Intel patches remote execution that dates back to 2008
Click here to post a comment for Intel patches remote execution that dates back to 2008 on our message forum
chronek
It was not a bug, it was a feature..
Kaarme
schmidtbag
SirDremor
Hurray! Now all those scared can un-wrap themselves from tinfoil!
schmidtbag
mieciu184
Took em 9 years to notice the bug nice 😀
Picolete
Turanis
At least!
Intel Management Engine is a "good" feature.
AMT is hardware and firmware technology for remote out-of-band management of personal computers, in order to monitor, maintain, update, upgrade, and repair them.
https://en.wikipedia.org/wiki/Intel_Active_Management_Technology
You try to escape from Windows 10 spy-bloat-ware,but you have IME in hardware from Nehalem to Kaby Lake. 😀
https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/
"The short version is that every Intel platform with AMT, ISM, and SBT from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME (Management Engine) not CPU firmware. If this isn’t scary enough news, even if your machine doesn’t have SMT, ISM, or SBT provisioned, it is still vulnerable, just not over the network."
[Spoiler]https://cdn.meme.am/cache/instances/folder373/500x/62059373.jpg[/Spoiler]
Zooke
Anyone posting suspicion of this kind of backdoor last week would have been labelled a tinfoil hat loony. Yet here we are.
tsunami231
not really shocking is it? there puma6 chip on modems is still yet to be fixed either