Semiconductor giant releases patch for its Intel Active Management Technology vulnerability that could allow an attacker to escalate privileges in its high-end chipsets.
Intel issued a fix yesterday for a long-standing escalation privilege vulnerability in the firmware of its high-end Active Management Technology as well as its Intel Standard Manageability and Intel Small Business Technology products.
The bug could allow remote attackers to gain control of the network or local system privileges on certain firmware versions of Intel Active Management Technology (AMT), Intel Standard Manageability, and Intel Small Business Technology. The flaw does not exist on Intel-based consumer computers, however, the company says.
"This is a major surprise and a huge risk for those organizations who have AMT systems and using it to remotely manage their systems and applications. AMT allows many organizations to remotely manage hardware and systems including the ability to remote control those systems," said Joseph Carson, Thycotic chief security scientist.
The vulnerability could allow an attacker to remotely control, wipe a device, or disable security features on the systems, he said.
Intel is advising affected companies to check their system with the original equipment manufacturer to see if an updated firmware has been issued. If not, then it is asking users to download its patch.
About the Author(s)
You May Also Like
The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024