Support

Intel® Active Management Technology WPA/WPA2 Protocol Vulnerability (Intel-SA-00101)


Last Reviewed: 11-Jan-2018
Article ID: 000025842

INTEL-SA-00101 Intel® Wi-Fi Protected Access II (WPA2) Protocol Vulnerability

The Industry Consortium for Advancement of Security on the Internet (ICASI) and CERT CC notified Intel Corporation about the identified Wi-Fi Protected Access II (WPA2) standard protocol vulnerability. Intel is an ICASI Charter member and part of the coordinated disclosure of this issue. Intel is working with its customers and system manufacturers to implement and validate firmware and software updates that address the vulnerability. For more details, refer to Intel’s security advisory on this vulnerability - INTEL-SA-00101.

Intel is targeting an updated AMT firmware release to System Manufacturers in early November 2017 to address the identified WPA2 vulnerabilities. Contact your system manufacturer for information on the availability of the updated firmware for your systems.

Until the firmware update is deployed, configuring Intel® Active Management Technology in TLS Mode to encrypt manageability network traffic is considered a reasonable mitigation for remote network man-in-the-middle or eavesdropping attacks. See Section 5.10 Defining Transport Layer Security (TLS) in the Intel® Setup and Configuration Software (Intel® SCS) Users Guide for details.

Intel® WiFi adapter drivers may also be affected. Visit the Intel® Wi-Fi Wireless Protected Access II (WPA2) support page for additional details.

If you need further assistance, contact Intel Online Service Center to submit an online service request.

This article applies to: