Intel-Firmware-Vulnerability

https://www.us-cert.gov/ncas/current-activity/2017/11/21/Intel-Firmware-Vulnerability

_Intel has released recommendations to address vulnerabilities in the firmware of the following Intel products: Management Engine, Server Platform Services, and Trusted Execution Engine. An attacker could exploit some of these vulnerabilities to take control of an affected system.

US-CERT encourages users and administrators to review the Intel links below and refer to their original equipment manufacturers (OEMs) for mitigation strategies and updated firmware.

_

2 Likes

Does anyone know what the attack vector is for this new vulnerability?

The earlier vulnerability back in May required ports 16992 or 16993 to be open, access through a local proxy, or physical access to a USB port (as @mihawk90 mentioned).

I haven’t been able to find anything on how this new vuln is actually exploited… Does it still require open ports, local login or physical access?