nightshade00013
Wizard
- Joined
- Apr 9, 2015
- Messages
- 1,258
https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/
Basically Intel built a bug into a ton of their cpu's since around 2008 that can potentially be remotely exploited if a specific feature is turned on and locally exploited even if the feature is turned off.
No mention of this being an issue for Xeon's but I would not be surprised since a lot of the designs are similar between the xeon and core series.
Basically Intel built a bug into a ton of their cpu's since around 2008 that can potentially be remotely exploited if a specific feature is turned on and locally exploited even if the feature is turned off.
The short version is that every Intel platform with AMT, ISM, and SBT from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME (Management Engine) not CPU firmware. If this isn’t scary enough news, even if your machine doesn’t have SMT, ISM, or SBT provisioned, it is still vulnerable, just not over the network. For the moment. From what SemiAccurate gathers, there is literally no Intel box made in the last 9+ years that isn’t at risk. This is somewhere between nightmarish and apocalyptic.
No mention of this being an issue for Xeon's but I would not be surprised since a lot of the designs are similar between the xeon and core series.