!-- Whatsapp Share Buttons Start -->

Latest Updates / Blogroll

.... AIPEU GROUP - 'C' IS TO CONDUCT ALL ITS STRUGGLE PROGRAMMES UNDER THE BANNER OF POSTAL JCA ....

.... THE JCA SUBMMITTED THE MEMORANDUM TO 7TH CPC ON 23.7.2014 ....

…. NFPE & GDS (NFPE) FILED A CASE IN SUPREME COURT PRAYING : IMPLEMENTATION OF 1977 JUDGEMENT AND DECLARE GDS ARE CIVIL SERVANTS & SCRAP THE GDS (CONDUCT & ENGAGEMENT) RULES 2011 AS THEY ARE INVALID AND UNCONSTITUTIONAL ....

…. SUPREME COURT DIRECTED THE CASE TO DELHI HIGH COURT .. FIRST HEARING WAS ON 13-01-2014 AND PLEASED TO SERVE NOTICE TO GOVT. & DEPARTMENT....

.... NEXT HEARING ON 07-05-2014 NEXT HEARING ON 07-05-2014 ....

APPEAL

APPEAL

UNION SUBSCRIPTION

.... AIPEU GROUP - 'C' UNION SUBSCRIPTION DETAILS ....

.... ALL INDIA UNION / CHQ QUOTA = RS 13 + CIRCLE UNION QUOTA = RS 12 + DIVISIONAL / BRANCH UNION QUOTA = RS 25, TOTAL = RS 50....
.... AIPEU POSTMEN & MTS UNION SUBSCRIPTION DETAILS ....


.... NFPE = Rs 2 + ALL INDIA UNION / CHQ QUOTA = RS 10 + CIRCLE UNION QUOTA = RS 10 + DIVISIONAL / BRANCH UNION QUOTA = RS 18, TOTAL = RS 40....

DHENKANAL POSTAL DIVISION AT A GLANCE

Tuesday, May 2, 2017

PCs with Intel Server Chipsets, Launched in Past 9-Years, Can be Hacked Remotely

    
intel-server-chipsets-management-engine

A critical remote code execution (RCE) vulnerability has been discovered in the remote management features on computers shipped with Intel processors for nearly a decade, which could allow attackers to take control of the computers remotely.

The RCE flaw (CVE-2017-5689) resides in the Intel's Management Engine (ME) technologies such as Active Management Technology (AMT), Small Business Technology (SBT), and Intel Standard Manageability (ISM), according to an advisory published Monday by Intel.

These features allow a systems administrator to remotely manage large fleets of computers over a network (via ports 16992 or 16993) in an organization or an enterprise.

Since these functions are present only in enterprise solutions, and mostly in server chipsets, the vulnerability doesn't affect chips running on Intel-based consumer PCs.

According to the Intel advisory, this critical security vulnerability was discovered and reported in March by security researcher Maksim Malyutin of Embedi, and could be exploited in two ways:
  1. An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel AMT and ISM. However, Intel SBT is not vulnerable to this issue.
  2. An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel AMT, ISM, and SBT.


How Bad is this Vulnerability


In short, a potential attacker can log into a vulnerable machine's hardware and silently perform malicious activities, like tampering with the machine, installing virtually undetectable malware, using AMT's features.

The PC's operating system never knows what's going around because AMT has direct access to the computer's network hardware. When AMT is enabled, any packet sent to the PC's wired network port will be redirected to the Management Engine and passed on to AMT – the OS never sees those packets.

These insecure management features have been made available in various, but not all, Intel chipsets for nearly a decade, starting from Nehalem Core i7 in 2008 to this year's Kaby Lake Core, with a higher degree of a flaw for users on Intel vPro systems.

Fortunately, none of these Management Engine features come enabled by default, and system administrators must first enable the services on their local network. So, basically if you are using a computer with ME features enabled, you are at risk.

Despite using Intel chips, modern Apple Mac computers do not ship with the AMT software and are thus not affected by the flaw.

Affected Firmware Versions & How to Patch


The security flaw affects Intel manageability firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 for Intel's AMT, ISM, and SBT platforms. However, versions before 6 or after 11.6 are not impacted.

Intel has rated the vulnerability as highly critical and released new firmware versions, instructions to detect if any workstation runs AMT, ISM, or SBT, a detection guide to check if your system is vulnerable, and a mitigation guide for those organizations that can not immediately install updates.

The chipmaker is recommending vulnerable customers install a firmware patch as soon as possible.
"Fixing this requires a system firmware update in order to provide new ME [management engine] firmware (including an updated copy of the AMT code). Many of the affected machines are no longer receiving firmware updates from their manufacturers, and so will probably never get a fix," CoreOS security engineer Matthew Garrett explained in a blog post. "Anyone who ever enables AMT on one of these devices will be vulnerable."

"That's ignoring the fact that firmware updates are rarely flagged as security critical (they don't generally come via Windows Update), so even when updates are made available, users probably won't know about them or install them."
You can head on to Intel advisory for further details.

0 comments:

Post a Comment

IS GENERATOR FUNCTIONAL AT YOUR POST OFFICE ?

IS EARTHING DONE AT YOUR POST OFFICE ?

IS UPS FUNCTIONAL AND GIVING BACK UP AT YOUR POST OFFICE ?

IS THERE A SEPARATE SERVER COMPUTER AT YOUR POST OFFICE ?

IS CASH COUNTING MACHINE AVAILABLE AT YOUR POST OFFICE ?

IS VACUUM CLEANER AVAILABLE AT YOUR POST OFFICE ?

IS THERE ANY SECURITY WATCHMAN AT YOUR POST OFFICE ?

IS FAKE NOTE DETECTOR AVAILABLE AT YOUR POST OFFICE ?

About

ALL THE INFORMATION PUBLISHED IN THIS WEBPAGE IS SUBMITTED BY USERS OR FREE TO DOWNLOAD ON THE INTERNET. I MAKE NO REPRESENTATIONS AS TO ACCURACY, COMPLETENESS, CURRECTNESS, SUITABILITY OR VALIDITY OF ANY INFORMATION ON THIS PAGE AND WILL NOT BE LIABLE FOR ANY ERRORS, OMISSIONS OR DELAYS IN THIS INFORMATION OR ANY LOSSES, INJURIES OR DAMAGES ARISING FROM ITS DISPLAY OR USE. ALL INFORMATION IS PROVIDED ON AN AS-IS BASIS. ALL THE OTHER PAGES YOU VISIT THROUGH THE HYPER LINKS MAY HAVE DIFFERENT PRIVACY POLICIES. IF ANYBODY FEELS THAT HIS/HER DATA HAS BEEN ILLEGALLY PUT IN THIS WEBPAGE OR IF YOU ARE THE RIGHTFUL OWNER OF ANY MATERIAL AND WANT IT REMOVED PLEASE EMAIL ME AT "suryamadhu.talk@gmail.com" AND I WILL REMOVE IT IMMEDIATELY ON DEMAND. ALL THE OTHER STANDARD DISCLAIMERS, TERMS AND CONDITIONS OF TRADEMARK, REGISTERED COPY RIGHT, PATENT ALSO APPLY.
COPY RIGHTS RESERVED WITH AIPEU P3, DHENKANAL DIVISION ( R ) / ( T ) : 2014 : PIONEERS OF THE TRADE UNION MOVEMENT