[Server-devel] [XSCE] NUCs Vulnerable to SMM Exploit (System Management Mode)

Tim Moody tim at timmoody.com
Mon Oct 10 12:52:01 EDT 2016


so someone with root privileges who logs in locally could take over the machine?


I'm guessing local admin is more of a Windows concept.


________________________________
From: aholt888 at gmail.com <aholt888 at gmail.com> on behalf of Adam Holt <holt at laptop.org>
Sent: Monday, October 10, 2016 9:55 AM
To: xsce-devel; server-devel
Subject: [XSCE] NUCs Vulnerable to SMM Exploit (System Management Mode)


"pretty much all NUCs from 2015 and 2016 are vulnerable to this.

The issue has been fixed in the BIOS versions that were released earlier in September..."

http://nucblog.net/2016/10/security-nucs-vulnerable-to-smm-exploit/

Security Alert: NUCs Vulnerable to SMM Exploit - The NUC Blog<http://nucblog.net/2016/10/security-nucs-vulnerable-to-smm-exploit/>
nucblog.net
Intel has released on Monday a security advisory regarding a flaw in the Intel NUC BIOS. This flaw allows a user with local administrative right to access the system management mode (SMM) and take...



http://www.fanlesstech.com/2016/10/alert-major-nuc-security-flaw.html

[https://3.bp.blogspot.com/-9H0ehzTKRBY/V_QfMfS-LzI/AAAAAAAALRc/xIuOwXQra2oJvgy1sPzIHsKDb5dkac2zACLcB/w1200-h630-p-nu/nuc.jpg]<http://www.fanlesstech.com/2016/10/alert-major-nuc-security-flaw.html>

ALERT: Major NUC security flaw<http://www.fanlesstech.com/2016/10/alert-major-nuc-security-flaw.html>
www.fanlesstech.com
Intel is releasing updated BIOS firmware for a privilege escalation issue. This issue affects Intel NUC Kits listed in the affected produ...


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.laptop.org/pipermail/server-devel/attachments/20161010/09d51e97/attachment.html>


More information about the Server-devel mailing list