Affects allmost all ThinkPads
Remote security exploit in all 2008+ Intel platforms
-
Puppy
- Senior ThinkPadder

- Posts: 2256
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Remote security exploit in all 2008+ Intel platforms
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8
-
Puppy
- Senior ThinkPadder

- Posts: 2256
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
Lenovo response https://support.lenovo.com/cz/cs/produc ... /len-14963
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8
Re: Remote security exploit in all 2008+ Intel platforms
In other words - if you don't actually use anything AMT/MEBx/LMS - you are OK? It's only that if you actually use ME features, you are vulnerable?Lenovo is urgently working on qualifying and applying the fixes provided by Intel on supported systems. Please continue to refer to this advisory to identify fixes as they are posted for your systems.
Options for mitigation until the firmware update is available are:
The network vulnerability can be mitigated by unprovisioning the Intel manageability SKU (AMT and ISM) or disabling the Intel manageability technology within the Intel® MEBx.
The local vulnerability can be mitigated by disabling or uninstalling Local Manageability Service (LMS) on Intel manageability SKUs (AMT, ISM, and SBT).
Note that capabilities and features provided by AMT, ISM, and SBT will be made unavailable when these mitigations are implemented.
Current: X220 4291-4BG, T410 2537-R46, T60 1952-F76, T60 2007-QPG, T42 2373-F7G
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
-
Puppy
- Senior ThinkPadder

- Posts: 2256
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
No
I spent several hours with the issue. Enabled it in BIOS and entered the setup via Ctrl+P but I haven't found any setting how to turn it off at all for sure. There are options for LAN IPv4, LAN IPv6 and Wi-Fi. You can turn it off for LAN IPv6 and Wi-Fi but the LAN IPv4 is still enabled, you can select DHCP or fixed IP only. Then I disabled it in BIOS again. I checked ports 16992 and 16993 according this from another machine on my home network.
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8
-
RealBlackStuff
- Admin
- Posts: 17485
- Joined: Mon Sep 18, 2006 5:17 am
- Location: Mt. Cobb, PA USA
- Contact:
Re: Remote security exploit in all 2008+ Intel platforms
Here's how to get rid of Intel AMT: https://mattermedia.com/blog/disabling-intel-amt/
HTH.
HTH.
Lovely day for a Guinness! (The Real Black Stuff)
Check out The Boardroom for Parts, Mods and Other Services.
Check out The Boardroom for Parts, Mods and Other Services.
Re: Remote security exploit in all 2008+ Intel platforms
You cannot disable the ME FW component that runs in the BIOS. It runs even when the BIOS setting is disabled. However, my understanding, is that in this state, known as 'unprovisioned', it does not do much. In particular it does not even load the ME networking driver, and this is why the remote vulnerability should be mitigated in this situation.
Yeah, I'm "totally" going to install their software and enable AMT just to check if AMT is disabled.
And did it respond to these ports in any way? On my system, with AMT disabled in the BIOS, it shows nothing running on these (and other AMT ports). The LMS service is disabled.Puppy wrote: ↑Thu May 04, 2017 5:20 amI checked ports 16992 and 16993 according this from another machine on my home network.
That assume you have AMT running to begin with. I don't, and I don't wish to install it either. What is important to understand is that ME FW is not AMT. AMT is a full-stack solution, involving the firmware, and other software components. It requires certain configuration as well.RealBlackStuff wrote: ↑Thu May 04, 2017 6:24 amHere's how to get rid of Intel AMT: https://mattermedia.com/blog/disabling-intel-amt/
Current: X220 4291-4BG, T410 2537-R46, T60 1952-F76, T60 2007-QPG, T42 2373-F7G
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
-
Puppy
- Senior ThinkPadder

- Posts: 2256
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
No.
I also run ACUConfig /output console status despite of I don't have the AMT software and windows services installed and got:
Code: Select all
ACUConfig 11.1.0.75
X220: Starting to retrieve machine status...
Error: Host-based configuration is not currently available because the Local Manageability Service (LMS.exe) is not running on the system.
Host information - X220
UUID ...
Intel(R) AMT version - 7.1.20
The system is unconfigured.
The system TLS setup is using PKI.
Host-based configuration is not currently available because the Local Manageability Service (LMS.exe) is not running on the system.
AMT state - Pre-Provision(0)
***********
Exit with code 5 - Call to function failed with return code
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8
Re: Remote security exploit in all 2008+ Intel platforms
You're probably fine.
Current: X220 4291-4BG, T410 2537-R46, T60 1952-F76, T60 2007-QPG, T42 2373-F7G
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
-
RealBlackStuff
- Admin
- Posts: 17485
- Joined: Mon Sep 18, 2006 5:17 am
- Location: Mt. Cobb, PA USA
- Contact:
Re: Remote security exploit in all 2008+ Intel platforms
And another bum-wiper, this time for Intel's ME: https://github.com/corna/me_cleaner
-
Puppy
- Senior ThinkPadder

- Posts: 2256
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
Lenovo has released ME firmware updates for most of machines, including .20 and .10 series ! https://support.lenovo.com/cz/cs/produc ... /len-14963
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8
Re: Remote security exploit in all 2008+ Intel platforms
Will installing libreboot for my T400 fix the problem? Or is that unable to fix ME?Puppy wrote: ↑Thu Jun 01, 2017 1:44 amLenovo has released ME firmware updates for most of machines, including .20 and .10 series ! https://support.lenovo.com/cz/cs/produc ... /len-14963
T400 2764 CTO: T9900, 180 GB SSD, 8 GB RAM, CCFL WXGA+, ATI GPU, Ultimate-N 6300, Windows 10 Home
T430 2342 CTO: i7-3520M, 256 GB SDD + 500 GB HDD + 128 GB mSATA, 8 GB RAM, HD+, NVIDIA GPU, Ultimate-N 6300, Windows 10 Pro/Linux Mint
T430 2342 CTO: i7-3520M, 256 GB SDD + 500 GB HDD + 128 GB mSATA, 8 GB RAM, HD+, NVIDIA GPU, Ultimate-N 6300, Windows 10 Pro/Linux Mint
Re: Remote security exploit in all 2008+ Intel platforms
The T400 is not listed so you can assume it is not affected by the " Remote security exploit ".
Make sure AMT is disabled in your BIOS regardless and any software to AMT is removed.
Make sure AMT is disabled in your BIOS regardless and any software to AMT is removed.
Active --- Love the X series
X301 SU9400 IDA Mod - W 7 - Main Driver
X201 540M - W 10 - Backup Driver
X61 T7500 - W 7 - Nostalgia
Spares
X301, T43's, T42
Rogue daily driver - Samsung RV511 15.6 " Screen - W 7
X301 SU9400 IDA Mod - W 7 - Main Driver
X201 540M - W 10 - Backup Driver
X61 T7500 - W 7 - Nostalgia
Spares
X301, T43's, T42
Rogue daily driver - Samsung RV511 15.6 " Screen - W 7
-
Puppy
- Senior ThinkPadder

- Posts: 2256
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: Remote security exploit in all 2008+ Intel platforms
It is rather too old to be verified for this bug.
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8
Re: Remote security exploit in all 2008+ Intel platforms
True, the article linked in the OP mentions Nehalem and above. Since I'm Penryn, hopefully I'm ok. But it's more likely that Lenovo doesn't expect people to be using xx00 series ThinkPads anymore.
T400 2764 CTO: T9900, 180 GB SSD, 8 GB RAM, CCFL WXGA+, ATI GPU, Ultimate-N 6300, Windows 10 Home
T430 2342 CTO: i7-3520M, 256 GB SDD + 500 GB HDD + 128 GB mSATA, 8 GB RAM, HD+, NVIDIA GPU, Ultimate-N 6300, Windows 10 Pro/Linux Mint
T430 2342 CTO: i7-3520M, 256 GB SDD + 500 GB HDD + 128 GB mSATA, 8 GB RAM, HD+, NVIDIA GPU, Ultimate-N 6300, Windows 10 Pro/Linux Mint
Re: Remote security exploit in all 2008+ Intel platforms
Nice job on Lenovo for geting this out.,, they go above and beyond supporting 1st gen up.
It would be an act of god to support T400s.
My question would be does it affect units with whitelists?
I assume it writes to the portion of nvram rom etc that afffects ME so I hope it doesnt make me pull out wlan cards.
It would be an act of god to support T400s.
My question would be does it affect units with whitelists?
I assume it writes to the portion of nvram rom etc that afffects ME so I hope it doesnt make me pull out wlan cards.
-
TPFanatic
- Senior Member

- Posts: 537
- Joined: Thu Jul 30, 2015 11:29 pm
- Location: Hudson, New Hampshire
Re: Remote security exploit in all 2008+ Intel platforms
I understood that the exploit is for certain versions of Intel ME. T410 and T420 use different versions. Montevina (T400,T500) uses an older version that I presume doesn't have the exploit.
Daily driver: lenovo T500 P9700, WUXGA, 8GB
Ultraportable: IBM lenovo X60s
Home theater: lenovo T420
Enable advanced features on older Synaptics touchpads with the registry: http://forum.thinkpads.com/viewtopic.php?f=2&t=122612
Ultraportable: IBM lenovo X60s
Home theater: lenovo T420
Enable advanced features on older Synaptics touchpads with the registry: http://forum.thinkpads.com/viewtopic.php?f=2&t=122612
-
- Similar Topics
- Replies
- Views
- Last post
-
-
Intel ME exploit patch for xx30 systems is being rolled out
by n4ru » Mon May 22, 2017 10:19 am » in ThinkPad T430/T530 and later Series - 0 Replies
- 126 Views
-
Last post by n4ru
Mon May 22, 2017 10:19 am
-
-
-
(Company + Individuals): Strategies to Mitigate Cyber Security Incidents
by RealBlackStuff » Tue Feb 07, 2017 9:40 am » in ** HOW TOs & FAQs ** - 1 Replies
- 743 Views
-
Last post by Digitalhorizons
Tue Feb 07, 2017 1:39 pm
-
-
-
A31 no post - 4 4 beep codes point to Security Chip?
by TPFanatic » Wed May 10, 2017 7:38 pm » in ThinkPad R, A, G and Z Series - 5 Replies
- 493 Views
-
Last post by kfzhu1229
Fri May 12, 2017 1:27 am
-
-
-
Microsoft Provides New Security Update For XP, Vista
by BillP » Sat May 13, 2017 2:14 pm » in Windows OS (Versions prior to Windows 7) - 3 Replies
- 477 Views
-
Last post by shawross
Mon May 15, 2017 4:56 am
-
Who is online
Users browsing this forum: No registered users and 3 guests




