Intel® Active Management Technology Software Development Kit Remote Code Execution
Intel® Active Management Technology (Intel® AMT) Software Development Kit (SDK) is the development framework for the independent software vendors (ISVs) to develop manageability applications that interact with Intel® AMT-enabled systems. Updated software which corrects a potential stack overflow issue is available for the ISVs to update their applications developed using the SDK.
This issue does not affect Intel® Active Management Technology implementation on Intel® vProTMtechnology based platforms.
Intel AMT enabled management console applications developed by the independent software vendors (ISVs) using the SDK prior to the public release of Intel® AMT SDK Release 6.0 may be affected by this issue. The potential vulnerability in the SDK's redirection libraries could allow an unauthenticated attacker to insert malicious code during the redirection session establishment. Intel has released a software update to the SDK for the ISVs to resolve this issue.
For AMT management console application developers: The ISVs utilizing this SDK should replace the redirection libraries in their application from the updated SDK and provide software update recommendation to the application users.
For AMT management console application users: The users of the AMT management console application should contact the respective application provider to determine if their application may be affected.
While Intel is not aware of any use of the potential vulnerability described in this advisory, Intel has made changes to Intel® AMT SDK to resolve this issue. Intel highly recommends the independent software vendors (ISVs) to include the updated libraries into their affected application. The updated SDK which resolves this issue is available at http://software.intel.com/en-us/articles/download-the-latest-intel-amt-software-development-kit-sdk/.
Libraries to be replaced for Windows*:
Libraries to be replaced for Linux*:
It is expected that the ISVs would provide corresponding software updates to their affected application users.
* other brands and names may be claimed as the property of others.
Legal Notices and Disclaimers
Intel provides these materials as-is, with no express or implied warranties.
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://intel.com.
Some results have been estimated or simulated using internal Intel analysis or architecture simulation or modeling, and provided to you for informational purposes. Any differences in your system hardware, software or configuration may affect your actual performance.
Intel and the Intel logo are trademarks of Intel Corporation in the United States and other countries.
*Other names and brands may be claimed as the property of others.
Copyright © Intel Corporation 2019
Report a Vulnerability
If you have information about a security issue or vulnerability with an Intel branded product or technology, please send an e-mail to email@example.com. Encrypt sensitive information using our PGP public key.
Please provide as much information as possible, including:
- The products and versions affected
- Detailed description of the vulnerability
- Information on known exploits
A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:
For issues related to Intel's external web presence (Intel.com and related subdomains), please contact Intel's External Security Research team.