Acer, Dell, Fujitsu, HP, Lenovo, Panasonic are affected by Intel's security flaws
Acer, Dell, Fujitsu, HP, Lenovo and Panasonic have officially confirmed that the products that these companies combine with Intel chipsets are affected by 8 security holes, allowing hackers to easily penetrate the device. .
Acer, Dell, Fujitsu, HP, Lenovo and Panasonic have officially confirmed that the products that these companies combine with Intel chipsets are affected by 8 security holes, allowing hackers to easily penetrate the device. .
Intel announced details of these vulnerabilities on Monday. These eight vulnerabilities affected Intel's CPU core technologies such as Intel Management Engine (ME), Intel Server Platform Services (SPS) and Intel Trusted Execution Engine (TXE).
Intel has implemented these technologies in its products such as:
- 6th, 7th and 8th generation Intel® Core ™ Family processors
- Intel® Xeon® E3-1200 v5 & v6 Product Family processors
- Intel® Xeon® Scalable Family processor
- Intel® Xeon® W Family processor
- Intel® Atom® C3000 Family processor
- Apollo Lake Intel® Atom E3900 series processor
- Apollo Lake Intel® Pentium ™
- Celeron ™ N and J series processors
However, only products using the firmware versions below are affected:
- Firmware versions ME 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20
- SPS 4.0 firmware version
- TXE 3.0 version
Currently, many PC and laptop vendors combine these CPUs to run vulnerable firmware versions in server, desktop, and laptop models in the worldwide market.
More than 900 PCs and laptops are affected
Below is a list of affected Intel chip products
Supplier Number of affected devicesVaAcer 242 No Dell 214 No Dell Server 16 No Fujitsu (PDF) 165 No HPE Server Unknown Some Intel 34 No Lenovo 222 Some Panasonic 12 NoNot all vendors release patches for the vulnerability, so users should revisit their websites to download the device firmware update when available.
Besides, Intel has also released a Windows and Linux tool (https://downloadcenter.intel.com/download/27150) that helps scan users' PCs and indicates that the scanned computer is affected by the vulnerability. is not. On Windows, users can run Intel-SA-00086-GUI.exe file to see the scan results.
Global security company Rapid7 also issued a warning to corporate customers, clarifying the risks of Intel chip security bugs. According to experts from Rapid7, these errors can be used to:
- Impersonate ME / SPS / TXE, thus affecting local security authentication features.
- Download and execute arbitrary code, outside of the user's awareness as well as the operating system.
- Make the system crash or instability.
See also: Malware can steal Facebook, Twitter and Gmail accounts
You should read it
- Microsoft released an Intel chip patch
- Overview of vulnerabilities on Intel, AMD, ARM chips: Meltdown and Specter
- Intel faces many class action lawsuits because of a chip security error
- Intel will fix Meltdown and Specter over 90% of new products within 1 week
- Serious security vulnerability on Intel chips
- Found an 'unpatchable' flaw in Intel CPUs
- AMD and ARM both warned of security flaws like Intel processors
- How to know if your Windows computer is affected by Meltdown and Specter?
- Specter V2 vulnerability re-appears to attack Intel, Arm CPUs, AMD chips are not affected
- Intel's chip has eight new serious vulnerabilities
- The chip that combines Intel and AMD gives the baby PC with a palm that can use VR
- Apple will stop using Intel chips on Macs from 2020, switching to 'homegrown' chips.