Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Intel Management Engine
Firmware and software that runs on all modern Intel CPUs at a higher level than user-facing operating system

The Intel Management Engine (ME) is an autonomous subsystem built into almost all of Intel’s processors and chipsets since 2008, embedded within the Platform Controller Hub on modern motherboards. It operates continuously whenever the motherboard receives power, even if the computer is off; however, this can be disabled by disconnecting all mains power and internal energy sources. The Electronic Frontier Foundation and security experts have expressed concerns that the ME could act as a backdoor. Intel’s competitor, AMD, includes a similar feature called AMD Secure Technology in most CPUs since 2013.

Difference from Intel AMT

The Management Engine is often confused with Intel AMT (Intel Active Management Technology). AMT runs on the ME, but is only available on processors with vPro. AMT gives device owners remote administration of their computer,6 such as powering it on or off, and reinstalling the operating system.

However, the ME itself has been built into all Intel chipsets since 2008, not only those with AMT. While AMT can be unprovisioned by the owner, there is no official, documented way to disable the ME.

Design

The subsystem primarily consists of proprietary firmware running on a separate microprocessor that performs tasks during boot-up, while the computer is running, and while it is asleep.7 As long as the chipset or SoC is supplied with power (via battery or power supply), it continues to run even when the system is turned off.8 Intel claims the ME is required to provide full performance.9 Its exact workings10 are largely undocumented11 and its code is obfuscated using confidential Huffman tables stored directly in hardware, so the firmware does not contain the information necessary to decode its contents.12

Hardware

Starting with ME 11 (introduced in Skylake CPUs), it is based on the Intel Quark x86-based 32-bit CPU and runs the MINIX 3 operating system.13 The ME firmware is stored in a partition of the SPI BIOS Flash, using the Embedded Flash File System (EFFS).14 Previous versions were based on an ARC core, with the Management Engine running the ThreadX RTOS. Versions 1.x to 5.x of the ME used the ARCTangent-A4 (32-bit only instructions) whereas versions 6.x to 8.x used the newer ARCompact (mixed 32- and 16-bit instruction set architecture). Starting with ME 7.1, the ARC processor could also execute signed Java applets.

The ME has its own MAC and IP address for the out-of-band management interface, with direct access to the Ethernet controller; one portion of the Ethernet traffic is diverted to the ME even before reaching the host's operating system, for what support exists in various Ethernet controllers, exported and made configurable via Management Component Transport Protocol (MCTP).1516 The ME also communicates with the host via PCI interface.17 Under Linux, communication between the host and the ME is done via /dev/mei or /dev/mei0.1819

Until the release of Nehalem processors, the ME was usually embedded into the motherboard's northbridge, following the Memory Controller Hub (MCH) layout.20 With the newer Intel architectures (Intel 5 Series onwards), the ME is integrated into the Platform Controller Hub (PCH).2122

Firmware

By Intel's current terminology as of 2017, ME is one of several firmware sets for the Converged Security and Manageability Engine (CSME). Prior to AMT version 11, CSME was called Intel Management Engine BIOS Extension (Intel MEBx).23

  • Management Engine (ME) – mainstream chipsets24
  • Server Platform Services (SPS) – server chipsets and SoCs252627
  • Trusted Execution Engine (TXE) – tablet/embedded/low power2829

It was also found that the ME firmware version 11 runs MINIX 3.3031 Management of the ME modules for provisioning inside the UEFI is done via a tool called Intel Flash Image Tool (FITC).

Modules

Security vulnerabilities

Several weaknesses have been found in the ME. On May 1, 2017, Intel confirmed a Remote Elevation of Privilege bug (SA-00075) in its Management Technology.44 Every Intel platform with provisioned Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME.4546 Several ways to disable the ME without authorization that could allow ME's functions to be sabotaged have been found.474849 Additional major security flaws in the ME affecting a very large number of computers incorporating ME, Trusted Execution Engine (TXE), and Server Platform Services (SPS) firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on 20 November 2017 (SA-00086).5051 Unlike SA-00075, this bug is even present if AMT is absent, not provisioned or if the ME was "disabled" by any of the known unofficial methods.52 In July 2018, another set of vulnerabilities was disclosed (SA-00112).53 In September 2018, yet another vulnerability was published (SA-00125).54

Ring −3 rootkit

A ring −3 rootkit was demonstrated by Invisible Things Lab for the Q35 chipset; it does not work for the later Q45 chipset as Intel implemented additional protections.55 The exploit worked by remapping the normally protected memory region (top 16 MB of RAM) reserved for the ME. The ME rootkit could be installed regardless of whether the AMT is present or enabled on the system, as the chipset always contains the ARC ME coprocessor. (The "−3" designation was chosen because the ME coprocessor works even when the system is in the S3 state. Thus, it was considered a layer below the System Management Mode rootkits.56) For the vulnerable Q35 chipset, a keystroke logger ME-based rootkit was demonstrated by Patrick Stewin.5758

Zero-touch provisioning

Another security evaluation by Vassilios Ververis showed serious weaknesses in the GM45 chipset implementation. In particular, it criticized AMT for transmitting unencrypted passwords in the SMB provisioning mode when the IDE redirection and Serial over LAN features are used. It also found that the "zero touch" provisioning mode (ZTC) is still enabled even when the AMT appears to be disabled in BIOS. For about 60 euros, Ververis purchased from GoDaddy a certificate that is accepted by the ME firmware and allows remote "zero touch" provisioning of (possibly unsuspecting) machines, which broadcast their HELLO packets to would-be configuration servers.59

SA-00075 (a.k.a. Silent Bob is Silent)

In May 2017, Intel confirmed that many computers with AMT have had an unpatched critical privilege escalation vulnerability (CVE-2017-5689).6061626364 The vulnerability was nicknamed "Silent Bob is Silent" by the researchers who had reported it to Intel.65 It affects numerous laptops, desktops and servers sold by Dell, Fujitsu, Hewlett-Packard (later Hewlett Packard Enterprise and HP Inc.), Intel, Lenovo, and possibly others.66676869707172 Those researchers claimed that the bug affects systems made in 2010 or later.73 Other reports claimed the bug also affects systems made as long ago as 2008.7475 The vulnerability was described as giving remote attackers:

"full control of affected machines, including the ability to read and modify everything. It can be used to install persistent malware (possibly in firmware), and read and modify any data."

— Tatu Ylönen, ssh.com76

PLATINUM

In June 2017, the PLATINUM cybercrime group became notable for exploiting the serial over LAN (SOL) capabilities of AMT to perform data exfiltration of stolen documents.7778798081828384 SOL is disabled by default and must be enabled to exploit this vulnerability.85

SA-00086

Some months after the previous bugs, and subsequent warnings from the EFF,86 security firm Positive Technologies claimed to have developed a working exploit.87 On 20 November 2017, Intel confirmed that a number of serious flaws had been found in the Management Engine (mainstream), Trusted Execution Engine (tablet/mobile), and Server Platform Services (high end server) firmware, and released a "critical firmware update".8889 Essentially, every Intel-based computer for the last several years, including most desktops and servers, were found to be vulnerable to having their security compromised, although all the potential routes of exploitation were not entirely known.90 It is not possible to patch the problems from the operating system, and a firmware (UEFI, BIOS) update to the motherboard is required, which was anticipated to take quite some time for the many individual manufacturers to accomplish, if it ever would be for many systems.91

Affected systems

Source:92

  • Intel Atom – C3000 family
  • Intel Atom – Apollo Lake E3900 series
  • Intel Celeron – N and J series
  • Intel Core (i3, i5, i7, i9) – 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, and 8th generation
  • Intel Pentium – Apollo Lake
  • Intel Xeon – E3-1200 v5 and v6 product family
  • Intel Xeon – Scalable family
  • Intel Xeon – W family

Mitigation

None of the known unofficial methods to disable the ME prevent exploitation of the vulnerability. A firmware update by the vendor is required. However, those who discovered the vulnerability note that firmware updates are not fully effective either, as an attacker with access to the ME firmware region can simply flash an old, vulnerable version and then exploit the bug.93

SA-00112

In July 2018, Intel announced that three vulnerabilities (CVE-2018-3628, CVE-2018-3629, CVE-2018-3632) had been discovered and that a patch for the CSME firmware would be required. Intel indicated there would be no patch for 3rd generation Core processors or earlier despite chips or their chipsets as far back as Intel Core 2 Duo vPro and Intel Centrino 2 vPro being affected. However, Intel AMT must be enabled and provisioned for the vulnerability to exist.9495

Assertions that ME is a backdoor

Critics like the Electronic Frontier Foundation (EFF), Libreboot developers, and security expert Damien Zammit accused the ME of being a backdoor and a privacy concern.9697 Zammit stresses that the ME has full access to memory (without the owner-controlled CPU cores having any knowledge), and has full access to the TCP/IP stack and can send and receive network packets independently of the operating system, thus bypassing its firewall.98

Intel responded by saying, "Intel does not put backdoors in its products, nor do our products give Intel control or access to computing systems without the explicit permission of the end user."99 and "Intel does not and will not design backdoors for access into its products. Recent reports claiming otherwise are misinformed and blatantly false. Intel does not participate in any efforts to decrease the security of its technology."100

Disabling the ME

It is normally not possible for the end-user to disable the ME and there is no officially supported method to disable it, but some undocumented methods to do so were discovered.101 The ME's security architecture is designed to prevent disabling. Intel considers disabling the ME to be a security vulnerability, as a malware could abuse it to make the computer lose some of the functionality that the typical user expects, such as the ability to play media with DRM, specifically DRM media that is using HDCP.102103 On the other hand, it is also possible for malicious actors to use the ME to remotely compromise a system.

Strictly speaking, none of the known methods can disable the ME completely, since it is required for booting the main CPU. The currently known methods merely make the ME go into abnormal states soon after boot, in which it seems not to have any working functionality. The ME is still physically connected to the system and its microprocessor continues to execute code. Some manufacturers like Purism and System76 disable the Intel Management Engine.104105

Undocumented methods

Firmware neutralization

In 2016, the me_cleaner project found that the ME's integrity verification is broken. The ME is supposed to detect that it has been tampered with and, if this is the case, shut down the PC forcibly 30 minutes after system start.106 This prevents a compromised system from running undetected, yet allows the owner to fix the issue by flashing a valid version of the ME firmware during the grace period. As the project found out, by making unauthorized changes to the ME firmware, it was possible to force it into an abnormal error state that prevented triggering the shutdown even if large parts of the firmware had been overwritten and thus made inoperable.

"High Assurance Platform" mode

In August 2017, Positive Technologies (Dmitry Sklyarov) published a method to disable the ME via an undocumented built-in mode. As Intel has confirmed107 the ME contains a switch to enable government authorities such as the NSA to make the ME go into High-Assurance Platform (HAP) mode after boot. This mode disables most of ME's functions,108109 and was intended to be available only in machines produced for specific purchasers like the US government; however, most machines sold on the retail market can be made to activate the switch.110111 Manipulation of the HAP bit was quickly incorporated into the me_cleaner project.112

Commercial ME disablement

From late 2017 on, several laptop vendors announced their intentions to ship laptops with the Intel ME disabled or let the end-users disable it manually:

  • Minifree Ltd has provided Libreboot pre-loaded laptops with Intel ME either not present or disabled since at least 2015.113114115
  • Purism previously petitioned Intel to sell processors without the ME, or release its source code, calling it "a threat to users' digital rights".116 In March 2017, Purism announced that it had neutralized the ME by erasing the majority of the ME code from the flash memory.117 It further announced in October 2017118 that new batches of their Librem line of laptops running PureOS will ship with the ME neutralized, and additionally disable most ME operation via the HAP bit. Updates for existing Librem laptops were also announced.
  • In November, System76 announced their plan to disable the ME on their new and recent machines which ship with Pop!_OS via the HAP bit.119
  • In December, Dell began showing certain laptops on its website that offered the "Systems Management" option "Intel vPro - ME Inoperable, Custom Order" for an additional fee. Dell has not announced or publicly explained the methods used. In response to press requests, Dell stated that those systems had been offered for quite a while, but not for the general public, and had found their way to the website only inadvertently.120 The laptops are available only by custom order and only to military, government and intelligence agencies.121 They are specifically designed for covert operations, such as providing a very robust case and a "stealth" operating mode kill switch that disables display, LED lights, speaker, fan and any wireless technology.122
  • In March 2018, Tuxedo Computers, a German company which specializes in PCs which run Linux kernel-based operating systems, announced an option in the BIOS of their system to disable ME.123

Effectiveness against vulnerabilities

Neither of the two methods to disable the ME discovered so far turned out to be an effective countermeasure against the SA-00086 vulnerability.124 This is because the vulnerability is in an early-loaded ME module that is essential to boot the main CPU.

Reactions

By Google

As of 2017, Google was attempting to eliminate proprietary firmware from its servers and found that the ME was a hurdle to that.125

By AMD processor vendors

Shortly after SA-00086 was patched, vendors for AMD processor mainboards started shipping BIOS updates that allow disabling the AMD Platform Security Processor,126 a subsystem with a similar function as the ME.

See also

References

  1. Oster, Joseph E. (September 3, 2019). "Getting Started with Intel Active Management Technology (Intel AMT)". Intel. Retrieved September 22, 2020. https://software.intel.com/en-us/articles/getting-started-with-intel-active-management-technology-amt

  2. "Intel AMT and the Intel ME". Intel. Archived from the original on February 21, 2019. https://web.archive.org/web/20190221093441/https://software.intel.com/en-us/blogs/2011/12/14/intelr-amt-and-the-intelr-me/

  3. Oster, Joseph E. (September 3, 2019). "Getting Started with Intel Active Management Technology (Intel AMT)". Intel. Retrieved September 22, 2020. https://software.intel.com/en-us/articles/getting-started-with-intel-active-management-technology-amt

  4. "Frequently Asked Questions for the Intel Management Engine Verification Utility". Built into many Intel Chipset–based platforms is a small, low-power computer subsystem called the Intel Management Engine (Intel ME). https://www.intel.com/content/www/us/en/support/articles/000005974/software/chipset-software.html

  5. Portnoy, Erica; Eckersley, Peter (May 8, 2017). "Intel's Management Engine is a security hazard, and users need a way to disable it". Electronic Frontier Foundation. Retrieved February 21, 2020. https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it

  6. Wallen, Jack (July 1, 2016). "Is the Intel Management Engine a backdoor?". https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/

  7. "Frequently Asked Questions for the Intel Management Engine Verification Utility". The Intel ME performs various tasks while the system is in sleep, during the boot process, and when your system is running. https://www.intel.com/content/www/us/en/support/articles/000005974/software/chipset-software.html

  8. "Black Hat Europe 2017". BlackHat.com. https://www.blackhat.com/eu-17/briefings/schedule/#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668

  9. "Frequently Asked Questions for the Intel Management Engine Verification Utility". This subsystem must function correctly to get the most performance and capability from your PC. https://www.intel.com/content/www/us/en/support/articles/000005974/software/chipset-software.html

  10. Hoffman, Chris (November 22, 2017). "Intel Management Engine, Explained: The Tiny Computer Inside Your CPU". How-To Geek. https://www.howtogeek.com/334013/intel-management-engine-explained-the-tiny-computer-inside-your-cpu/

  11. Eckersley, Erica Portnoy and Peter (May 8, 2017). "Intel's Management Engine is a security hazard, and users need a way to disable it". Electronic Frontier Foundation. https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it

  12. "Intel ME huffman dictionaries - Unhuffme v2.4". IO.NetGarage.org. http://io.netgarage.org/me/

  13. "Positive Technologies Blog: Disabling Intel ME 11 via undocumented mode". Archived from the original on August 28, 2017. Retrieved August 30, 2017. https://web.archive.org/web/20170828150536/http://blog.ptsecurity.com/2017/08/disabling-intel-me.html

  14. Igor Skochinsky (Hex-Rays) Rootkit in your laptop, Ruxcon Breakpoint 2012 /wiki/Hex-Rays

  15. "Intel Ethernet Controller I210 Datasheet" (PDF). Intel. 2013. pp. 1, 15, 52, 621–776. Retrieved November 9, 2013. http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/i210-ethernet-controller-datasheet.pdf

  16. "Intel Ethernet Controller X540 Product Brief" (PDF). Intel. 2012. Retrieved February 26, 2014. http://www.intel.com/content/dam/www/public/us/en/documents/product-briefs/ethernet-x540-brief.pdf

  17. Igor Skochinsky (Hex-Rays) Rootkit in your laptop, Ruxcon Breakpoint 2012 /wiki/Hex-Rays

  18. "Archived copy". Archived from the original on November 1, 2014. Retrieved February 25, 2014.{{cite web}}: CS1 maint: archived copy as title (link) https://web.archive.org/web/20141101045709/https://www.kernel.org/doc/Documentation/misc-devices/mei/mei.txt

  19. "Introduction — The Linux Kernel documentation". Kernel.org. https://www.kernel.org/doc/html/latest/driver-api/mei/mei.html

  20. Rutkowska, Joanna. "A Quest to the Core" (PDF). Invisiblethingslab.com. Retrieved May 25, 2016. http://invisiblethingslab.com/resources/misc09/Quest%20To%20The%20Core%20%28public%29.pdf

  21. "Archived copy" (PDF). Archived from the original (PDF) on February 11, 2014. Retrieved February 26, 2014.{{cite web}}: CS1 maint: archived copy as title (link) https://web.archive.org/web/20140211075753/http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/celeron-mobile-p4000-u3000-datasheet.pdf

  22. "Platforms II" (PDF). Users.nik.uni-obuda.hu. Retrieved May 25, 2016. http://users.nik.uni-obuda.hu/sima/letoltes/magyar/SZA2011_osz/nappali/Platforms-3_E_2011_12_14.ppt

  23. Oster, Joseph E. (September 3, 2019). "Getting Started with Intel Active Management Technology (Intel AMT)". Intel. Retrieved September 22, 2020. https://software.intel.com/en-us/articles/getting-started-with-intel-active-management-technology-amt

  24. "FatTwin F618R3-FT+ F618R3-FTPT+ User's Manual" (PDF). Super Micro. The Manageability Engine, which is an ARC controller embedded in the IOH (I/O Hub), provides Server Platform Services (SPS) to your system. The services provided by SPS are different from those provided by the ME on client platforms. https://www.supermicro.com/manuals/superserver/4U/MNL-1765.pdf

  25. "Intel Xeon Processor E3-1200 v6 Product Family Product Brief". Intel. Intel Server Platform Services (Intel SPS): Designed for managing rack-mount servers, Intel Server Platform Services provides a suite of tools to control and monitor power, thermal, and resource utilization. https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200-v6-family-brief.html

  26. "FatTwin F618R3-FT+ F618R3-FTPT+ User's Manual" (PDF). Super Micro. The Manageability Engine, which is an ARC controller embedded in the IOH (I/O Hub), provides Server Platform Services (SPS) to your system. The services provided by SPS are different from those provided by the ME on client platforms. https://www.supermicro.com/manuals/superserver/4U/MNL-1765.pdf

  27. "Intel Xeon Processor D-1500 Product Family" (PDF). Intel. https://www.intel.com/content/dam/www/public/us/en/documents/platform-briefs/xeon-processor-d-platform-brief.pdf

  28. "Intel Trusted Execution Engine Driver". Dell. This package provides the drivers for the Intel Trusted Execution Engine and is supported on Dell Venue 11 Pro 5130 Tablet https://www.dell.com/support/home/us/en/19/drivers/driversdetails?driverId=K9HM7

  29. "Intel Trusted Execution Engine Driver for Intel NUC Kit NUC5CPYH, NUC5PPYH, NUC5PGYH". Intel. Installs the Intel Trusted Execution Engine (Intel TXE) driver and firmware for Windows 10 and Windows 7*/8.1*, 64-bit. The Intel TXE driver is required for Secure Boot and platform security features. https://downloadcenter.intel.com/download/24892/Intel-Trusted-Execution-Engine-Driver-for-Intel-NUC-Kit-NUC5CPYH-NUC5PPYH-NUC5PGYH

  30. "Positive Technologies Blog: Disabling Intel ME 11 via undocumented mode". Archived from the original on August 28, 2017. Retrieved August 30, 2017. https://web.archive.org/web/20170828150536/http://blog.ptsecurity.com/2017/08/disabling-intel-me.html

  31. Positive Technologies Blog:The Way of the Static Analysis https://www.troopers.de/downloads/troopers17/TR17_ME11_Static.pdf

  32. "Intel AMT and the Intel ME". Intel. Archived from the original on February 21, 2019. https://web.archive.org/web/20190221093441/https://software.intel.com/en-us/blogs/2011/12/14/intelr-amt-and-the-intelr-me/

  33. "Intel Hardware-based Security Technologies for Intelligent Retail Devices" (PDF). Intel. https://www.intel.com/content/dam/www/public/us/en/documents/white-papers/security-technologies-4th-gen-core-retail-paper.pdf

  34. "Intel Trusted Execution Engine Driver for Intel NUC Kit NUC5CPYH, NUC5PPYH, NUC5PGYH". Intel. Installs the Intel Trusted Execution Engine (Intel TXE) driver and firmware for Windows 10 and Windows 7*/8.1*, 64-bit. The Intel TXE driver is required for Secure Boot and platform security features. https://downloadcenter.intel.com/download/24892/Intel-Trusted-Execution-Engine-Driver-for-Intel-NUC-Kit-NUC5CPYH-NUC5PPYH-NUC5PGYH

  35. "Intel Quiet System Technology 2.0: Programmer's Reference Manual" (PDF). Intel. February 2010. Retrieved August 25, 2014. https://software.intel.com/sites/default/files/af/73/Intel_QST_Programmers_Reference_Manual.pdf

  36. "The Intel Management Engine – a Privacy Nightmare". ProPrivacy.com. https://proprivacy.com/privacy-news/intel-management-engine

  37. "Intel ME huffman dictionaries - Unhuffme v2.4". IO.NetGarage.org. http://io.netgarage.org/me/

  38. September 2012, Patrick Kennedy 21 (September 21, 2012). "Intel vPro In 2012, Small Business Advantage, And Anti-Theft Tech". Tom's Hardware.{{cite web}}: CS1 maint: numeric names: authors list (link) https://www.tomshardware.com/reviews/vpro-anti-theft-small-business-advantage,3259.html

  39. "McAfee KB - End of Life for McAfee/Intel Anti-Theft (TS101986)". service.mcafee.com. Archived from the original on August 1, 2020. Retrieved September 10, 2020. https://web.archive.org/web/20200801222002/https://service.mcafee.com/webcenter/portal/oracle/webcenter/page/scopedMD/s55728c97_466d_4ddb_952d_05484ea932c6/Page29.jspx?wc.contextURL=%2Fspaces%2Fcp&articleId=TS101986&leftWidth=0%25&showFooter=false&showHeader=false&rightWidth=0%25¢erWidth=100%25&_afrLoop=383304777056094#!@@?showFooter=false&_afrLoop=383304777056094&articleId=TS101986&leftWidth=0%2525&showHeader=false&wc.contextURL=%252Fspaces%252Fcp&rightWidth=0%2525¢erWidth=100%2525&_adf.ctrl-state=o56hl18tm_9

  40. "Using Intel AMT serial-over-LAN to the fullest". Intel. https://software.intel.com/en-us/articles/using-intel-amt-serial-over-lan-to-the-fullest

  41. "Intel Hardware-based Security Technologies for Intelligent Retail Devices" (PDF). Intel. https://www.intel.com/content/dam/www/public/us/en/documents/white-papers/security-technologies-4th-gen-core-retail-paper.pdf

  42. "How To Enable BitLocker With Intel PTT and No TPM For Better Security". Legit Reviews. May 8, 2019. Retrieved September 8, 2020. https://www.legitreviews.com/how-to-enable-bitlocker-with-intel-ptt-and-no-tpm-for-better-security_211713

  43. "MEI NFC". https://www.kernel.org/doc/html/latest/driver-api/mei/nfc.html

  44. "Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Escalation of Privilege". Intel.com. March 17, 2020. Retrieved September 22, 2020. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00075.html

  45. Charlie Demerjian (May 1, 2017). "Remote security exploit in all 2008+ Intel platforms". SemiAccurate. Retrieved May 7, 2017. https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/

  46. "Red alert! Intel patches remote execution hole that's been hidden in chips since 2010". TheRegister.co.uk. Retrieved May 7, 2017. https://www.theregister.co.uk/2017/05/01/intel_amt_me_vulnerability/

  47. Alaoui, Youness (October 19, 2017). "Deep dive into Intel Management Engine disablement". https://puri.sm/posts/deep-dive-into-intel-me-disablement/

  48. Alaoui, Youness (March 9, 2017). "Neutralizing the Intel Management Engine on Librem Laptops". https://puri.sm/posts/neutralizing-intel-management-engine-on-librem-laptops/

  49. "Positive Technologies Blog: Disabling Intel ME 11 via undocumented mode". Archived from the original on August 28, 2017. Retrieved August 30, 2017. https://web.archive.org/web/20170828150536/http://blog.ptsecurity.com/2017/08/disabling-intel-me.html

  50. "Intel Patches Major Flaws in the Intel Management Engine". Extreme Tech. https://www.extremetech.com/computing/259426-intel-patches-major-flaws-intel-management-engine

  51. Claburn, Thomas (November 20, 2017). "Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets". The Register. https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/

  52. "Intel Management Engine pwned by buffer overflow". TheRegister.com. https://www.theregister.com/2017/12/06/intel_management_engine_pwned_by_buffer_overflow/

  53. "INTEL-SA-00112". Intel. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html

  54. "INTEL-SA-00125". Intel. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00125.html

  55. "Invisible Things Lab to present two new technical presentations disclosing system-level vulnerabilities affecting modern PC hardware at its core" (PDF). Invisiblethingslab.com. Archived from the original (PDF) on April 12, 2016. Retrieved May 25, 2016. https://web.archive.org/web/20160412045958/http://invisiblethingslab.com/press/itl-press-2009-03.pdf

  56. Rutkowska, Joanna. "A Quest to the Core" (PDF). Invisiblethingslab.com. Retrieved May 25, 2016. http://invisiblethingslab.com/resources/misc09/Quest%20To%20The%20Core%20%28public%29.pdf

  57. "FG Security in telecommunications : Evaluating "Ring-3" Rootkits" (PDF). Stewin.org. Archived from the original (PDF) on March 4, 2016. Retrieved May 25, 2016. https://web.archive.org/web/20160304033404/http://www.stewin.org/slides/pstewin-SPRING6-EvaluatingRing-3Rootkits.pdf

  58. "Persistent, Stealthy Remote-controlled Dedicated Hardware Malware" (PDF). Stewin.org. Archived from the original (PDF) on March 3, 2016. Retrieved May 25, 2016. https://web.archive.org/web/20160303222145/http://stewin.org/slides/44con_2013-dedicated_hw_malware-stewin_bystrov.pdf

  59. "Security Evaluation of Intel's Active Management Technology" (PDF). Web.it.kth.se. Retrieved May 25, 2016. http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100402-Vassilios_Ververis-with-cover.pdf

  60. "Red alert! Intel patches remote execution hole that's been hidden in chips since 2010". TheRegister.co.uk. Retrieved May 7, 2017. https://www.theregister.co.uk/2017/05/01/intel_amt_me_vulnerability/

  61. "CVE - CVE-2017-5689". Cve.mitre.org. Archived from the original on May 5, 2017. Retrieved May 7, 2017. https://web.archive.org/web/20170505125225/http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5689

  62. "Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Escalation of Privilege". Intel.com. March 17, 2020. Retrieved September 22, 2020. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00075.html

  63. "Intel Hidden Management Engine - x86 Security Risk?". Darknet. June 16, 2016. Retrieved May 7, 2017. https://www.darknet.org.uk/2016/06/intel-hidden-management-engine-x86-security-risk/

  64. Garrett, Matthew (May 1, 2017). "Intel's remote AMT vulnerablity". mjg59.dreamwidth.org. Retrieved May 7, 2017. https://mjg59.dreamwidth.org/48429.html

  65. "2017-05-05 ALERT! Intel AMT EXPLOIT OUT! IT'S BAD! DISABLE AMT NOW!". Ssh.com\Accessdate=2017-05-07. Archived from the original on March 5, 2018. Retrieved November 25, 2017. https://web.archive.org/web/20180305001456/https://www.ssh.com/vulnerability/intel-amt/

  66. "2017-05-05 ALERT! Intel AMT EXPLOIT OUT! IT'S BAD! DISABLE AMT NOW!". Ssh.com\Accessdate=2017-05-07. Archived from the original on March 5, 2018. Retrieved November 25, 2017. https://web.archive.org/web/20180305001456/https://www.ssh.com/vulnerability/intel-amt/

  67. Dan Goodin (May 6, 2017). "The Hijacking Flaw That Lurked in Intel Chips Is Worse than Anyone Thought". Ars Technica. Retrieved May 8, 2017. https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/

  68. "General: BIOS updates due to Intel AMT IME vulnerability - General Hardware - Laptop - Dell Community". En.Community.Dell.com. May 2, 2017. Archived from the original on May 11, 2017. Retrieved May 7, 2017. https://web.archive.org/web/20170511075221/http://en.community.dell.com/support-forums/laptop/f/3518/t/20011662

  69. "Advisory note: Intel Firmware vulnerability – Fujitsu Technical Support pages from Fujitsu Fujitsu Continental Europe, Middle East, Africa & India". Support.ts.fujitsu.com. May 1, 2017. Retrieved May 8, 2017. http://support.ts.fujitsu.com/content/Intel_Firmware.asp

  70. "HPE | HPE CS700 2.0 for VMware". H22208.www2.hpe.com. May 1, 2017. Archived from the original on May 8, 2017. Retrieved May 7, 2017. https://web.archive.org/web/20170508041543/http://h22208.www2.hpe.com/eginfolib/securityalerts/CVE-2017-5689-Intel/CVE-2017-5689.html

  71. "Intel Security Advisory regarding escalation o... |Intel Communities". Communities.Intel.com. May 4, 2017. Retrieved May 7, 2017. https://communities.intel.com/thread/114071

  72. "Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Remote Privilege Escalation". Support.lenovo.com. Retrieved May 7, 2017. https://support.lenovo.com/us/en/product_security/LEN-14963

  73. "MythBusters: CVE-2017-5689". Embedi.com. May 2, 2017. Archived from the original on August 17, 2018. https://web.archive.org/web/20180817215423/https://embedi.com/news/mythbusters-cve-2017-5689

  74. Charlie Demerjian (May 1, 2017). "Remote security exploit in all 2008+ Intel platforms". SemiAccurate.com. Retrieved May 7, 2017. https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/

  75. "Red alert! Intel patches remote execution hole that's been hidden in chips since 2010". TheRegister.co.uk. Retrieved May 7, 2017. https://www.theregister.co.uk/2017/05/01/intel_amt_me_vulnerability/

  76. "2017-05-05 ALERT! Intel AMT EXPLOIT OUT! IT'S BAD! DISABLE AMT NOW!". Ssh.com\Accessdate=2017-05-07. Archived from the original on March 5, 2018. Retrieved November 25, 2017. https://web.archive.org/web/20180305001456/https://www.ssh.com/vulnerability/intel-amt/

  77. "Sneaky hackers use Intel management tools to bypass Windows firewall". June 9, 2017. Retrieved June 10, 2017. https://arstechnica.com/security/2017/06/sneaky-hackers-use-intel-management-tools-to-bypass-windows-firewall/

  78. Tung, Liam. "Windows firewall dodged by 'hot-patching' spies using Intel AMT, says Microsoft - ZDNet". ZDNet. Retrieved June 10, 2017. https://www.zdnet.com/article/windows-firewall-dodged-by-hot-patching-spies-using-intel-amt-says-microsoft/

  79. "PLATINUM continues to evolve, find ways to maintain invisibility". June 7, 2017. Retrieved June 10, 2017. https://blogs.technet.microsoft.com/mmpc/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/

  80. "Malware Uses Obscure Intel CPU Feature to Steal Data and Avoid Firewalls". Retrieved June 10, 2017. https://www.bleepingcomputer.com/news/security/malware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls/

  81. "Hackers abuse low-level management feature for invisible backdoor". iTnews. Retrieved June 10, 2017. https://www.itnews.com.au/news/hackers-abuse-low-level-management-feature-for-invisible-backdoor-464499

  82. "Vxers exploit Intel's Active Management for malware-over-LAN • The Register". TheRegister.co.uk. Retrieved June 10, 2017. https://www.theregister.co.uk/AMP/2017/06/08/vxers_exploit_intels_amt_for_malwareoverlan/

  83. Security, heise (June 9, 2017). "Intel-Fernwartung AMT bei Angriffen auf PCs genutzt". Security. Retrieved June 10, 2017. https://www.heise.de/security/meldung/Intel-Fernwartung-AMT-bei-Angriffen-auf-PCs-genutzt-3739441.html

  84. "PLATINUM activity group file-transfer method using Intel AMT SOL". Channel 9. Retrieved June 10, 2017. https://channel9.msdn.com/Shows/Windows-Security-Blog/PLATINUM-activity-group-file-transfer-method-using-Intel-AMT-SOL

  85. "Malware Uses Obscure Intel CPU Feature to Steal Data and Avoid Firewalls". BleepingComputer. https://www.bleepingcomputer.com/news/security/malware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls/

  86. Portnoy, Erica; Eckersley, Peter (May 8, 2017). "Intel's Management Engine is a security hazard, and users need a way to disable it". Electronic Frontier Foundation. Retrieved February 21, 2020. https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it

  87. "Black Hat Europe 2017". BlackHat.com. https://www.blackhat.com/eu-17/briefings/schedule/#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668

  88. "Intel Management Engine Critical Firmware Update (Intel SA-00086)". Intel. https://www.intel.com/content/www/us/en/support/articles/000025619/software.html

  89. Newman, Lily Hay. "Intel Chip Flaws Leave Millions of Devices Exposed". Wired. https://www.wired.com/story/intel-management-engine-vulnerabilities-pcs-servers-iot/

  90. Newman, Lily Hay. "Intel Chip Flaws Leave Millions of Devices Exposed". Wired. https://www.wired.com/story/intel-management-engine-vulnerabilities-pcs-servers-iot/

  91. "Intel Patches Major Flaws in the Intel Management Engine". Extreme Tech. https://www.extremetech.com/computing/259426-intel-patches-major-flaws-intel-management-engine

  92. "Intel Management Engine Critical Firmware Update (Intel SA-00086)". Intel. https://www.intel.com/content/www/us/en/support/articles/000025619/software.html

  93. "Intel Management Engine pwned by buffer overflow". TheRegister.com. https://www.theregister.com/2017/12/06/intel_management_engine_pwned_by_buffer_overflow/

  94. "INTEL-SA-00112". Intel. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html

  95. "Intel Active Management Technology 9.x/10.x/11.x Security Review..." Intel. https://www.intel.com/content/www/ca/en/support/articles/000029388/software/chipset-software.html

  96. Cimpanu, Catalin (June 17, 2016). "Intel x86 CPUs Come with a Secret Backdoor That Nobody Can Touch or Disable". softpedia. https://news.softpedia.com/news/intel-x86-cpus-come-with-a-secret-backdoor-that-nobody-can-touch-or-disable-505347.shtml

  97. Portnoy, Erica; Eckersley, Peter (May 8, 2017). "Intel's Management Engine is a security hazard, and users need a way to disable it". Electronic Frontier Foundation. Retrieved February 21, 2020. https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it

  98. Wallen, Jack (July 1, 2016). "Is the Intel Management Engine a backdoor?". https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/

  99. Wallen, Jack (July 1, 2016). "Is the Intel Management Engine a backdoor?". https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/

  100. "Intel ME controller chip has secret kill switch". TheRegister.com. https://www.theregister.com/2017/08/29/intel_management_engine_can_be_disabled/

  101. "Intel Patches Major Flaws in the Intel Management Engine". Extreme Tech. https://www.extremetech.com/computing/259426-intel-patches-major-flaws-intel-management-engine

  102. "HDCP 2.2 Content Protection Being Worked On For The i915 DRM Driver". https://www.phoronix.com/news/HDCP-2.2-For-i915-DRM

  103. "HDCP 2.2 Support Updated For The Intel DRM Linux Driver". https://www.phoronix.com/news/HDCP-2.2-Intel-Linux-Driver

  104. "What is Intel Management Engine and what are concerns with it regarding Librem laptops?". September 27, 2018. https://puri.sm/faq/what-is-intel-management-engine-and-what-are-concerns-with-it-regarding-librem-laptops/

  105. "Major Updates for System76 Open Firmware!". June 2, 2023. https://blog.system76.com/post/major-updates-for-system76-open-firmware-june-2023

  106. "corna/me_cleaner". September 10, 2020 – via GitHub. https://github.com/corna/me_cleaner

  107. "Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA". BleepingComputer. https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/

  108. "Intel ME controller chip has secret kill switch". TheRegister.com. https://www.theregister.com/2017/08/29/intel_management_engine_can_be_disabled/

  109. Research, Author Positive. "Disabling Intel ME 11 via undocumented mode". Archived from the original on December 1, 2020. {{cite web}}: |first= has generic name (help) https://web.archive.org/web/20201201175708/http://blog.ptsecurity.com/2017/08/disabling-intel-me.html?m=1

  110. Research, Author Positive. "Disabling Intel ME 11 via undocumented mode". Archived from the original on December 1, 2020. {{cite web}}: |first= has generic name (help) https://web.archive.org/web/20201201175708/http://blog.ptsecurity.com/2017/08/disabling-intel-me.html?m=1

  111. "corna/me_cleaner". GitHub. March 19, 2022. https://github.com/corna/me_cleaner

  112. "Set the HAP bit (ME >= 11) or the AltMeDisable bit (ME < 11) · corna/me_cleaner@ced3b46". GitHub. https://github.com/corna/me_cleaner/commit/ced3b46ba2ccd74602b892f9594763ef34671652

  113. "Libreboot T400 laptop now FSF-certified to respect your freedom — Free Software Foundation — Working together for free software". www.fsf.org. Retrieved April 30, 2023. https://www.fsf.org/news/libreboot-t400-laptop-now-fsf-certified-to-respect-your-freedom

  114. Bärwaldt, Erik. "Liberated » Linux Magazine". Linux Magazine. Retrieved April 30, 2023. http://www.linux-magazine.com/Issues/2018/210/Free-Firmware-with-Libreboot

  115. Biggs, John (August 11, 2017). "The Minifree Libreboot T400 is free as in freedom". TechCrunch. Retrieved April 30, 2023. https://techcrunch.com/2017/08/11/the-minifree-libreboot-t400-is-free-as-in-freedom/

  116. "Petition for Intel to Release an ME-Less CPU Design". June 16, 2016. Archived from the original on June 16, 2016. https://web.archive.org/web/20160616070449/https://puri.sm/posts/petition-for-intel-to-release-an-me-less-cpu-design/

  117. Alaoui, Youness (March 9, 2017). "Neutralizing the Intel Management Engine on Librem Laptops". puri.sm. Retrieved December 13, 2017. https://puri.sm/posts/neutralizing-intel-management-engine-on-librem-laptops/

  118. "Purism Librem Laptops Completely Disable Intel's Management Engine". October 19, 2017. https://puri.sm/posts/purism-librem-laptops-completely-disable-intel-management-engine/

  119. "System76 ME Firmware Updates Plan". System76 Blog. Archived from the original on August 15, 2020. Retrieved September 10, 2020. https://web.archive.org/web/20200815170940/https://blog.system76.com/post/168050597573/system76-me-firmware-updates-plan

  120. "Dell Sells PCs without Intel's Management Engine, but with Tradeoffs". ExtremeTech.com. https://www.extremetech.com/computing/260219-dell-sells-pcs-without-intel-management-engine-tradeoffs

  121. online, heise (December 6, 2017). "Dell schaltet Intel Management Engine in Spezial-Notebooks ab" [Dell switches off Intel Management Engine in special notebooks]. heise online (in German). https://www.heise.de/newsticker/meldung/Dell-schaltet-Intel-Management-Engine-in-Spezial-Notebooks-ab-3909860.html

  122. "Dell Latitude 14 Rugged — 5414 Series Owner's Manual". Dell.com. https://www.dell.com/support/manuals/us/en/04/latitude-14-5414-laptop/5414_om/stealth-mode?guid=guid-3655713b-6a1b-46a8-ba69-eaa3c324b3cd&lang=en-us

  123. "TUXEDO deaktiviert Intels Management Engine - TUXEDO Computers". www.tuxedocomputers.com. Retrieved February 7, 2021. https://www.tuxedocomputers.com/de/Infos/News/TUXEDO-deaktiviert-Intels-Management-Engine

  124. "Intel Management Engine pwned by buffer overflow". TheRegister.com. https://www.theregister.com/2017/12/06/intel_management_engine_pwned_by_buffer_overflow/

  125. "Intel Patches Major Flaws in the Intel Management Engine". Extreme Tech. https://www.extremetech.com/computing/259426-intel-patches-major-flaws-intel-management-engine

  126. "AMD Reportedly Allows Disabling PSP Secure Processor With Latest AGESA - Phoronix". Phoronix.com. December 7, 2017. Retrieved April 16, 2019. https://www.phoronix.com/scan.php?page=news_item&px=AMD-PSP-Disable-Option