Intel Active Management Technology Explained

Intel Active Management Technology (AMT) is hardware and firmware for remote out-of-band management of select business computers,[1] [2] running on the Intel Management Engine, a microprocessor subsystem not exposed to the user, intended for monitoring, maintenance, updating, and repairing systems.[1] Out-of-band (OOB) or hardware-based management is different from software-based (or in-band) management and software management agents.[1]

Hardware-based management works at a different level from software applications and uses a communication channel (through the TCP/IP stack) that is different from software-based communication (which is through the software stack in the operating system). Hardware-based management does not depend on the presence of an OS or a locally installed management agent. Hardware-based management has been available on Intel/AMD-based computers in the past, but it has largely been limited to auto-configuration using DHCP or BOOTP for dynamic IP address allocation and diskless workstations, as well as wake-on-LAN (WOL) for remotely powering on systems.[3] AMT is not intended to be used by itself; it is intended to be used alongside a software management application.[1] It gives a management application (and thus, the system administrator who uses it) access to the PC down the wire, to remotely do tasks that are difficult or sometimes impossible when working on a PC that does not have remote functionalities built into it.[1] [4] [5]

AMT is designed into a service processor located on the motherboard and uses TLS-secured communication and strong encryption to provide additional security.[6] AMT is built into PCs with Intel vPro technology and is based on the Intel Management Engine (ME).[6] AMT has moved towards increasing support for DMTF Desktop and mobile Architecture for System Hardware (DASH) standards and AMT Release 5.1 and later releases are an implementation of DASH version 1.0/1.1 standards for out-of-band management.[7] AMT provides similar functionality to IPMI, although AMT is designed for client computing systems as compared with the typically server-based IPMI.

Currently, AMT is available in desktops, servers, ultrabooks, tablets, and laptops with Intel Core vPro processor family, including Intel Core i5, Core i7, Core i9, and Intel Xeon E3-1000, Xeon E, Xeon W-1000 product family.[1] [8] [9] AMT also requires an Intel networking card and the corporate version of the Intel Management Engine binary.

Intel confirmed a Remote Elevation of Privilege bug (SA-00075) in its Management Technology on May 1, 2017.[10] Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME.[11] [12] Some manufacturers, like Purism[13] and System76[14] are already selling hardware with Intel Management Engine disabled to prevent the remote exploit. Additional major security flaws in the ME affecting a very large number of computers incorporating Management Engine, Trusted Execution Engine, and Server Platform Services firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on November 20, 2017 (SA-00086).

Non-free service access

Although iAMT may be included for free in devices sold to the public and to small businesses, the full capabilities of iAMT, including encrypted remote access via a public key certificate and automatic remote device provisioning of unconfigured iAMT clients, are not accessible for free to the general public or to the direct owners of iAMT equipped devices. iAMT cannot be fully utilized to its maximum potential without purchasing additional software or management services from Intel or another 3rd party independent software vendor (ISV) or value added reseller (VAR).

Intel itself provides a developer's toolkit software package that allows basic access to iAMT, but is not intended to be normally used to access the technology.[15] Only basic modes of access are supported, without full access to the encrypted communications of the complete purchased management system.[16]

Features

Intel AMT includes hardware-based remote management, security, power management, and remote configuration features that enable independent remote access to AMT-enabled PCs. Intel AMT is security and management technology that is built into PCs with Intel vPro technology.[1]

Intel AMT uses a hardware-based out-of-band (OOB) communication channel[1] that operates regardless of the presence of a working operating system. The communication channel is independent of the PC's power state, the presence of a management agent, and the state of many hardware components such as hard disk drives and memory.

Most AMT features are available OOB, regardless of PC power state.[1] Other features require the PC to be powered up (such as console redirection via serial over LAN (SOL), agent presence checking, and network traffic filtering).[1] Intel AMT has remote power-up capability.

Hardware-based features can be combined with scripting to automate maintenance and service.[1]

Hardware-based AMT features on laptop and desktop PCs include:

Laptops with AMT also include wireless technologies:

History

See main article: article and Intel AMT versions. Software updates provide upgrades to the next minor version of Intel AMT. New major releases of Intel AMT are built into a new chipset, and are updated through new hardware.[6]

Applications

Almost all AMT features are available even if the PC is in a powered-off state but with its power cord attached, if the operating system has crashed, if the software agent is missing, or if hardware (such as a hard drive or memory) has failed.[1] [6] The console-redirection feature (SOL), agent presence checking, and network traffic filters are available after the PC is powered up.[1] [6]

Intel AMT supports these management tasks:

From major version 6, Intel AMT embeds a proprietary VNC server, for out-of-band access using dedicated VNC-compatible viewer technology, and have full KVM (keyboard, video, mouse) capability throughout the power cycle – including uninterrupted control of the desktop when an operating system loads. Clients such as VNC Viewer Plus from RealVNC also provide additional functionality that might make it easier to perform (and watch) certain Intel AMT operations, such as powering the computer off and on, configuring the BIOS, and mounting a remote image (IDER).

Provisioning and integration

AMT supports certificate-based or PSK-based remote provisioning (full remote deployment), USB key-based provisioning ("one-touch" provisioning), manual provisioning[1] and provisioning using an agent on the local host ("Host Based Provisioning"). An OEM can also pre-provision AMT.[18]

The current version of AMT supports remote deployment on both laptop and desktop PCs. (Remote deployment was one of the key features missing from earlier versions of AMT and which delayed acceptance of AMT in the market.)[5] Remote deployment, until recently, was only possible within a corporate network.[21] Remote deployment lets a sys-admin deploy PCs without "touching" the systems physically.[1] It also allows a sys-admin to delay deployments and put PCs into use for a period of time before making AMT features available to the IT console.[22] As delivery and deployment models evolve, AMT can now be deployed over the Internet, using both "Zero-Touch" and Host-Based methods.[23]

PCs can be sold with AMT enabled or disabled. The OEM determines whether to ship AMT with the capabilities ready for setup (enabled) or disabled. The setup and configuration process may vary depending on the OEM build.[18]

AMT includes a Privacy Icon application, called IMSS,[24] that notifies the system's user if AMT is enabled. It is up to the OEM to decide whether they want to display the icon or not.

AMT supports different methods for disabling the management and security technology, as well as different methods for reenabling the technology.[1] [22] [25] [26]

AMT can be partially unprovisioned using the Configuration Settings, or fully unprovisioned by erasing all configuration settings, security credentials, and operational and networking settings.[27] A partial unprovisioning leaves the PC in the setup state. In this state, the PC can self-initiate its automated, remote configuration process. A full unprovisioning erases the configuration profile as well as the security credentials and operational / networking settings required to communicate with the Intel Management Engine. A full unprovisioning returns Intel AMT to its factory default state.

Once AMT is disabled, to enable AMT again, an authorized sys-admin can reestablish the security credentials required to perform remote configuration by either:

There is a way to totally reset AMT and return to factory defaults. This can be done in two ways:

Setup and integration of AMT is supported by a setup and configuration service (for automated setup), an AMT Webserver tool (included with Intel AMT), and AMT Commander, an unsupported and free, proprietary application available from the Intel website.

Communication

All access to the Intel AMT features is through the Intel Management Engine in the PC's hardware and firmware.[1] AMT communication depends on the state of the Management Engine, not the state of the PC's OS.

As part of the Intel Management Engine, the AMT OOB communication channel is based on the TCP/IP firmware stack designed into system hardware.[1] Because it is based on the TCP/IP stack, remote communication with AMT occurs via the network data path before communication is passed to the OS.

Intel AMT supports wired and wireless networks.[1] [8] [19] [28] For wireless notebooks on battery power, OOB communication is available when the system is awake and connected to the corporate network, even if the OS is down. OOB communication is also available for wireless or wired notebooks connected to the corporate network over a host OS-based virtual private network (VPN) when notebooks are awake and working properly.

AMT version 4.0 and higher can establish a secure communication tunnel between a wired PC and an IT console outside the corporate firewall.[1] [29] In this scheme, a management presence server (Intel calls this a "vPro-enabled gateway") authenticates the PC, opens a secure TLS tunnel between the IT console and the PC, and mediates communication.[1] [30] The scheme is intended to help the user or PC itself request maintenance or service when at satellite offices or similar places where there is no on-site proxy server or management appliance.

Technology that secures communications outside a corporate firewall is relatively new. It also requires that an infrastructure be in place, including support from IT consoles and firewalls.

An AMT PC stores system configuration information in protected memory. For PCs version 4.0 and higher, this information can include the name(s) of appropriate "whitelist" management servers for the company. When a user tries to initiate a remote session between the wired PC and a company server from an open LAN, AMT sends the stored information to a management presence server (MPS) in the "demilitarized zone" ("DMZ") that exists between the corporate firewall and client (the user PC's) firewalls. The MPS uses that information to help authenticate the PC. The MPS then mediates communication between the laptop and the company's management servers.[1]

Because communication is authenticated, a secure communication tunnel can then be opened using TLS encryption. Once secure communications are established between the IT console and Intel AMT on the user's PC, a sys-admin can use the typical AMT features to remotely diagnose, repair, maintain, or update the PC.[1]

Design

Hardware

See main article: Intel Management Engine. The Management Engine (ME) is an isolated and protected coprocessor, embedded as a non-optional[31] part in all current Intel chipsets.

Starting with ME 11, it is based on the Intel Quark x86-based 32-bit CPU and runs the MINIX 3 operating system. The ME state is stored in a partition of the SPI flash, using the Embedded Flash File System (EFFS). Previous versions were based on an ARC core, with the Management Engine running the ThreadX RTOS from Express Logic. Versions 1.x to 5.x of the ME used the ARCTangent-A4 (32-bit only instructions) whereas versions 6.x to 8.x used the newer ARCompact (mixed 32- and 16-bit instruction set architecture). Starting with ME 7.1, the ARC processor could also execute signed Java applets.

The ME shares the same network interface and IP as the host system. Traffic is routed based on packets to ports 16992–16995. Support exists in various Intel Ethernet controllers, exported and made configurable via Management Component Transport Protocol (MCTP).[32] [33] The ME also communicates with the host via PCI interface.[34] Under Linux, communication between the host and the ME is done via /dev/mei[35] or more recently[36] /dev/mei0.[37]

Until the release of Nehalem processors, the ME was usually embedded into the motherboard's northbridge, following the Memory Controller Hub (MCH) layout. With the newer Intel architectures (Intel 5 Series onwards), ME is included into the Platform Controller Hub (PCH).[38] [39]

Firmware

Security

Because AMT allows access to the PC below the OS level, security for the AMT features is a key concern.

Security for communications between Intel AMT and the provisioning service and/or management console can be established in different ways depending on the network environment. Security can be established via certificates and keys (TLS public key infrastructure, or TLS-PKI), pre-shared keys (TLS-PSK), or administrator password.[1] [6]

Security technologies that protect access to the AMT features are built into the hardware and firmware. As with other hardware-based features of AMT, the security technologies are active even if the PC is powered off, the OS is crashed, software agents are missing, or hardware (such as a hard drive or memory) has failed.[1] [6] [40]

Because the software that implements AMT exists outside of the operating system, it is not kept up-to-date by the operating system's normal update mechanism. Security defects in the AMT software can therefore be particularly severe, as they will remain long after they have been discovered and become known to potential attackers.

On May 15, 2017, Intel announced a critical vulnerability in AMT. According to the update "The vulnerability could enable a network attacker to remotely gain access to business PCs or devices that use these technologies".[41] Intel announced partial availability of a firmware update to patch the vulnerability for some of the affected devices.

Networking

While some protocols for in-band remote management use a secured network communication channel (for example Secure Shell), some other protocols are not secured. Thus some businesses have had to choose between having a secure network or allowing IT to use remote management applications without secure communications to maintain and service PCs.[1]

Modern security technologies and hardware designs allow remote management even in more secure environments. For example, Intel AMT supports IEEE 802.1x, Preboot Execution Environment (PXE), Cisco SDN, and Microsoft NAP.[1]

All AMT features are available in a secure network environment. With Intel AMT in the secure network environment:

Intel AMT can embed network security credentials in the hardware, via the Intel AMT Embedded Trust Agent and an AMT posture plug-in.[1] [6] The plug-in collects security posture information, such as firmware configuration and security parameters from third-party software (such as antivirus software and antispyware), BIOS, and protected memory. The plug-in and trust agent can store the security profile(s) in AMT's protected, nonvolatile memory, which is not on the hard disk drive.

Because AMT has an out-of-band communication channel, AMT can present the PC's security posture to the network even if the PC's OS or security software is compromised. Since AMT presents the posture out-of-band, the network can also authenticate the PC out-of-band, before the OS or applications load and before they try to access the network. If the security posture is not correct, a system administrator can push an update OOB (via Intel AMT) or reinstall critical security software before letting the PC access the network.

Support for different security postures depends on the AMT release:

Technology

AMT includes several security schemes, technologies, and methodologies to secure access to the AMT features during deployment and during remote management.[1] [6] [40] AMT security technologies and methodologies include:

As with other aspects of Intel AMT, the security technologies and methodologies are built into the chipset.

Known vulnerabilities and exploits

Ring −3 rootkit

A ring −3 rootkit was demonstrated by Invisible Things Lab for the Q35 chipset; it does not work for the later Q45 chipset, as Intel implemented additional protections.[44] The exploit worked by remapping the normally protected memory region (top 16 MB of RAM) reserved for the ME. The ME rootkit could be installed regardless of whether the AMT is present or enabled on the system, as the chipset always contains the ARC ME coprocessor. (The "−3" designation was chosen because the ME coprocessor works even when the system is in the S3 state, thus it was considered a layer below the System Management Mode rootkits.[45]) For the vulnerable Q35 chipset, a keystroke logger ME-based rootkit was demonstrated by Patrick Stewin.[46] [47]

Zero-touch provisioning

Another security evaluation by Vassilios Ververis showed serious weaknesses in the GM45 chipset implementation. In particular, it criticized AMT for transmitting unencrypted passwords in the SMB provisioning mode when the IDE redirection and Serial over LAN features are used. It also found that the "zero touch" provisioning mode (ZTC) is still enabled even when the AMT appears to be disabled in BIOS. For about 60 euros, Ververis purchased from Go Daddy a certificate that is accepted by the ME firmware and allows remote "zero touch" provisioning of (possibly unsuspecting) machines, which broadcast their HELLO packets to would-be configuration servers.[48]

Silent Bob is Silent

In May 2017, Intel confirmed that many computers with AMT have had an unpatched critical privilege-escalation vulnerability .[12] [49] [10] [50] [51] The vulnerability, which was nicknamed "Silent Bob is Silent" by the researchers who had reported it to Intel,[52] affects numerous laptops, desktops and servers sold by Dell, Fujitsu, Hewlett-Packard (later Hewlett Packard Enterprise and HP Inc.), Intel, Lenovo, and possibly others.[53] [54] [55] [56] [57] [58] Those researchers claimed that the bug affects systems made in 2010 or later.[59] Other reports claimed that the bug also affects systems made as long ago as 2008.[60] [12] The vulnerability was described as giving remote attackers:The remote user authorization process included a programmer error: it compared the user-given authorization token hash (user_response) to the true value of the hash (computed_response) using this code: strncmp(computed_response, user_response, response_length)The vulnerability was that response_length was the length of the user-given token and not of the true token.

Since the third argument for strncmp is the length of the two strings to be compared, if it is less than the length of computed_response, only a part of the string will be tested for equality. Specifically, if user_response is the empty string (with length 0), this "comparison" will always return true, and thus validate the user. This allowed any person to simply log into the admin account on the devices by editing their sent HTTP packet to use the empty string as the response field's value.

PLATINUM

In June 2017, the PLATINUM cybercrime group became notable for exploiting the serial over LAN (SOL) capabilities of AMT to perform data exfiltration of stolen documents.[61] [62] [63] [64] [65] [66] [67] [68]

SA-00086

In November 2017 serious flaws were detected in the Management Engine (ME) firmware by security firm Positive Technologies, who claimed to have developed a working exploit of this system for someone having physical access to a USB port.[69] On November 20, 2017, Intel confirmed that a number of serious flaws had been found in the Management Engine, Trusted Execution Engine, Server Platform Services and released a "critical firmware update".[70] [71]

Avoidance and mitigation

PCs with AMT typically provide an option in the BIOS menu to switch off AMT, though OEMs implement BIOS features differently,[72] and therefore the BIOS is not a reliable method to switch off AMT. Intel-based PCs that shipped without AMT are not supposed to be able to have AMT installed later. However, as long as the PC's hardware is potentially capable of running the AMT, it is unclear how effective these protections are.[73] [74] [75] Presently, there are mitigation guides[76] and tools[77] to disable AMT on Windows, but Linux has only received a tool to check whether AMT is enabled and provisioned on Linux systems.[78] The only way to actually fix this vulnerability is to install a firmware update. Intel has made a list of updates available.[79] Unlike for AMT, there is generally no official, documented way to disable the Management Engine (ME); it is always on, unless it is not enabled at all by the OEM.[80] [81]

In 2015, a small number of competing vendors began to offer Intel-based PCs designed or modified specifically to address potential AMT vulnerabilities and related concerns.[82] [83] [84] [85] [86] [87] [88]

See also

External links

Notes and References

  1. Web site: [ftp://download.intel.com/products/vpro/whitepaper/crossclient.pdf Intel Centrino 2 with vPro Technology and Intel Core2 Processor with vPro Technology]. Intel. 2008. August 7, 2008. https://web.archive.org/web/20081206123107/http://download.intel.com/products/vpro/whitepaper/crossclient.pdf. December 6, 2008. dead.
  2. Web site: Intel vPro Chipset Lures MSPs, System Builders. ChannelWeb. August 1, 2007.
  3. Web site: A new dawn for remote management? A first glimpse at Intel's vPro platform. February 6, 2007. ars technica. November 7, 2007.
  4. Web site: April 26, 2007 . Remote Pc Management with Intel's vPro . November 21, 2007 . Tom's Hardware Guide.
  5. Web site: Revisiting vPro for Corporate Purchases . https://web.archive.org/web/20080723205855/http://mediaproducts.gartner.com/reprints/intel/153886.html . dead . July 23, 2008 . Gartner. August 7, 2008.
  6. Web site: June 26, 2008 . Architecture Guide: Intel Active Management Technology . dead . https://web.archive.org/web/20081019181630/http://software.intel.com/en-us/articles/architecture-guide-intel-active-management-technology . October 19, 2008 . August 12, 2008 . Intel.
  7. Web site: Archived copy . April 30, 2012 . dead . https://web.archive.org/web/20120414141100/http://software.intel.com/sites/manageability/AMT_Implementation_and_Reference_Guide/DOCS/Implementation%20and%20Reference%20Guide/default.htm . April 14, 2012 .
  8. Web site: Intel Centrino 2 with vPro Technology. Intel. July 15, 2008. dead. https://web.archive.org/web/20080315093244/http://download.intel.com/products/centrino/pro/316888.pdf. March 15, 2008.
  9. Web site: Intel MSP. Msp.intel.com. May 25, 2016.
  10. Web site: Intel® Product Security Center . Security-center.intel.com . May 7, 2017.
  11. Web site: Charlie Demerjian . Remote security exploit in all 2008+ Intel platforms . SemiAccurate . May 1, 2017 . May 7, 2017.
  12. Web site: Red alert! Intel patches remote execution hole that's been hidden in chips since 2010 . Theregister.co.uk . May 7, 2017.
  13. https://www.hardocp.com/news/2017/10/22/purism_offering_laptops_intelrsquos_management_engine_disabled HardOCP: Purism Is Offering Laptops with Intel's Management Engine Disabled
  14. https://www.notebookcheck.net/System76-to-disable-Intel-Management-Engine-on-its-notebooks.267696.0.html System76 to disable Intel Management Engine on its notebooks
  15. Web site: Garrison . Justin . How to Remotely Control Your PC (Even When it Crashes) . Howtogeek.com . March 28, 2011 . May 7, 2017.
  16. Web site: Open Manageability Developer Tool Kit | Intel® Software . Software.intel.com . May 7, 2017.
  17. Web site: Intel Active Management Technology System Defense and Agent Presence Overview. Intel. February 2007. August 16, 2008. PDF.
  18. Web site: Intel Centrino 2 with vPro Technology. Intel. June 30, 2008. dead. https://web.archive.org/web/20080315145234/http://softwarecommunity.intel.com/articles/eng/1477.htm. March 15, 2008.
  19. Web site: New Intel-Based Laptops Advance All Facets of Notebook PCs . Intel . July 15, 2008 . https://web.archive.org/web/20080717125337/http://www.intel.com/pressroom/archive/releases/20080715comp_sm.htm . July 17, 2008 . dead .
  20. Web site: Understanding Intel AMT over wired vs. wireless (video) . dead . https://web.archive.org/web/20080326134854/http://communities.intel.com/docs/DOC-1129 . March 26, 2008 . August 14, 2008 . Intel.
  21. Web site: Intel® vPro™ Technology. Intel.
  22. Web site: Part 3: Post Deployment of Intel vPro in an Altiris Environment: Enabling and Configuring Delayed Provisioning . Intel (forum) . September 12, 2008.
  23. Web site: Archived copy . July 20, 2013 . dead . https://web.archive.org/web/20140103152316/https://safefrontier.com/sites/default/files/pdf/ACTIVE%20MANAGEMENT%20CLOUD%20OVERVIEW.pdf . January 3, 2014 .
  24. Web site: Intel Management and Security Status (IMSS), advanced configurations. Part 9 – Intel Software Network Blogs . December 26, 2010 . dead . https://web.archive.org/web/20110220204348/http://software.intel.com/en-us/blogs/2009/07/17/intel-management-and-security-status-imss-advanced-configurations-part-9/ . February 20, 2011 .
  25. Web site: Intel vPro Provisioning . HP (Hewlett Packard). June 2, 2008.
  26. Web site: vPro Setup and Configuration for the dc7700 Business PC with Intel vPro Technology. HP (Hewlett Packard). June 2, 2008.
  27. Web site: Part 4: Post Deployment of Intel vPro in an Altiris Environment Intel: Partial UnProvDefault . Intel (forum) . September 12, 2008.
  28. Web site: Technical Considerations for Intel AMT in a Wireless Environment. Intel. September 27, 2007. August 16, 2008.
  29. Web site: Intel Active Management Technology Setup and Configuration Service, Version 5.0. Intel. October 13, 2018. PDF.
  30. Web site: Intel AMT - Fast Call for Help. https://archive.today/20090211011351/http://softwareblogs.intel.com/2008/08/18/intel-amt-fast-call-for-help/. dead. February 11, 2009. Intel. August 15, 2008. August 17, 2008. (Intel developer's blog)
  31. Web site: Intel x86 considered harmful (New paper) . January 16, 2016 . dead . https://web.archive.org/web/20160103020058/http://blog.invisiblethings.org/2015/10/27/x86_harmful.html . January 3, 2016 .
  32. Web site: Intel Ethernet Controller I210 Datasheet . 2013 . November 9, 2013 . . 1, 15, 52, 621 - 776 .
  33. Web site: Intel Ethernet Controller X540 Product Brief . 2012 . February 26, 2014 . .
  34. Igor Skochinsky (Hex-Rays) Rootkit in your laptop, Ruxcon Breakpoint 2012
  35. Web site: Archived copy . February 25, 2014 . dead . https://web.archive.org/web/20141101045709/https://www.kernel.org/doc/Documentation/misc-devices/mei/mei.txt . November 1, 2014 .
  36. Web site: samples: mei: use /dev/mei0 instead of /dev/mei · torvalds/linux@c4a46ac. 2021-07-14. GitHub. en.
  37. Web site: Introduction — The Linux Kernel documentation. 2021-07-14. www.kernel.org.
  38. Web site: Archived copy . February 26, 2014 . dead . https://web.archive.org/web/20140211075753/http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/celeron-mobile-p4000-u3000-datasheet.pdf . February 11, 2014 .
  39. Web site: Platforms II . PDF . Users.nik.uni-obuda.hu . May 25, 2016.
  40. Web site: New Intel vPro Processor Technology Fortifies Security for Business PCs (news release) . Intel. August 27, 2007. August 7, 2007 . https://web.archive.org/web/20070912110718/http://www.intel.com/pressroom/archive/releases/20070827comp.htm . September 12, 2007.
  41. Web site: Intel® AMT Critical Firmware Vulnerability. Intel. June 10, 2017.
  42. Web site: Intel Software Network, engineer / developers forum. https://archive.today/20110813085510/http://softwarecommunity.intel.com/isn/Community/en-US/forums/thread/30235057.aspx. dead. August 13, 2011. Intel. August 9, 2008.
  43. Web site: Cisco Security Solutions with Intel Centrino Pro and Intel vPro Processor Technology. Intel. 2007.
  44. Web site: Invisible Things Lab to present two new technical presentations disclosing system-level vulnerabilities affecting modern PC hardware at its core . Invisiblethingslab.com . May 25, 2016 . https://web.archive.org/web/20160412045958/http://invisiblethingslab.com/press/itl-press-2009-03.pdf . April 12, 2016 . dead . mdy-all .
  45. Web site: A Quest to the Core . Joanna Rutkowska . Invisiblethingslab.com . May 25, 2016.
  46. Web site: Technische Universität Berlin: FG Security in telecommunications : Evaluating "Ring-3" Rootkits . Stewin.org . May 25, 2016 . https://web.archive.org/web/20160304033404/http://www.stewin.org/slides/pstewin-SPRING6-EvaluatingRing-3Rootkits.pdf . March 4, 2016 . dead . mdy-all .
  47. Web site: Persistent, Stealthy Remote-controlled Dedicated Hardware Malware . Stewin.org . May 25, 2016 . https://web.archive.org/web/20160303222145/http://stewin.org/slides/44con_2013-dedicated_hw_malware-stewin_bystrov.pdf . March 3, 2016 . dead . mdy-all .
  48. Web site: Security Evaluation of Intel's Active Management Technology . Web.it.kth.se . May 25, 2016.
  49. Web site: CVE - CVE-2017-5689 . Cve.mitre.org . May 7, 2017 . https://web.archive.org/web/20170505125225/http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5689 . May 5, 2017 . dead . mdy-all .
  50. Web site: Intel Hidden Management Engine - x86 Security Risk? . Darknet . June 16, 2016 . May 7, 2017.
  51. Web site: Garrett . Matthew . Intel's remote AMT vulnerablity . mjg59.dreamwidth.org . May 1, 2017 . May 7, 2017.
  52. Web site: 2017-05-05 ALERT! Intel AMT EXPLOIT OUT! IT'S BAD! DISABLE AMT NOW!. Ssh.com\Accessdate=2017-05-07.
  53. Web site: Dan Goodin . The hijacking flaw that lurked in Intel chips is worse than anyone thought . Ars Technica . May 6, 2017 . May 8, 2017.
  54. Web site: General: BIOS updates due to Intel AMT IME vulnerability - General Hardware - Laptop - Dell Community . En.community.dell.com . May 2, 2017 . May 7, 2017.
  55. Web site: Advisory note: Intel Firmware vulnerability – Fujitsu Technical Support pages from Fujitsu Fujitsu Continental Europe, Middle East, Africa & India . Support.ts.fujitsu.com . May 1, 2017 . May 8, 2017.
  56. Web site: HPE | HPE CS700 2.0 for VMware . H22208.www2.hpe.com . May 1, 2017 . May 7, 2017.
  57. Web site: Intel® Security Advisory regarding escalation o... |Intel Communities . Communities.intel.com . May 4, 2017 . May 7, 2017.
  58. Web site: Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Remote Privilege Escalation . Support.lenovo.com . May 7, 2017.
  59. Web site: MythBusters: CVE-2017-5689 . Embedi.com . May 7, 2017 . https://web.archive.org/web/20170506064534/https://embedi.com/news/mythbusters-cve-2017-5689 . May 6, 2017 . dead .
  60. Web site: Charlie Demerjian . Remote security exploit in all 2008+ Intel platforms . SemiAccurate.com . May 1, 2017 . May 7, 2017.
  61. Web site: Sneaky hackers use Intel management tools to bypass Windows firewall. June 9, 2017. June 10, 2017.
  62. Web site: Windows firewall dodged by 'hot-patching' spies using Intel AMT, says Microsoft - ZDNet. Liam. Tung. ZDNet. June 10, 2017.
  63. Web site: PLATINUM continues to evolve, find ways to maintain invisibility. June 7, 2017. June 10, 2017.
  64. Web site: Malware Uses Obscure Intel CPU Feature to Steal Data and Avoid Firewalls. June 10, 2017.
  65. Web site: Hackers abuse low-level management feature for invisible backdoor. iTnews. June 10, 2017.
  66. Web site: Vxers exploit Intel's Active Management for malware-over-LAN • The Register. www.theregister.co.uk. June 10, 2017.
  67. Web site: Intel-Fernwartung AMT bei Angriffen auf PCs genutzt. heise. Security. Security. June 10, 2017.
  68. Web site: PLATINUM activity group file-transfer method using Intel AMT SOL. Channel 9. June 10, 2017.
  69. https://thenextweb.com/security/2017/11/09/researchers-find-almost-every-computer-intel-skylake-cpu-can-owned-via-usb/ Researchers find almost EVERY computer with an Intel Skylake and above CPU can be owned via USB
  70. Web site: Intel® Management Engine Critical Firmware Update (Intel SA-00086). Intel.
  71. Intel Chip Flaws Leave Millions of Devices Exposed. Wired. Newman. Lily Hay.
  72. Web site: Disabling AMT in BIOS. software.intel.com. December 28, 2010. en. May 17, 2017.
  73. Web site: Are consumer PCs safe from the Intel ME/AMT exploit? - SemiAccurate. semiaccurate.com. May 3, 2017.
  74. News: Intel x86s hide another CPU that can take over your machine (you can't audit it). June 15, 2016. Boing Boing. May 11, 2017. en-US.
  75. Web site: [coreboot] : AMT bug |website=Mail.coreboot.org |date=May 11, 2017 |access-date=June 13, 2017].
  76. News: Disabling Intel AMT on Windows (and a simpler CVE-2017-5689 Mitigation Guide). May 3, 2017. Social Media Marketing Digital Marketing Electronic Commerce. May 17, 2017. en-US.
  77. Web site: bartblaze/Disable-Intel-AMT. GitHub. en. May 17, 2017.
  78. Web site: mjg59/mei-amt-check. GitHub. en. May 17, 2017.
  79. Web site: Intel® AMT Critical Firmware Vulnerability. Intel. May 17, 2017.
  80. Web site: Positive Technologies Blog: Disabling Intel ME 11 via undocumented mode . August 30, 2017 . August 28, 2017 . https://web.archive.org/web/20170828150536/http://blog.ptsecurity.com/2017/08/disabling-intel-me.html . dead .
  81. Web site: Intel Patches Major Flaws in the Intel Management Engine. Extreme Tech.
  82. Web site: Taurinus X200: Now the most 'Free Software' laptop on the planet - ZDNet. Steven J.. Vaughan-Nichols. ZDNet.
  83. Web site: Libreboot: Thinkpad X220 ohne Management Engine » Linux-Magazin. Kristian. Kißling. Linux-Magazin.
  84. Web site: Libiquity Taurinus X200: Linux-Notebook ohne Intels Management Engine. heise. online. heise online.
  85. Web site: Intel AMT Vulnerability Shows Intel's Management Engine Can Be Dangerous. May 2, 2017.
  86. News: Purism Explains Why It Avoids Intel's AMT And Networking Cards For Its Privacy-Focused 'Librem' Notebooks. August 29, 2016. Tom's Hardware. May 10, 2017. en.
  87. Web site: The Free Software Foundation loves this laptop, but you won't.
  88. Web site: FSF Endorses Yet Another (Outdated) Laptop - Phoronix. phoronix.com.