Intel Firmware vulnerability (INTEL-SA-00086)
Advisory note: Intel Q3’17 ME 11.x, SPS 4.0, and TXE 3.0 Security Review Cumulative Update
Reference: Intel security vulnerabilities
In response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of its Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) with the objective of enhancing firmware resilience.
As a result, Intel has identified several security vulnerabilities that could potentially place impacted platforms at risk. Systems using ME Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted. Fujitsu and Intel highly recommend that all customers install updated firmware and Intel® Capability License Service on impacted platforms.
For more detailed information please refer to the Intel web site:
Affected Fujitsu products:
A number of Fujitsu products are affected by the vulnerabilities identified in above mentioned Intel firmware versions.
Fujitsu strongly advises that all customers install updated firmware / BIOS and Intel® Capability License Service (iCLS) Client Software on impacted platforms. The update process and remediation steps are outlined below.
An overview of Fujitsu affected products can be found here:
Description:
Based on the items identified through a comprehensive security review, an attacker could gain unauthorized access to platforms, Intel® ME features, and third-party data protected by the Intel® Management Engine (ME), Intel® Server Platform Service (SPS), or Intel® Trusted Execution Engine (TXE).
This includes scenarios where a successful attacker could:
- Impersonate the ME/SPS/TXE, thereby impacting the validity of local security features.
- Load and execute arbitrary code outside the visibility of the user and operating system.
- Cause a system crash or instability.
Attention:
- Due to the potential exposure of platform keys, Intel will re-provision new platform keys on impacted systems.
- Revocation of existing platform keys on impacted systems is being targeted for the first half of 2018 in a coordinated effort with impacted third-party content & service providers.
- Re-provisioning of platform keys on impacted systems should occur prior to the revocation to avoid potential interruptions in third-party services.
Recommended steps for remediation:
Step 1:
Determine if you have an affected system with Intel® Management Engine (ME), Intel® Server Platform Service (SPS), or Intel® Trusted Execution Engine (TXE).
Consult the list as mentioned above.
Before proceeding, please check the expected availability of the firmware-/BIOS update package.
Step 2:
Download and install the firmware-/BIOS/Driver update package.
For Notebook or Tablet to install and download the firmware-/BIOS/Driver update package, please go to Fujitsu support page and proceed with the following actions:
- Select “Product Type”.
- Select “Series”.
- Select “Model”.
- Select “OS”.
-
Download and install the latest firmware- / BIOS update package from the “BIOS“ section
Download and install the latest Intel Management Engine Driver package from the “Driver“ section
For Desktop and Workstation, please go to Fujitsu support page and follow the instructions.
Note: To re-provision the security platform keys, the latest version (Version 1.47.715.0. or higher) of the Intel® Capability License Service (iCLS) Client software is required. The iCLS client software is a part of the Intel® MEI driver software installer package. The Intel Management Engine Driver version 11.7.0.1043 or higher must be installed to ensure the correct iCLS client software version.