Intel has alerted the users of its 6th, 7th and 8th generation processors with a new vulnerability that can possibly allow someone to gain access and perform some inappropriate operations on your system powered by Intel. The users are vulnerable to remote attacks but no news has yet surfaced of someone being affected by it.
Intel explains that the vulnerability has something to do with the ME Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0. This major security flaw allows the attacker to execute arbitrary commands or cause a system failure which is the worst thing that could happen to you.
In response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of its Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) with the objective of enhancing firmware resilience.
As a result, Intel has identified several security vulnerabilities that could potentially place impacted platforms at risk. Systems using ME Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted.
Following CPU families are affected by the security flaw:
- 6th, 7th & 8th Generation Intel® Core™ Processor Family
- Intel® Xeon® Processor E3-1200 v5 & v6 Product Family
- Intel® Xeon® Processor Scalable Family
- Intel® Xeon® Processor W Family
- Intel® Atom® C3000 Processor Family
- Apollo Lake Intel® Atom Processor E3900 series
- Apollo Lake Intel® Pentium™
- Celeron™ N and J series Processors
If you are using any CPU that belongs to any of the above mentioned processors family then you might be in problem. To see whether your system is vulnerable or not Intel published an Intel Detection tool that you might want to download and let it check your system. In case it shows that your system is vulnerable you must get your system’s firmware updated right away. Following are the CPUs and their updated firmware versions.