top of page
Search
tagottganhaatante

Update your INTEL-SA-00086 Detection Tool: How to Ensure Your Device is Safe and Secure



To determine if the identified vulnerabilities impact your system, download and run the Intel CSME Version Detection tool using the links below.Frequently Asked Questions SectionAvailable resources


If the INTEL-SA-00086 Detection Tool reported your system being vulnerable, please check with your system manufacturer for updated firmware. Links to system manufacturer pages concerning this issue can be found at -00086-support.




Update your INTEL-SA-00086 Detection Tool



To patch the security vulnerabilities (Intel SA-00086) Intel identified, update the Intel ME (Management Engine) driver and firmware for your system.Affected Models: MSI Notebooks, Vortex and VR ONE units which bundled with Intel 6th, 7th and 8th generation processor. 1. Run the Intel-SA-00086 Detection Tool to confirm whether the firmware update is needed.2. Visit the product download page to download the latest BIOS and Intel ME update tool. Estimated Release Date for the ME Update Tool: - Intel 6th Generation Processor: Dec. 12th, 2017 - Intel 7th Generation Processor: Dec. 4th, 2017 - Intel 8th Generation Processor: Dec. 4th, 20173. Update the latest BIOS, Intel ME driver and firmware to patch the security vulnerabilities.(Refer to the firmware update guide for the detail steps)[12/06 Update] Notice:If you have "Error 8719:Firmware update cannot be initiated because Local Firmware update is disabled." after running the ME Update tool, there will be new BIOS release to solve the problem. New BIOS will be released right away once finished testing. Thank you for your understanding and patience.More information, please visit Intel websites.*1: -center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr*2:


First step to mitigate the risks of attack is to assess the level of exposure. Intel has released a detection tool which can be used in conjuntion with Altiris to automate the reporting. Once the data has been collected we can quickly identify the systems affected which require a Firmware updates and evalutate the remediation efforts.


Based on the analysis performed by this tool: This system is vulnerable.Explanation:The detected version of the Intel(R) Management Engine firmware is considered vulnerable for INTEL-SA-00086. Contact your system manufacturer for support and remediation of this system.For more information refer to the SA-00086 Detection Tool Guide or the Intel security advisory Intel-SA-00086 at the following link:


Then I tried the entire process again but logged in as administrator (I normally log in as an ordinary user for security). Still at the end the Intel detection tool gave the same "system is vulnerable" message and also listed my version of Intel management engine as follows:


Intel published a new vulnerability on 11/20/17 around Intel Management Engine (ME): INTEL-SA-00086 causing Elevation of Privilege (EoP), Remote Code Execution (RCE) or Denial of Service (DoS).Intel published also a detection tool to run on clients. The detection tool is creating registry values about the vulnerability state of a client.To check the status of the clients in an enterprise:


The first answer provided resources for detecting whether or not INTEL-SA-00086 affects you. There is another, the CHIPSEC framework, which scans your BIOS/UEFI for various security issues and reports it to you. It is frequently updated in response to new information. From their Github page:


Windows and Linux users may download INTEL-SA-00086, a detection tool for finding known CPU exploits. Call Intel directly with questions about using the tool, or any silicon-chip related topics pertaining to firmware infections. OEM computer manufacturers are offering additional support for finished PCs.


Hi Tim,You misunderstand. I'm telling you that, as of the 20180425 update from Intel, they have stopped supplying the microcode.dat file. You can verify yourself: -Processor-Microcode-Data-File?v=t


Has anyone successfully used this tool to mitigate the Spectre variant 2 CPU bug?I've tried this on Lynnfield, Clarkdale and Ivy Bridge desktops in combination with the 20180312 Intel microcode.dat. On the first 2 the tool reported a new microcode wasn't required, and on the latter cpumcupdate reported a newer microcode had been loaded (confirmed by HWiNFO). Then again, running InSpectre and the MS PowerShell check, the Ivy Bridge system still reported to be vulnerable to Spectre.So am I right to conclude the 20180312 microcodes do not contain the bugfix for Spectre yet?


If you update the microcode using this tool you get spectre protection in virtual machines if you have any regardless of what hypervisor brand it is as long as it's spectre mitigation aware. However the Windows host most likely won't be protected because the spectre mitigation test often runs too early.


if i pay taxes then i dont care about anything ,i done my job,then why else i pay even taxes? i simply dont care really about my safety,if anything happends,i will pushh the goverment and police to work until they make moves,i will not care i dont have to do nothing. dogs when they are told to do,humens can think and me i dont do anything if its notnecesaary,so put your updates and bs,where it belongs,real people dont want any security updates or bs.i even use old phone,coz i got no time to follow this new trends ,as i said people shoudl have real life to live.thank you!! 2ff7e9595c


1 view0 comments

Recent Posts

See All

Download app Mechat

Como baixar o aplicativo MeChat e encontrar sua história perfeita Você adora ler histórias e fazer escolhas que afetam o resultado? Você...

Comments


bottom of page