Intel Management Engine: Difference between revisions
added more sources, incidents, lawsuits, updated consumer impact summary, information, and security vulnerabilities list |
Added additional information about ME and AMT, removed some incomplete text. |
||
| Line 7: | Line 7: | ||
|Category=Surveillance, Security, Computers, Articles in Need of Additional Work | |Category=Surveillance, Security, Computers, Articles in Need of Additional Work | ||
|Website=https://www.intel.com/content/www/us/en/homepage.html | |Website=https://www.intel.com/content/www/us/en/homepage.html | ||
|Description=An | |Description=An autonomous embedded microcontroller present on Intel chipsets with root system access. | ||
|Logo=Intel logo.svg}} | |||
}} | |||
Intel Management Engine | The '''Intel Management Engine (ME)''' is an embedded microcontroller integrated into Intel's chipsets since 2008. From version 11 onwards, it runs a (closed-source) modified version of [https://www.minix3.org/ MINIX] as its operating system.<ref name=":4">{{Cite web |date=2023-09-26 |title=What is Intel® Management Engine? |url=https://www.intel.com/content/www/us/en/support/articles/000008927/software/chipset-software.html |url-status=live |access-date=2026-02-04 |publisher=Intel}}</ref><ref name=":5">{{Cite web |last=Ermolov |first=Mark |last2=Goryachy |first2=Maxim |date=28 Aug 2017 |title=Disabling Intel ME 11 via undocumented mode |url=https://web.archive.org/web/20201201175708/http://blog.ptsecurity.com/2017/08/disabling-intel-me.html?m=1 |url-status=dead |access-date=2026-02-04 |website=Positive Technologies}}</ref>. | ||
The ME is able to access the LAN adapter, giving it access to networks the system is connected to, both wired and wireless.<ref name=":6">{{Cite web |date=2021-02-18 |title=Getting Started with Intel® Active Management Technology |url=https://www.intel.com/content/www/us/en/developer/articles/guide/getting-started-with-active-management-technology.html |access-date=2026-02-04 |publisher=Intel}}</ref> | |||
The power state of the ME is independent from the rest of the system, allowing it to run while the system is turned off, assuming that the system is still receiving power.<ref name=":4" /> | |||
Intel | Additionally, Intel ME also contains several measures to check if it's been tampered with. These include being inaccessible to the machine BIOS or OS, scanning the entire machine every 30 minutes to verify if signature is signed (otherwise shutting down the system), and making it exceptionally difficult to reverse engineer. | ||
==Intel AMT== | |||
One of the services utilizing the capabilities of the Intel ME is '''Intel Active Management (AMT)'''. It is part of a set of technologies marketed as Intel vPro. Intel AMT is built into most modern Intel CPUs, including but not limited to the Intel Core i5, Intel Core i7, Intel Core M, and Intel Xeon series. The AMT has full access to the system and can bypass system firewalls<ref name=":6" /><ref>{{Cite web |date=2021-01-05 |title=Intel® Active Management Technology Developers Guide |url=https://www.intel.com/content/www/us/en/docs/active-management-technology/developer-guide/2021/overview.html |url-status=live |access-date=2026-02-04 |publisher=Intel}}</ref>. | |||
AMT allows remote management of the system by using the ME's network access, exposing 2 ports through which commands can be issued. Some of the many features of the AMT are:<ref name=":6" /> | |||
* Access to hardware information | |||
* Remote power control | |||
* [https://software.intel.com/sites/manageability/HLAPI_Documentation/default.htm?turl=Documents%2Fbootcontrol.htm Boot control] | |||
* Wake-on-LAN/Wake on wireless LAN | |||
* Remote Schedule Maintenance (outside firewall) | |||
* KVM (keyboard, video, mouse) remote control | |||
* Updating firmware | |||
==Security== | ==Security== | ||
| Line 41: | Line 45: | ||
|- | |- | ||
|2009 | |2009 | ||
|Developed by Invisible Things Lab, it was discovered that a bug allowed it to access the machine memory. <ref>{{Cite web |date=2008-08-26 |title=Intel patches the Q35 bug |url=https://theinvisiblethings.blogspot.com/2008/08/intel-patches-q35-bug.html |url-status=live |access-date=2026-02-03 |website=The Invisible Things Lab's blog}}</ref><ref name=":0" /><ref name=":2">{{Cite web |last=Robin |first=Thibaud |date=2025-03-02 |title=The Mysterious Story of a Troubling Intel Chip |url=https://blog.trackflaw.com/en/the-mysterious-story-of-a-disturbing-intel-flea/ |url-status=live |access-date=2026-02-03 |website=TrackFlaw}}</ref> | |Developed by Invisible Things Lab, it was discovered that a bug allowed it to access the machine memory. <ref>{{Cite web |date=2008-08-26 |title=Intel patches the Q35 bug |url=https://theinvisiblethings.blogspot.com/2008/08/intel-patches-q35-bug.html |url-status=live |access-date=2026-02-03 |website=The Invisible Things Lab's blog}}</ref><ref name=":0">{{Cite web |first=402 Payment Required |date=2023-06-29 |title=Intel Management Engine |url=https://www.youtube.com/watch?v=lQ8k79yNH2A |url-status=live |access-date=2026-02-03 |website=Youtube}}</ref><ref name=":2">{{Cite web |last=Robin |first=Thibaud |date=2025-03-02 |title=The Mysterious Story of a Troubling Intel Chip |url=https://blog.trackflaw.com/en/the-mysterious-story-of-a-disturbing-intel-flea/ |url-status=live |access-date=2026-02-03 |website=TrackFlaw}}</ref> | ||
|CVE-2008-1234 | |CVE-2008-1234 | ||
|- | |- | ||
| Line 58: | Line 62: | ||
|2020 | |2020 | ||
|Several vulnerabilities were found in Intel AMT that allows hackers to add a root kit. <ref name=":3" /><ref>{{Cite web |last=Larabe |first=Michael |date=2020-09-08 |title=Intel AMT Hit By Another "Critical" Security Vulnerability |url=https://www.semiaccurate.com/2016/01/20/intel-puts-out-secure-cpus-based-on-insecurity/ |url-status=live |access-date=2026-02-03 |website=phoronix}}</ref> | |Several vulnerabilities were found in Intel AMT that allows hackers to add a root kit. <ref name=":3" /><ref>{{Cite web |last=Larabe |first=Michael |date=2020-09-08 |title=Intel AMT Hit By Another "Critical" Security Vulnerability |url=https://www.semiaccurate.com/2016/01/20/intel-puts-out-secure-cpus-based-on-insecurity/ |url-status=live |access-date=2026-02-03 |website=phoronix}}</ref> | ||
|CVE 2020-0535<ref>{{Cite web |first=National Vulnerability Database |date=2020-06-15 |title=CVE-2020-0535 Detail |url=https://nvd.nist.gov/vuln/detail/CVE-2020-0535 |url-status=live |access-date=2026-02-03 |website=nist.gov}}</ref><ref>{{Cite web |first=National Vulnerability Database |date=2020-06-15 |title=CVE-2020-0531 |url=https://nvd.nist.gov/vuln/detail/CVE-2020-0531 |url-status=live |access-date=2026-02-03 |website=Nist}}</ref><ref>{{Cite web |first=Intel |date=2020-11-10 |title=2020.2 IPU – Intel® CSME, SPS, TXE, AMT and DAL Advisory |url=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391.html |url-status=live |access-date=2026-02-03 |website=Intel}}</ref> | |CVE 2020-0535<ref>{{Cite web |first=National Vulnerability Database |date=2020-06-15 |title=CVE-2020-0535 Detail |url=https://nvd.nist.gov/vuln/detail/CVE-2020-0535 |url-status=live |access-date=2026-02-03 |website=nist.gov}}</ref><ref>{{Cite web |first=National Vulnerability Database |date=2020-06-15 |title=CVE-2020-0531 |url=https://nvd.nist.gov/vuln/detail/CVE-2020-0531 |url-status=live |access-date=2026-02-03 |website=Nist}}</ref><ref>{{Cite web |first=Intel |date=2020-11-10 |title=2020.2 IPU – Intel® CSME, SPS, TXE, AMT and DAL Advisory |url=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391.html |url-status=live |access-date=2026-02-03 |website=Intel}}</ref> | ||
|} | |} | ||
==Hidden Deals== | ==Hidden Deals== | ||
Around 2017, an undocumented flag was discovered that, when set, disables a large portion of the ME. This feature appears to have been requested by the NSA.<ref name=":5" /><ref>{{Cite web |last=Claburn |first=Thomas |date=29 Aug 2017 |title=Intel ME controller chip has secret kill switch |url=https://www.theregister.com/2017/08/29/intel_management_engine_can_be_disabled/ |url-status=live |access-date=2026-02-04 |website=The Register}}</ref> | |||
This | |||
== | |||
= | |||
==Tools and Tips== | ==Tools and Tips== | ||
While Intel ME is normally not possible to be disable (except in some cases),there | While Intel ME is normally not possible to be disable (except in some cases), there have been tools and tips developed to allow (partially) disabling the ME.<ref>{{Cite web |title=Intel’s Management Engine |url=https://puri.sm/learn/intel-me/ |url-status=live |access-date=2026-02-04 |publisher=Purism}}</ref> | ||
*[https://github.com/corna/me_cleaner ME Cleaner Tool] | *[https://github.com/corna/me_cleaner ME Cleaner Tool] | ||
| Line 90: | Line 81: | ||
==References== | ==References== | ||
<references /> | |||
https://www.youtube.com/watch?v=Lr-9aCMUXzI | |||
https://www.csoonline.com/article/562761/researchers-say-now-you-too-can-disable-intel-me-backdoor-thanks-to-the-nsa.html intel response to backdoor accusa | https://www.csoonline.com/article/562761/researchers-say-now-you-too-can-disable-intel-me-backdoor-thanks-to-the-nsa.html intel response to backdoor accusa | ||
| Line 96: | Line 89: | ||
https://www.youtube.com/watch?v=RPC5f7EJN6U | https://www.youtube.com/watch?v=RPC5f7EJN6U | ||
<ref name=":1" /> | <ref name=":1">{{Cite web |last=Portnoy |first=Erica |last2=Eckersley |first2=Peter |date=2017-05-08 |title=Intel's Management Engine is a security hazard, and users need a way to disable it |url=https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it |url-status=live |access-date=2026-02-03 |website=Electronic Frontier Foundation}}</ref> | ||
https://leeneubecker.com/intels-secret-backdoor-can-now-be-turned-off/ | https://leeneubecker.com/intels-secret-backdoor-can-now-be-turned-off/ | ||
Revision as of 01:57, 4 February 2026
This section is incomplete. This notice can be deleted once all the placeholder text has been replaced.
❗Article Status Notice: This Article is a stub
This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼
| Basic Information | |
|---|---|
| Release Year | 2008 |
| Product Type | Surveillance, Security, Computers, Articles in Need of Additional Work |
| In Production | Yes |
| Official Website | https://www.intel.com/content/www/us/en/homepage.html |
The Intel Management Engine (ME) is an embedded microcontroller integrated into Intel's chipsets since 2008. From version 11 onwards, it runs a (closed-source) modified version of MINIX as its operating system.[1][2].
The ME is able to access the LAN adapter, giving it access to networks the system is connected to, both wired and wireless.[3]
The power state of the ME is independent from the rest of the system, allowing it to run while the system is turned off, assuming that the system is still receiving power.[1]
Additionally, Intel ME also contains several measures to check if it's been tampered with. These include being inaccessible to the machine BIOS or OS, scanning the entire machine every 30 minutes to verify if signature is signed (otherwise shutting down the system), and making it exceptionally difficult to reverse engineer.
Intel AMT
One of the services utilizing the capabilities of the Intel ME is Intel Active Management (AMT). It is part of a set of technologies marketed as Intel vPro. Intel AMT is built into most modern Intel CPUs, including but not limited to the Intel Core i5, Intel Core i7, Intel Core M, and Intel Xeon series. The AMT has full access to the system and can bypass system firewalls[3][4].
AMT allows remote management of the system by using the ME's network access, exposing 2 ports through which commands can be issued. Some of the many features of the AMT are:[3]
- Access to hardware information
- Remote power control
- Boot control
- Wake-on-LAN/Wake on wireless LAN
- Remote Schedule Maintenance (outside firewall)
- KVM (keyboard, video, mouse) remote control
- Updating firmware
Security
Intel ME follows security by obscurity, a concept that if people are unable to view the code, then it makes it more secure, however it's known to be ineffective and posing a huge security risks. Leaves many of these vulnerabilities unpatchable.
https://www.youtube.com/watch?v=D9BBXBZ5Ifs showcase 1 (2007-09-20)
https://www.youtube.com/watch?v=joeEBJeUfbk showcase 2 (both ysainthilaire
| Date | Description | CVE |
| 2009 | Developed by Invisible Things Lab, it was discovered that a bug allowed it to access the machine memory. [5][6][7] | CVE-2008-1234 |
| 2010 | An individual by the name of Vassilios Vereris discovered an bypass that allow attackers to remotely enable Intel AMT.[6][8][7] | Can't Find |
| 2017 | Discovered by Maksim Malyutin from Embedi, a bug in Intel AMT allows an hacker to gain admin privileges from a remote location.[6] Reportedly, Intel new about this more than 5 years prior from the report SemiAccurate gave to intel, however it was dismissed for unknown reasons.[9] [10][11][6] | CVE-2017-5689.[12] |
| 2018 | Researchers at F-Secure discovered an exploit regarding Intel AMT that allows an hacker with physical access to the machine to bypass an user, BIOS, Bitlocker, and TPM passwords in a matter of 30 seconds. This bug is more severe against corporate laptops. [13][14][15][16] | no CVE number |
| 2020 | Several vulnerabilities were found in Intel AMT that allows hackers to add a root kit. [13][17] | CVE 2020-0535[18][19][20] |
Hidden Deals
Around 2017, an undocumented flag was discovered that, when set, disables a large portion of the ME. This feature appears to have been requested by the NSA.[2][21]
Tools and Tips
While Intel ME is normally not possible to be disable (except in some cases), there have been tools and tips developed to allow (partially) disabling the ME.[22]
- ME Cleaner Tool
- Using an CPU or Computer made before 2008.
- Buying Computers with Intel ME completely disabled like Purism and System76
See also
References
- ↑ 1.0 1.1 "What is Intel® Management Engine?". Intel. 2023-09-26. Retrieved 2026-02-04.
{{cite web}}: CS1 maint: url-status (link) - ↑ 2.0 2.1 Ermolov, Mark; Goryachy, Maxim (28 Aug 2017). "Disabling Intel ME 11 via undocumented mode". Positive Technologies. Retrieved 2026-02-04.
{{cite web}}: CS1 maint: url-status (link) - ↑ 3.0 3.1 3.2 "Getting Started with Intel® Active Management Technology". Intel. 2021-02-18. Retrieved 2026-02-04.
- ↑ "Intel® Active Management Technology Developers Guide". Intel. 2021-01-05. Retrieved 2026-02-04.
{{cite web}}: CS1 maint: url-status (link) - ↑ "Intel patches the Q35 bug". The Invisible Things Lab's blog. 2008-08-26. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ 6.0 6.1 6.2 6.3 "Intel Management Engine". Youtube. 2023-06-29. Retrieved 2026-02-03.
{{cite web}}:|first=missing|last=(help)CS1 maint: numeric names: authors list (link) CS1 maint: url-status (link) - ↑ 7.0 7.1 Robin, Thibaud (2025-03-02). "The Mysterious Story of a Troubling Intel Chip". TrackFlaw. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ "Disabling Intel ME in Firmware" (PDF). ecrsecurity. 2026-02-03. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ Demerjian, Charlie (2017-05-01). "Remote security exploit in all 2008+ Intel platforms". SemiAccurate. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ Armasu, Lucian (2017-05-02). "Intel AMT Vulnerability Shows Intel's Management Engine Can Be Dangerous". Tom's Hardware. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ "The Vulnerability Uncovered". UMA Technology. 2025-01-11. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ "CVE-2017-5689 Detail". Nist. 2017-05-02. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ 13.0 13.1 Waldman, Arielle (2020-09-09). "Intel patches critical flaw in Active Management Technology". TechTarget. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ Ashford, Warwick (2018-01-18). "F-Secure highlights another critical Intel security issue". TechTarget. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ Subramaniam, Vaidyanathan (2018-01-14). "Gone in 30 seconds: New Intel AMT exploit is scarier than you can ever fathom". Notebook Check. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ Armasu, Lucian (2018-01-12). "Intel AMT Allows BitLocker Bypass In Under A Minute". Tom's Hardware. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ Larabe, Michael (2020-09-08). "Intel AMT Hit By Another "Critical" Security Vulnerability". phoronix. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link) - ↑ "CVE-2020-0535 Detail". nist.gov. 2020-06-15. Retrieved 2026-02-03.
{{cite web}}:|first=missing|last=(help)CS1 maint: url-status (link) - ↑ "CVE-2020-0531". Nist. 2020-06-15. Retrieved 2026-02-03.
{{cite web}}:|first=missing|last=(help)CS1 maint: url-status (link) - ↑ "2020.2 IPU – Intel® CSME, SPS, TXE, AMT and DAL Advisory". Intel. 2020-11-10. Retrieved 2026-02-03.
{{cite web}}:|first=missing|last=(help)CS1 maint: url-status (link) - ↑ Claburn, Thomas (29 Aug 2017). "Intel ME controller chip has secret kill switch". The Register. Retrieved 2026-02-04.
{{cite web}}: CS1 maint: url-status (link) - ↑ "Intel's Management Engine". Purism. Retrieved 2026-02-04.
{{cite web}}: CS1 maint: url-status (link)
https://www.youtube.com/watch?v=Lr-9aCMUXzI
https://www.csoonline.com/article/562761/researchers-say-now-you-too-can-disable-intel-me-backdoor-thanks-to-the-nsa.html intel response to backdoor accusa
https://www.youtube.com/watch?v=RPC5f7EJN6U
[1] https://leeneubecker.com/intels-secret-backdoor-can-now-be-turned-off/
https://hackaday.com/2017/12/11/what-you-need-to-know-about-the-intel-management-engine/
https://www.youtube.com/watch?v=ZpXkJqTAY5Y
https://www.youtube.com/watch?v=lQ8k79yNH2A
turn all the above links into references, though as of writing this i do not have will power to continue.
- ↑ Portnoy, Erica; Eckersley, Peter (2017-05-08). "Intel's Management Engine is a security hazard, and users need a way to disable it". Electronic Frontier Foundation. Retrieved 2026-02-03.
{{cite web}}: CS1 maint: url-status (link)