Affects allmost all ThinkPads
Take a look at our
ThinkPads.com HOME PAGE
For those who might want to contribute to the blog, start here: Editors Alley Topic
Then contact Bill with a Private Message
ThinkPads.com HOME PAGE
For those who might want to contribute to the blog, start here: Editors Alley Topic
Then contact Bill with a Private Message
Remote security exploit in all 2008+ Intel platforms
-
Puppy
- Senior ThinkPadder

- Posts: 2823
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Remote security exploit in all 2008+ Intel platforms
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13
Huawei MateBook 13
-
Puppy
- Senior ThinkPadder

- Posts: 2823
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
Lenovo response https://support.lenovo.com/cz/cs/produc ... /len-14963
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13
Huawei MateBook 13
Re: Remote security exploit in all 2008+ Intel platforms
In other words - if you don't actually use anything AMT/MEBx/LMS - you are OK? It's only that if you actually use ME features, you are vulnerable?Lenovo is urgently working on qualifying and applying the fixes provided by Intel on supported systems. Please continue to refer to this advisory to identify fixes as they are posted for your systems.
Options for mitigation until the firmware update is available are:
The network vulnerability can be mitigated by unprovisioning the Intel manageability SKU (AMT and ISM) or disabling the Intel manageability technology within the Intel® MEBx.
The local vulnerability can be mitigated by disabling or uninstalling Local Manageability Service (LMS) on Intel manageability SKUs (AMT, ISM, and SBT).
Note that capabilities and features provided by AMT, ISM, and SBT will be made unavailable when these mitigations are implemented.
Thinkpad 25 (20K7), T16 Gen 3 (21MQ), Yoga 14 (20FY), T430s (IPS FHD + Classic Keyboard), X220 4291-4BG
X61 7673-V2V, T60 2007-QPG, T42 2373-F7G, X32 (IPS Screen), A31p w/ Ultrabay Numpad
X61 7673-V2V, T60 2007-QPG, T42 2373-F7G, X32 (IPS Screen), A31p w/ Ultrabay Numpad
-
Puppy
- Senior ThinkPadder

- Posts: 2823
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
No
I spent several hours with the issue. Enabled it in BIOS and entered the setup via Ctrl+P but I haven't found any setting how to turn it off at all for sure. There are options for LAN IPv4, LAN IPv6 and Wi-Fi. You can turn it off for LAN IPv6 and Wi-Fi but the LAN IPv4 is still enabled, you can select DHCP or fixed IP only. Then I disabled it in BIOS again. I checked ports 16992 and 16993 according this from another machine on my home network.
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13
Huawei MateBook 13
-
RealBlackStuff
- Admin Emeritus
- Posts: 24727
- Joined: Mon Sep 18, 2006 5:17 am
- Location: Loch Garman, Éire
Re: Remote security exploit in all 2008+ Intel platforms
Here's how to get rid of Intel AMT: https://mattermedia.com/blog/disabling-intel-amt/
HTH.
HTH.
Lovely day for a Guinness! (The Real Black Stuff)
But I actually prefer Murphy's from Cork!
But I actually prefer Murphy's from Cork!
Re: Remote security exploit in all 2008+ Intel platforms
You cannot disable the ME FW component that runs in the BIOS. It runs even when the BIOS setting is disabled. However, my understanding, is that in this state, known as 'unprovisioned', it does not do much. In particular it does not even load the ME networking driver, and this is why the remote vulnerability should be mitigated in this situation.
Yeah, I'm "totally" going to install their software and enable AMT just to check if AMT is disabled.
And did it respond to these ports in any way? On my system, with AMT disabled in the BIOS, it shows nothing running on these (and other AMT ports). The LMS service is disabled.Puppy wrote: ↑Thu May 04, 2017 5:20 amI checked ports 16992 and 16993 according this from another machine on my home network.
That assume you have AMT running to begin with. I don't, and I don't wish to install it either. What is important to understand is that ME FW is not AMT. AMT is a full-stack solution, involving the firmware, and other software components. It requires certain configuration as well.RealBlackStuff wrote: ↑Thu May 04, 2017 6:24 amHere's how to get rid of Intel AMT: https://mattermedia.com/blog/disabling-intel-amt/
Thinkpad 25 (20K7), T16 Gen 3 (21MQ), Yoga 14 (20FY), T430s (IPS FHD + Classic Keyboard), X220 4291-4BG
X61 7673-V2V, T60 2007-QPG, T42 2373-F7G, X32 (IPS Screen), A31p w/ Ultrabay Numpad
X61 7673-V2V, T60 2007-QPG, T42 2373-F7G, X32 (IPS Screen), A31p w/ Ultrabay Numpad
-
Puppy
- Senior ThinkPadder

- Posts: 2823
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
No.
I also run ACUConfig /output console status despite of I don't have the AMT software and windows services installed and got:
Code: Select all
ACUConfig 11.1.0.75
X220: Starting to retrieve machine status...
Error: Host-based configuration is not currently available because the Local Manageability Service (LMS.exe) is not running on the system.
Host information - X220
UUID ...
Intel(R) AMT version - 7.1.20
The system is unconfigured.
The system TLS setup is using PKI.
Host-based configuration is not currently available because the Local Manageability Service (LMS.exe) is not running on the system.
AMT state - Pre-Provision(0)
***********
Exit with code 5 - Call to function failed with return code
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13
Huawei MateBook 13
Re: Remote security exploit in all 2008+ Intel platforms
You're probably fine.
Thinkpad 25 (20K7), T16 Gen 3 (21MQ), Yoga 14 (20FY), T430s (IPS FHD + Classic Keyboard), X220 4291-4BG
X61 7673-V2V, T60 2007-QPG, T42 2373-F7G, X32 (IPS Screen), A31p w/ Ultrabay Numpad
X61 7673-V2V, T60 2007-QPG, T42 2373-F7G, X32 (IPS Screen), A31p w/ Ultrabay Numpad
-
RealBlackStuff
- Admin Emeritus
- Posts: 24727
- Joined: Mon Sep 18, 2006 5:17 am
- Location: Loch Garman, Éire
Re: Remote security exploit in all 2008+ Intel platforms
And another bum-wiper, this time for Intel's ME: https://github.com/corna/me_cleaner
-
Puppy
- Senior ThinkPadder

- Posts: 2823
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
Lenovo has released ME firmware updates for most of machines, including .20 and .10 series ! https://support.lenovo.com/cz/cs/produc ... /len-14963
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13
Huawei MateBook 13
Re: Remote security exploit in all 2008+ Intel platforms
Will installing libreboot for my T400 fix the problem? Or is that unable to fix ME?Puppy wrote: ↑Thu Jun 01, 2017 1:44 amLenovo has released ME firmware updates for most of machines, including .20 and .10 series ! https://support.lenovo.com/cz/cs/produc ... /len-14963
T400 2764 CTO: T9900, 180 GB SSD, 8 GB 1066 MHz RAM, CCFL WXGA+, ATI dGPU, Intel 7260 AC, Windows 10 Home
T430 2342 CTO: i7-3632QM, 256 GB SSD + 500 GB Ultrabay HDD + 128 GB mSATA SSD, 16 GB 1600 MHz RAM, FHD mod (N140HCE-EN1 Rev.C4), NVIDIA dGPU, Intel 7260 AC, Windows 10 Pro/Linux Mint
T430 2342 CTO: i7-3632QM, 256 GB SSD + 500 GB Ultrabay HDD + 128 GB mSATA SSD, 16 GB 1600 MHz RAM, FHD mod (N140HCE-EN1 Rev.C4), NVIDIA dGPU, Intel 7260 AC, Windows 10 Pro/Linux Mint
Re: Remote security exploit in all 2008+ Intel platforms
The T400 is not listed so you can assume it is not affected by the " Remote security exploit ".
Make sure AMT is disabled in your BIOS regardless and any software to AMT is removed.
Make sure AMT is disabled in your BIOS regardless and any software to AMT is removed.
Active --- Love the X series
X301 W 7/Mint | X201 540M L Mint | X220 2520 W7/Mint
Nostalgia
X61 T7500 / T41 T42 T43 / A31
Rogue daily driver - Samsung RV511 15.6 " Screen - W 7
X301 W 7/Mint | X201 540M L Mint | X220 2520 W7/Mint
Nostalgia
X61 T7500 / T41 T42 T43 / A31
Rogue daily driver - Samsung RV511 15.6 " Screen - W 7
-
Puppy
- Senior ThinkPadder

- Posts: 2823
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
It is rather too old to be verified for this bug.
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13
Huawei MateBook 13
Re: Remote security exploit in all 2008+ Intel platforms
True, the article linked in the OP mentions Nehalem and above. Since I'm Penryn, hopefully I'm ok. But it's more likely that Lenovo doesn't expect people to be using xx00 series ThinkPads anymore.
T400 2764 CTO: T9900, 180 GB SSD, 8 GB 1066 MHz RAM, CCFL WXGA+, ATI dGPU, Intel 7260 AC, Windows 10 Home
T430 2342 CTO: i7-3632QM, 256 GB SSD + 500 GB Ultrabay HDD + 128 GB mSATA SSD, 16 GB 1600 MHz RAM, FHD mod (N140HCE-EN1 Rev.C4), NVIDIA dGPU, Intel 7260 AC, Windows 10 Pro/Linux Mint
T430 2342 CTO: i7-3632QM, 256 GB SSD + 500 GB Ultrabay HDD + 128 GB mSATA SSD, 16 GB 1600 MHz RAM, FHD mod (N140HCE-EN1 Rev.C4), NVIDIA dGPU, Intel 7260 AC, Windows 10 Pro/Linux Mint
Re: Remote security exploit in all 2008+ Intel platforms
Nice job on Lenovo for geting this out.,, they go above and beyond supporting 1st gen up.
It would be an act of god to support T400s.
My question would be does it affect units with whitelists?
I assume it writes to the portion of nvram rom etc that afffects ME so I hope it doesnt make me pull out wlan cards.
It would be an act of god to support T400s.
My question would be does it affect units with whitelists?
I assume it writes to the portion of nvram rom etc that afffects ME so I hope it doesnt make me pull out wlan cards.
Re: Remote security exploit in all 2008+ Intel platforms
I understood that the exploit is for certain versions of Intel ME. T410 and T420 use different versions. Montevina (T400,T500) uses an older version that I presume doesn't have the exploit.
sent from my iPhone
Registry Tweak To Enable 2 Finger Scroll On Old Synaptics Touchpads
Registry Tweak To Enable 2 Finger Scroll On Old Synaptics Touchpads
-
Puppy
- Senior ThinkPadder

- Posts: 2823
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
Eureka! The Intel Management Engine can be finally disabled, thanks to the NSA
https://www.notebookcheck.net/Eureka-Th ... 922.0.html
https://www.notebookcheck.net/Eureka-Th ... 922.0.html
ThinkPad (1992 - 2012): R51, X31, X220
Huawei MateBook 13
Huawei MateBook 13
-
RealBlackStuff
- Admin Emeritus
- Posts: 24727
- Joined: Mon Sep 18, 2006 5:17 am
- Location: Loch Garman, Éire
Re: Remote security exploit in all 2008+ Intel platforms
The ME_Cleaner is already being updated: https://github.com/corna/me_cleaner/issues/53
Nicola Corna already suspected that bit, which has now been confirmed.
Nicola Corna already suspected that bit, which has now been confirmed.
-
- Similar Topics
- Replies
- Views
- Last post
-
-
Bios errors on T41 - 0187 EAIA and 0191 system security
by Glaurung-quena » Sun Jan 04, 2026 9:24 am » in ThinkPad T40/T41/T42/T43 Series - 2 Replies
- 4576 Views
-
Last post by Glaurung-quena
Mon Jan 26, 2026 7:07 pm
-
-
-
Intel 3946ABG on my ThinkPad x131e is not being detected
by whitepainted » Mon Dec 15, 2025 9:23 am » in ThinkPad X100e/X120e/X130e/X140e Series - 2 Replies
- 4430 Views
-
Last post by axur-delmeria
Tue Dec 16, 2025 1:57 am
-
-
-
M.2 SSD in P14s Gen 3 (Intel) (21AK)'s WWAN slot
by usescomputers » Sat Jan 24, 2026 5:57 am » in ThinkPad P1/P14/P15/P16/P40/P50/P70 and later Series - 0 Replies
- 3955 Views
-
Last post by usescomputers
Sat Jan 24, 2026 5:57 am
-
-
-
[WTB] T61 14.1" 4:3 Intel Laptop or Motherboard
by HiFiGuy » Wed Feb 04, 2026 11:33 am » in Marketplace - Forum Members only - 2 Replies
- 3451 Views
-
Last post by HiFiGuy
Mon Feb 09, 2026 9:12 pm
-
Who is online
Users browsing this forum: No registered users and 80 guests




