![]() Some manufacturers have provided Intel with a direct link for their customers to obtain additional information and available software updates (Refer to the list below). What do I do?Ī: Intel has provided system and motherboard manufacturers with the necessary firmware and software updates to resolve the vulnerabilities identified in Security Advisory Intel-SA-00086.Ĭontact your system or motherboard manufacturer regarding their plans for making the updates available to end users. Q: The Intel CSME Version Detection Tool reports that my system is vulnerable. Microsoft Surface*: Support Information.Intel® NUC and Intel® Compute Stick: Support Information.If your manufacturer is not listed, contact them for information on the availability of the necessary software update. Links for other system/motherboard manufacturers will be provided when available. Resources from system/motherboard manufacturers Note Intel official security advisory: Technical details on the vulnerability.To determine if the identified vulnerabilities impact your system, download and run the Intel CSME Version Detection tool using the links below. Intel® Celeron® G, N, and J series Processors.Apollo Lake Intel Atom® Processor E3900 series.Intel® Xeon® Processor E3-1200 v5 and v6 Product Family.1st, 2nd, 3rd, 4th, 5th, 6th, 7th, and 8th generation Intel® Core™ Processor Families.You may find these firmware versions on certain processors from the: Systems using Intel ME Firmware versions 6.x-11.x, servers using SPS Firmware version 4.0, and systems using TXE version 3.0 are impacted. Intel has identified security vulnerabilities that could potentially impact certain PCs, servers, and IoT platforms. Intel® Trusted Execution Engine (Intel® TXE).In response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of the following with the objective of enhancing firmware resilience: If you're looking for information on the Meltdown/Spectre issue, go to Side-Channel Analysis Facts and Intel® Products. This article doesn't contain information related to the processor side-channel vulnerability (known as Meltdown/Spectre). This article describes issues related to security vulnerabilities found in the Intel® Management Engine Firmware. The latest versions of Windows include an Automatic Updates feature, which allows you to schedule downloads and install them on a schedule that you specify.Intel® Management Engine (Intel® ME 6.x/7.x/8.x/9.x/10.x/11.x), Intel® Trusted Execution Engine (Intel® TXE 3.0), and Intel® Server Platform Services (Intel® SPS 4.0) vulnerability (Intel-SA-00086) Note Click the balloon to install the updates right away.Ī. This notice appears after the download is complete. If you have configured your Windows Automatic Updates feature to download updates but not install them, you will get a notice like the following when the updates have downloaded: ![]() If you use Microsoft Update or Office Update, the updates you select are downloaded and installed at the same time. Downloading only saves the update files to your computer, installing enables them to go to work to help protect your computer. Unless you install the update, you will not be protected from that particular issue.Ī. Each Microsoft security update addresses a specific issue. Here are answers to some frequently asked questions about Microsoft security updates.
0 Comments
Leave a Reply. |