Hi,
Intel just released patches for a backdoor that basically affects about all[1] their CPUs since 2010.
Make sure you have AMT disabled in BIOS/UEFI ... or quickly grab the patch
How bad is this
That depends. Unless you've explicitly enabled AMT at any point, you're probably fine. The drivers that allow local users to provision the system would require administrative rights to install, so as long as you don't have them installed then the only local users who can do anything are the ones who are admins anyway. If you do have it enabled, though…
further information via http://mjg59.dreamwidth.org/48429.html
[1] Apples are not affected, as they do not ship with AMT firmware inside Management Engine
Intel ME/AMT Hardware backdoor being exploited in the wild
- Karl Klammer
- Posts: 193
- Joined: Tue Oct 13, 2015 3:19 am
- Location: Old Europe
Re: Intel ME/AMT Hardware backdoor being exploited in the wild
Fun fact: this has been known for years, it's only now outsiders get to know it.
Re: Intel ME/AMT Hardware backdoor being exploited in the wild
Ahhh, I remember this from ages ago too! 

~Rob - Vice President - Rugged Depot~
~Cell: (630)/300-8877~
~Owner - Toughbooktalk~
~Fully rugged Toughbook user since April 18th 2005~
~FZ-40ACAAHKM - Primary Toughbook / Workstation as of 7/29/22
~Win10 Pro (Win11 DG), Intel Core i5-1145G7 (up to 4.4GHz), vPro, 14.0" FHD Gloved Multi Touch, 16GB, 1TB Samsung SSD, Intel Wi-Fi 6, Bluetooth, 4G EM7690, GPS, Quad Pass (BIOS Selectable), Mic and Infrared 5MP Webcam, Standard Battery, TPM 2.0, Emissive Backlit Keyboard, Dual Batteries, USB A + HDMI + Serial X-PAK, Shoulder Strap, Flat~
~AT&T Business 1GB Fiber 1GB/1GB business static line~
~Gamber & Johnson Platinum Partner~
http://www.toughbooktalk.com
http://downloads.toughbooktalk.com/
http://www.rugged575.com - 300' UHF GMRS Radio Repeater
http://www.crete600.com - 310' UHF Linked GMRS Radio Repeater
~Emergency preparedness starts with reliable communication systems above all. Pretend the internet and cell phones didn’t exist, how will you communicate? If you’re interested in learning more, ask me!~
~Cell: (630)/300-8877~
~Owner - Toughbooktalk~
~Fully rugged Toughbook user since April 18th 2005~
~FZ-40ACAAHKM - Primary Toughbook / Workstation as of 7/29/22
~Win10 Pro (Win11 DG), Intel Core i5-1145G7 (up to 4.4GHz), vPro, 14.0" FHD Gloved Multi Touch, 16GB, 1TB Samsung SSD, Intel Wi-Fi 6, Bluetooth, 4G EM7690, GPS, Quad Pass (BIOS Selectable), Mic and Infrared 5MP Webcam, Standard Battery, TPM 2.0, Emissive Backlit Keyboard, Dual Batteries, USB A + HDMI + Serial X-PAK, Shoulder Strap, Flat~
~AT&T Business 1GB Fiber 1GB/1GB business static line~
~Gamber & Johnson Platinum Partner~
http://www.toughbooktalk.com
http://downloads.toughbooktalk.com/
http://www.rugged575.com - 300' UHF GMRS Radio Repeater
http://www.crete600.com - 310' UHF Linked GMRS Radio Repeater
~Emergency preparedness starts with reliable communication systems above all. Pretend the internet and cell phones didn’t exist, how will you communicate? If you’re interested in learning more, ask me!~
Re: Intel ME/AMT Hardware backdoor being exploited in the wild
Update your ME firmware ASAP this comes out: http://pc-dl.panasonic.co.jp/itn/info/o ... 70512.html