We would like to inform you that Intel Corporation has identified security vulnerabilities in its processor hardware that could potentially place impacted platforms at risk.
Based on the items identified, an attacker could gain unauthorized access to platform, Intel® ME feature, and 3rd party secrets protected by the Intel® Management Engine (ME), Intel® Server Platform Service (SPS), or Intel® Trusted Execution Engine (TXE).
Intel has made available a software-based Detection Tool that can be run on systems to validate whether they are affected. Software patches have now been released from Intel and OEMs that fix this vulnerability. For detailed information on the identified vulnerability, please follow this link to Intel’s Security Center bulletin.
Affected products identified by Intel Corporation:
6th, 7th & 8th Generation Intel® Core™ Processor Family
Intel® Xeon® Processor E3-1200 v5 & v6 Product Family
Intel® Xeon® Processor Scalable Family
Intel® Xeon® Processor W Family
Intel® Atom® C3000 Processor Family
Apollo Lake Intel® Atom Processor E3900 series
Apollo Lake Intel® Pentium™
Celeron™ G, N and J series Processors
For detailed guidance on how to fix this vulnerability, please follow the OEM support links below:
Moiz Bhinderwala leads the technical services and logistics teams at Dynamic. With more than 10 years of experience in the IT industry, Moiz has deep knowledge of the complex technological landscape, working closely with clients to understand their IT challenges and help design custom technical solutions to meet their business goals.