.0, SPS Firmware version 4.0, and TXE version 3.0 are impacted. Specific firmware versions on certain Intel processors families: * 6th, 7th, and 8th generation Intel® Core™ Processor Family * Intel® Xeon® Processor E3-1200 v5 and v6 Product Family * Intel® Xeon® Processor Scalable Family * Intel® Xeon® Processor W Family * Intel Atom® C3000 Processor Family * Apollo Lake Intel Atom® Processor E3900 series * Apollo Lake Intel® Pentium® Processors * Intel® Celeron® N and J series Processors # Recommendations * Follow the detection and mitigation procedure described in the _Recommendations_ section of the original Intel advisory [2]. * Use Intel detection tool to analyze your systems for the vulnerabilities [3]. * Follow Intel recommendations on checking with system OEMs for updated firmware [4]. # References [1] [2] [3] [4] [5]