how do i check if i have the latest linuxlite 3.8 xubuntu 16 cpu microcode
# aptitude install intel-microcode
The following NEW packages will be installed:
0 packages upgraded, 2 newly installed, 0 to remove and 79 not upgraded.
Need to get 1,019 kB of archives. After unpacking 1,275 kB will be used.
Do you want to continue? [Y/n/?]
Get: 1 http://gb.archive.ubuntu.com/ubuntu xenial-updates/main amd64 iucode-tool amd64 1.5.1-1ubuntu0.1 [33.8 kB]
Get: 2 http://gb.archive.ubuntu.com/ubuntu xenial-updates/main amd64 intel-microcode amd64 3.20180108.0+really20170707ubuntu16.04.1 [985 kB]
Fetched 1,019 kB in 0s (5,185 kB/s)
Selecting previously unselected package iucode-tool.
(Reading database ... 240840 files and directories currently installed.)
Preparing to unpack .../iucode-tool_1.5.1-1ubuntu0.1_amd64.deb ...
Unpacking iucode-tool (1.5.1-1ubuntu0.1) ...
Selecting previously unselected package intel-microcode.
Preparing to unpack .../intel-microcode_3.20180108.0+really20170707ubuntu16.04.1_amd64.deb ...
Unpacking intel-microcode (3.20180108.0+really20170707ubuntu16.04.1) ...
# aptitude show intel-microcode
Automatically installed: no
intel are running a webserver on your intel core vpro, i5, i7, i9 “business” pc at localhost:623 and localhost:16992 (using intel me mei amt rpat)
just browse to http://localhost:623 or http://localhost:16992 on your “business” pc now
pc’s based on intel “consumer” chipsets should not be affected and you will see NOTHING but on DELL OptiPlex, LENOVO ThinkPad and HP EliteBook “business” PCs you may see the text “INTEL ACTIVE MANAGEMENT TECHNOLOGY”
if so you may want to keep reading
2011 – all about intel me mei amt and rpat
2016 – the prediction of a vulnerability
2017 – the announcement of the vulnerability
2017 – some more intel me mei amt rpat tools
RADMIN have a Intel AMT KVM viewer you can try to remote control your PC
Intel AMT IAMT ISBT vulnerability (INTEL-SA-00075) may affect business PCs such as DELL Optiplexs and HP
Dell is aware of an industry-wide vulnerability described in this security bulletin from Intel that can affect Dell PCs that support system manageability via Intel Active Management Technology (AMT), Intel Small Business Technology (SBT), or Intel Standard Manageability (ISM). We are actively developing BIOS firmware updates to help customers mitigate their vulnerability.
Based on the analysis performed by this tool, this system is vulnerable.
The detected version of the Management Engine firmware is considered vulnerable for INTEL-SA-00075.
If Vulnerable, contact your OEM for support and remediation of this system.
For more information, refer to CVE-2017-5689 in the following link: CVE-2017-5689
or the Intel security advisory Intel-SA-00075 in the following link: INTEL-SA-00075
INTEL-SA-00075 Detection Tool
Application Version: 184.108.40.206
Scan date: 2017-06-12 11:45:19
Host Computer Information
Manufacturer: Dell Inc.
Model: OptiPlex 790
Processor Name: Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz
Windows Version: Microsoft Windows 10 Pro
SKU: Intel(R) Standard Manageability
Provisioning Mode: Not Provisioned
Control Mode: None
Is CCM Disabled: False
Driver installation found: True
EHBC Enabled: False
LMS service state: NotPresent
microLMS service state: NotPresent
#intel opensource atom based #minnowboard motherboard