Take a look at our
ThinkPads.com HOME PAGE
For those who might want to contribute to the blog, start here: Editors Alley Topic
Then contact Bill with a Private Message

Remote security exploit in all 2008+ Intel platforms

General Questions, Rumors, Real news & More
Post Reply
Message
Author
Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2823
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Remote security exploit in all 2008+ Intel platforms

#1 Post by Puppy » Mon May 01, 2017 6:51 pm

ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2823
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#2 Post by Puppy » Wed May 03, 2017 3:37 am

ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13

dr_st
Admin
Admin
Posts: 10032
Joined: Sat Oct 29, 2005 6:20 am
Location: Israel

Re: Remote security exploit in all 2008+ Intel platforms

#3 Post by dr_st » Wed May 03, 2017 2:28 pm

Lenovo is urgently working on qualifying and applying the fixes provided by Intel on supported systems. Please continue to refer to this advisory to identify fixes as they are posted for your systems.

Options for mitigation until the firmware update is available are:

The network vulnerability can be mitigated by unprovisioning the Intel manageability SKU (AMT and ISM) or disabling the Intel manageability technology within the Intel® MEBx.
The local vulnerability can be mitigated by disabling or uninstalling Local Manageability Service (LMS) on Intel manageability SKUs (AMT, ISM, and SBT).

Note that capabilities and features provided by AMT, ISM, and SBT will be made unavailable when these mitigations are implemented.
In other words - if you don't actually use anything AMT/MEBx/LMS - you are OK? It's only that if you actually use ME features, you are vulnerable?
Thinkpad 25 (20K7), T16 Gen 3 (21MQ), Yoga 14 (20FY), T430s (IPS FHD + Classic Keyboard), X220 4291-4BG
X61 7673-V2V, T60 2007-QPG, T42 2373-F7G, X32 (IPS Screen), A31p w/ Ultrabay Numpad

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2823
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#4 Post by Puppy » Thu May 04, 2017 5:20 am

dr_st wrote:
Wed May 03, 2017 2:28 pm
In other words - if you don't actually use anything AMT/MEBx/LMS - you are OK? It's only that if you actually use ME features, you are vulnerable?
No :twisted: The thing is enabled by default in all machines with vPro support in CPU. It is also unknown whether disabling in BIOS actually turns it off. Some reports says it just resets it to default state with 'admin' password. Intel's solution requires the software, including (locally) vulnerable LMS windows service, installed in order to check whether it is active or not :roll:

I spent several hours with the issue. Enabled it in BIOS and entered the setup via Ctrl+P but I haven't found any setting how to turn it off at all for sure. There are options for LAN IPv4, LAN IPv6 and Wi-Fi. You can turn it off for LAN IPv6 and Wi-Fi but the LAN IPv4 is still enabled, you can select DHCP or fixed IP only. Then I disabled it in BIOS again. I checked ports 16992 and 16993 according this from another machine on my home network.
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13

RealBlackStuff
Admin Emeritus
Admin Emeritus
Posts: 24727
Joined: Mon Sep 18, 2006 5:17 am
Location: Loch Garman, Éire

Re: Remote security exploit in all 2008+ Intel platforms

#5 Post by RealBlackStuff » Thu May 04, 2017 6:24 am

Here's how to get rid of Intel AMT: https://mattermedia.com/blog/disabling-intel-amt/
HTH.
Lovely day for a Guinness! (The Real Black Stuff)
But I actually prefer Murphy's from Cork!

dr_st
Admin
Admin
Posts: 10032
Joined: Sat Oct 29, 2005 6:20 am
Location: Israel

Re: Remote security exploit in all 2008+ Intel platforms

#6 Post by dr_st » Thu May 04, 2017 8:00 am

Puppy wrote:
Thu May 04, 2017 5:20 am
The thing is enabled by default in all machines with vPro support in CPU. It is also unknown whether disabling in BIOS actually turns it off. Some reports says it just resets it to default state with 'admin' password.
You cannot disable the ME FW component that runs in the BIOS. It runs even when the BIOS setting is disabled. However, my understanding, is that in this state, known as 'unprovisioned', it does not do much. In particular it does not even load the ME networking driver, and this is why the remote vulnerability should be mitigated in this situation.
Puppy wrote:
Thu May 04, 2017 5:20 am
Intel's solution requires the software, including (locally) vulnerable LMS windows service, installed in order to check whether it is active or not :roll:
Yeah, I'm "totally" going to install their software and enable AMT just to check if AMT is disabled. :P
Puppy wrote:
Thu May 04, 2017 5:20 am
I checked ports 16992 and 16993 according this from another machine on my home network.
And did it respond to these ports in any way? On my system, with AMT disabled in the BIOS, it shows nothing running on these (and other AMT ports). The LMS service is disabled.
RealBlackStuff wrote:
Thu May 04, 2017 6:24 am
Here's how to get rid of Intel AMT: https://mattermedia.com/blog/disabling-intel-amt/
That assume you have AMT running to begin with. I don't, and I don't wish to install it either. What is important to understand is that ME FW is not AMT. AMT is a full-stack solution, involving the firmware, and other software components. It requires certain configuration as well.
Thinkpad 25 (20K7), T16 Gen 3 (21MQ), Yoga 14 (20FY), T430s (IPS FHD + Classic Keyboard), X220 4291-4BG
X61 7673-V2V, T60 2007-QPG, T42 2373-F7G, X32 (IPS Screen), A31p w/ Ultrabay Numpad

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2823
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#7 Post by Puppy » Thu May 04, 2017 9:22 am

dr_st wrote:
Thu May 04, 2017 8:00 am
And did it respond to these ports in any way?
No.

I also run ACUConfig /output console status despite of I don't have the AMT software and windows services installed and got:

Code: Select all

ACUConfig 11.1.0.75
X220: Starting to retrieve machine status...
Error: Host-based configuration is not currently available because the Local Manageability Service (LMS.exe) is not running on the system.

Host information - X220
        UUID ...
        Intel(R) AMT version - 7.1.20
        The system is unconfigured.
        The system TLS setup is using PKI.
        Host-based configuration is not currently available because the Local Manageability Service (LMS.exe) is not running on the system.
        AMT state - Pre-Provision(0)
***********
Exit with code 5 - Call to function failed with return code
But it is not clear whether the reported AMT state Pre-Provision(0) is correct when the LMS service is not running.
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13

dr_st
Admin
Admin
Posts: 10032
Joined: Sat Oct 29, 2005 6:20 am
Location: Israel

Re: Remote security exploit in all 2008+ Intel platforms

#8 Post by dr_st » Thu May 04, 2017 9:54 am

You're probably fine.
Thinkpad 25 (20K7), T16 Gen 3 (21MQ), Yoga 14 (20FY), T430s (IPS FHD + Classic Keyboard), X220 4291-4BG
X61 7673-V2V, T60 2007-QPG, T42 2373-F7G, X32 (IPS Screen), A31p w/ Ultrabay Numpad

RealBlackStuff
Admin Emeritus
Admin Emeritus
Posts: 24727
Joined: Mon Sep 18, 2006 5:17 am
Location: Loch Garman, Éire

Re: Remote security exploit in all 2008+ Intel platforms

#9 Post by RealBlackStuff » Thu May 04, 2017 3:43 pm

And another bum-wiper, this time for Intel's ME: https://github.com/corna/me_cleaner

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2823
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#10 Post by Puppy » Thu Jun 01, 2017 1:44 am

Lenovo has released ME firmware updates for most of machines, including .20 and .10 series ! https://support.lenovo.com/cz/cs/produc ... /len-14963
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13

prophetic
Posts: 9
Joined: Tue Apr 26, 2016 12:57 pm
Location: PHX, AZ

Re: Remote security exploit in all 2008+ Intel platforms

#11 Post by prophetic » Sat Jun 03, 2017 10:47 am

Puppy wrote:
Thu Jun 01, 2017 1:44 am
Lenovo has released ME firmware updates for most of machines, including .20 and .10 series ! https://support.lenovo.com/cz/cs/produc ... /len-14963
Will installing libreboot for my T400 fix the problem? Or is that unable to fix ME?
T400 2764 CTO: T9900, 180 GB SSD, 8 GB 1066 MHz RAM, CCFL WXGA+, ATI dGPU, Intel 7260 AC, Windows 10 Home

T430 2342 CTO: i7-3632QM, 256 GB SSD + 500 GB Ultrabay HDD + 128 GB mSATA SSD, 16 GB 1600 MHz RAM, FHD mod (N140HCE-EN1 Rev.C4), NVIDIA dGPU, Intel 7260 AC, Windows 10 Pro/Linux Mint

shawross
Senior Member
Senior Member
Posts: 671
Joined: Mon Oct 28, 2013 5:48 am
Location: Perth Australia

Re: Remote security exploit in all 2008+ Intel platforms

#12 Post by shawross » Sat Jun 03, 2017 7:07 pm

The T400 is not listed so you can assume it is not affected by the " Remote security exploit ".

Make sure AMT is disabled in your BIOS regardless and any software to AMT is removed.
Active --- Love the X series
X301 W 7/Mint | X201 540M L Mint | X220 2520 W7/Mint

Nostalgia
X61 T7500 / T41 T42 T43 / A31

Rogue daily driver - Samsung RV511 15.6 " Screen - W 7

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2823
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#13 Post by Puppy » Sun Jun 04, 2017 12:03 pm

shawross wrote:
Sat Jun 03, 2017 7:07 pm
The T400 is not listed so you can assume it is not affected by the " Remote security exploit ".
It is rather too old to be verified for this bug.
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13

prophetic
Posts: 9
Joined: Tue Apr 26, 2016 12:57 pm
Location: PHX, AZ

Re: Remote security exploit in all 2008+ Intel platforms

#14 Post by prophetic » Sun Jun 04, 2017 8:51 pm

shawross wrote:
Sat Jun 03, 2017 7:07 pm
The T400 is not listed so you can assume it is not affected by the " Remote security exploit ".

Make sure AMT is disabled in your BIOS regardless and any software to AMT is removed.
True, the article linked in the OP mentions Nehalem and above. Since I'm Penryn, hopefully I'm ok. But it's more likely that Lenovo doesn't expect people to be using xx00 series ThinkPads anymore.
T400 2764 CTO: T9900, 180 GB SSD, 8 GB 1066 MHz RAM, CCFL WXGA+, ATI dGPU, Intel 7260 AC, Windows 10 Home

T430 2342 CTO: i7-3632QM, 256 GB SSD + 500 GB Ultrabay HDD + 128 GB mSATA SSD, 16 GB 1600 MHz RAM, FHD mod (N140HCE-EN1 Rev.C4), NVIDIA dGPU, Intel 7260 AC, Windows 10 Pro/Linux Mint

TonyJZX
Senior Member
Senior Member
Posts: 729
Joined: Sun Feb 19, 2006 12:33 am
Location: Australia

Re: Remote security exploit in all 2008+ Intel platforms

#15 Post by TonyJZX » Mon Jun 05, 2017 5:59 am

Nice job on Lenovo for geting this out.,, they go above and beyond supporting 1st gen up.

It would be an act of god to support T400s.

My question would be does it affect units with whitelists?

I assume it writes to the portion of nvram rom etc that afffects ME so I hope it doesnt make me pull out wlan cards.

TPFanatic
Senior ThinkPadder
Senior ThinkPadder
Posts: 2824
Joined: Thu Jul 30, 2015 11:29 pm

Re: Remote security exploit in all 2008+ Intel platforms

#16 Post by TPFanatic » Mon Jun 05, 2017 11:02 am

I understood that the exploit is for certain versions of Intel ME. T410 and T420 use different versions. Montevina (T400,T500) uses an older version that I presume doesn't have the exploit.

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2823
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#17 Post by Puppy » Wed Aug 30, 2017 3:08 pm

Eureka! The Intel Management Engine can be finally disabled, thanks to the NSA
https://www.notebookcheck.net/Eureka-Th ... 922.0.html
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13

RealBlackStuff
Admin Emeritus
Admin Emeritus
Posts: 24727
Joined: Mon Sep 18, 2006 5:17 am
Location: Loch Garman, Éire

Re: Remote security exploit in all 2008+ Intel platforms

#18 Post by RealBlackStuff » Wed Aug 30, 2017 3:29 pm

The ME_Cleaner is already being updated: https://github.com/corna/me_cleaner/issues/53
Nicola Corna already suspected that bit, which has now been confirmed.

Post Reply
  • Similar Topics
    Replies
    Views
    Last post

Return to “GENERAL ThinkPad News/Comments & Questions”

Who is online

Users browsing this forum: No registered users and 80 guests