Remote security exploit in all 2008+ Intel platforms

General Questions, Rumors, Real news & More
Post Reply
Message
Author
Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2256
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Remote security exploit in all 2008+ Intel platforms

#1 Post by Puppy » Mon May 01, 2017 6:51 pm

ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2256
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#2 Post by Puppy » Wed May 03, 2017 3:37 am

ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8

dr_st
Senior ThinkPadder
Senior ThinkPadder
Posts: 6646
Joined: Sat Oct 29, 2005 6:20 am

Re: Remote security exploit in all 2008+ Intel platforms

#3 Post by dr_st » Wed May 03, 2017 2:28 pm

Lenovo is urgently working on qualifying and applying the fixes provided by Intel on supported systems. Please continue to refer to this advisory to identify fixes as they are posted for your systems.

Options for mitigation until the firmware update is available are:

The network vulnerability can be mitigated by unprovisioning the Intel manageability SKU (AMT and ISM) or disabling the Intel manageability technology within the Intel® MEBx.
The local vulnerability can be mitigated by disabling or uninstalling Local Manageability Service (LMS) on Intel manageability SKUs (AMT, ISM, and SBT).

Note that capabilities and features provided by AMT, ISM, and SBT will be made unavailable when these mitigations are implemented.
In other words - if you don't actually use anything AMT/MEBx/LMS - you are OK? It's only that if you actually use ME features, you are vulnerable?
Current: X220 4291-4BG, T410 2537-R46, T60 1952-F76, T60 2007-QPG, T42 2373-F7G
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2256
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#4 Post by Puppy » Thu May 04, 2017 5:20 am

dr_st wrote:
Wed May 03, 2017 2:28 pm
In other words - if you don't actually use anything AMT/MEBx/LMS - you are OK? It's only that if you actually use ME features, you are vulnerable?
No :twisted: The thing is enabled by default in all machines with vPro support in CPU. It is also unknown whether disabling in BIOS actually turns it off. Some reports says it just resets it to default state with 'admin' password. Intel's solution requires the software, including (locally) vulnerable LMS windows service, installed in order to check whether it is active or not :roll:

I spent several hours with the issue. Enabled it in BIOS and entered the setup via Ctrl+P but I haven't found any setting how to turn it off at all for sure. There are options for LAN IPv4, LAN IPv6 and Wi-Fi. You can turn it off for LAN IPv6 and Wi-Fi but the LAN IPv4 is still enabled, you can select DHCP or fixed IP only. Then I disabled it in BIOS again. I checked ports 16992 and 16993 according this from another machine on my home network.
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8

RealBlackStuff
Admin
Admin
Posts: 17485
Joined: Mon Sep 18, 2006 5:17 am
Location: Mt. Cobb, PA USA
Contact:

Re: Remote security exploit in all 2008+ Intel platforms

#5 Post by RealBlackStuff » Thu May 04, 2017 6:24 am

Here's how to get rid of Intel AMT: https://mattermedia.com/blog/disabling-intel-amt/
HTH.
Lovely day for a Guinness! (The Real Black Stuff)

Check out The Boardroom for Parts, Mods and Other Services.

dr_st
Senior ThinkPadder
Senior ThinkPadder
Posts: 6646
Joined: Sat Oct 29, 2005 6:20 am

Re: Remote security exploit in all 2008+ Intel platforms

#6 Post by dr_st » Thu May 04, 2017 8:00 am

Puppy wrote:
Thu May 04, 2017 5:20 am
The thing is enabled by default in all machines with vPro support in CPU. It is also unknown whether disabling in BIOS actually turns it off. Some reports says it just resets it to default state with 'admin' password.
You cannot disable the ME FW component that runs in the BIOS. It runs even when the BIOS setting is disabled. However, my understanding, is that in this state, known as 'unprovisioned', it does not do much. In particular it does not even load the ME networking driver, and this is why the remote vulnerability should be mitigated in this situation.
Puppy wrote:
Thu May 04, 2017 5:20 am
Intel's solution requires the software, including (locally) vulnerable LMS windows service, installed in order to check whether it is active or not :roll:
Yeah, I'm "totally" going to install their software and enable AMT just to check if AMT is disabled. :P
Puppy wrote:
Thu May 04, 2017 5:20 am
I checked ports 16992 and 16993 according this from another machine on my home network.
And did it respond to these ports in any way? On my system, with AMT disabled in the BIOS, it shows nothing running on these (and other AMT ports). The LMS service is disabled.
RealBlackStuff wrote:
Thu May 04, 2017 6:24 am
Here's how to get rid of Intel AMT: https://mattermedia.com/blog/disabling-intel-amt/
That assume you have AMT running to begin with. I don't, and I don't wish to install it either. What is important to understand is that ME FW is not AMT. AMT is a full-stack solution, involving the firmware, and other software components. It requires certain configuration as well.
Current: X220 4291-4BG, T410 2537-R46, T60 1952-F76, T60 2007-QPG, T42 2373-F7G
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2256
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#7 Post by Puppy » Thu May 04, 2017 9:22 am

dr_st wrote:
Thu May 04, 2017 8:00 am
And did it respond to these ports in any way?
No.

I also run ACUConfig /output console status despite of I don't have the AMT software and windows services installed and got:

Code: Select all

ACUConfig 11.1.0.75
X220: Starting to retrieve machine status...
Error: Host-based configuration is not currently available because the Local Manageability Service (LMS.exe) is not running on the system.

Host information - X220
        UUID ...
        Intel(R) AMT version - 7.1.20
        The system is unconfigured.
        The system TLS setup is using PKI.
        Host-based configuration is not currently available because the Local Manageability Service (LMS.exe) is not running on the system.
        AMT state - Pre-Provision(0)
***********
Exit with code 5 - Call to function failed with return code
But it is not clear whether the reported AMT state Pre-Provision(0) is correct when the LMS service is not running.
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8

dr_st
Senior ThinkPadder
Senior ThinkPadder
Posts: 6646
Joined: Sat Oct 29, 2005 6:20 am

Re: Remote security exploit in all 2008+ Intel platforms

#8 Post by dr_st » Thu May 04, 2017 9:54 am

You're probably fine.
Current: X220 4291-4BG, T410 2537-R46, T60 1952-F76, T60 2007-QPG, T42 2373-F7G
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U

RealBlackStuff
Admin
Admin
Posts: 17485
Joined: Mon Sep 18, 2006 5:17 am
Location: Mt. Cobb, PA USA
Contact:

Re: Remote security exploit in all 2008+ Intel platforms

#9 Post by RealBlackStuff » Thu May 04, 2017 3:43 pm

And another bum-wiper, this time for Intel's ME: https://github.com/corna/me_cleaner

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2256
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#10 Post by Puppy » Thu Jun 01, 2017 1:44 am

Lenovo has released ME firmware updates for most of machines, including .20 and .10 series ! https://support.lenovo.com/cz/cs/produc ... /len-14963
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8

prophetic
Posts: 8
Joined: Tue Apr 26, 2016 12:57 pm
Location: PHX, AZ

Re: Remote security exploit in all 2008+ Intel platforms

#11 Post by prophetic » Sat Jun 03, 2017 10:47 am

Puppy wrote:
Thu Jun 01, 2017 1:44 am
Lenovo has released ME firmware updates for most of machines, including .20 and .10 series ! https://support.lenovo.com/cz/cs/produc ... /len-14963
Will installing libreboot for my T400 fix the problem? Or is that unable to fix ME?
T400 2764 CTO: T9900, 180 GB SSD, 8 GB RAM, CCFL WXGA+, ATI GPU, Ultimate-N 6300, Windows 10 Home

T430 2342 CTO: i7-3520M, 256 GB SDD + 500 GB HDD + 128 GB mSATA, 8 GB RAM, HD+, NVIDIA GPU, Ultimate-N 6300, Windows 10 Pro/Linux Mint

shawross
Junior Member
Junior Member
Posts: 259
Joined: Mon Oct 28, 2013 5:48 am
Location: Perth Aus / Thailand

Re: Remote security exploit in all 2008+ Intel platforms

#12 Post by shawross » Sat Jun 03, 2017 7:07 pm

The T400 is not listed so you can assume it is not affected by the " Remote security exploit ".

Make sure AMT is disabled in your BIOS regardless and any software to AMT is removed.
Active --- Love the X series
X301 SU9400 IDA Mod - W 7 - Main Driver
X201 540M - W 10 - Backup Driver
X61 T7500 - W 7 - Nostalgia

Spares
X301, T43's, T42

Rogue daily driver - Samsung RV511 15.6 " Screen - W 7

Puppy
Senior ThinkPadder
Senior ThinkPadder
Posts: 2256
Joined: Sat Oct 30, 2004 4:52 am
Location: Prague, Czech Republic

Re: Remote security exploit in all 2008+ Intel platforms

#13 Post by Puppy » Sun Jun 04, 2017 12:03 pm

shawross wrote:
Sat Jun 03, 2017 7:07 pm
The T400 is not listed so you can assume it is not affected by the " Remote security exploit ".
It is rather too old to be verified for this bug.
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8

prophetic
Posts: 8
Joined: Tue Apr 26, 2016 12:57 pm
Location: PHX, AZ

Re: Remote security exploit in all 2008+ Intel platforms

#14 Post by prophetic » Sun Jun 04, 2017 8:51 pm

shawross wrote:
Sat Jun 03, 2017 7:07 pm
The T400 is not listed so you can assume it is not affected by the " Remote security exploit ".

Make sure AMT is disabled in your BIOS regardless and any software to AMT is removed.
True, the article linked in the OP mentions Nehalem and above. Since I'm Penryn, hopefully I'm ok. But it's more likely that Lenovo doesn't expect people to be using xx00 series ThinkPads anymore.
T400 2764 CTO: T9900, 180 GB SSD, 8 GB RAM, CCFL WXGA+, ATI GPU, Ultimate-N 6300, Windows 10 Home

T430 2342 CTO: i7-3520M, 256 GB SDD + 500 GB HDD + 128 GB mSATA, 8 GB RAM, HD+, NVIDIA GPU, Ultimate-N 6300, Windows 10 Pro/Linux Mint

TonyJZX
Junior Member
Junior Member
Posts: 427
Joined: Sun Feb 19, 2006 12:33 am

Re: Remote security exploit in all 2008+ Intel platforms

#15 Post by TonyJZX » Mon Jun 05, 2017 5:59 am

Nice job on Lenovo for geting this out.,, they go above and beyond supporting 1st gen up.

It would be an act of god to support T400s.

My question would be does it affect units with whitelists?

I assume it writes to the portion of nvram rom etc that afffects ME so I hope it doesnt make me pull out wlan cards.

TPFanatic
Senior Member
Senior Member
Posts: 537
Joined: Thu Jul 30, 2015 11:29 pm
Location: Hudson, New Hampshire

Re: Remote security exploit in all 2008+ Intel platforms

#16 Post by TPFanatic » Mon Jun 05, 2017 11:02 am

I understood that the exploit is for certain versions of Intel ME. T410 and T420 use different versions. Montevina (T400,T500) uses an older version that I presume doesn't have the exploit.
Daily driver: lenovo T500 P9700, WUXGA, 8GB
Ultraportable: IBM lenovo X60s
Home theater: lenovo T420

Enable advanced features on older Synaptics touchpads with the registry: http://forum.thinkpads.com/viewtopic.php?f=2&t=122612

Post Reply
  • Similar Topics
    Replies
    Views
    Last post

Return to “GENERAL ThinkPad News/Comments & Questions”

Who is online

Users browsing this forum: No registered users and 3 guests