Intel SA-00086 Detection Tool User Guide
Intel SA-00086 Detection Tool User Guide
Intel SA-00086 Detection Tool User Guide
User Guide
Revision 1.01
November 2017
2 User Guide
Contents
1 Introduction ...................................................................................................... 4
Figures
Figure 1. Example of Intel–SA–00086–GUI Output to Screen ...................................................... 7
Figure 2. Example of Intel-SA-00086-Console Output ................................................................. 8
Tables
Table 1-1.
Intel-SA-00086 CVE Entries – Search at https://nvd.nist.gov/vuln/search ..................... 4
Table 2-1.
Intel-SA-00086 Console Command Line Switches ....................................................... 8
Table 2-2.
Meaning of the Risk Assessment in the Output ........................................................... 9
Table 2-3.
Intel-SA-00086 Console Return Codes .................................................................... 10
Table 2-4.
Intel-SA-00086 Console Output Values ................................................................... 10
Table 2-5.
Criteria to determine if a System is Vulnerable to Intel - SA-00086 Using the Intel-SA-
00086 Detection Tool ....................................................................................... 11
Table 2-6. iCLS Status Messages ........................................................................................... 11
§§
User Guide 3
Introduction
1 Introduction
This document will step you through multiple processes to detect the security
vulnerability described in Intel-SA00086. Read the Public Security Advisory at
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086 for more
information.
If you are a user of a single Windows* PC and you wish to determine its
status: We provide the Intel-SA-00086 Detection GUI application (Intel-SA-00086-
gui.exe) for local analysis of a single or standalone Windows* system.
If you are a user of a Linux* system and you wish to determine its status: We
provide the Intel-SA-00086 Detection console application (intel_sa00086.py) for
analysis of Linux* systems.
§§
4 User Guide
Using the Intel–SA–00086 Detection Tool
The Detection Tool is offered in two versions for Windows* and a single version for
Linux*.
• For Windows* there is an interactive GUI tool that, when run, discovers the
hardware and software details of the device and provides an indication of risk
assessment. This version is recommended when local evaluation of a Windows*
system is desired.
• The second version, for Linux* and Windows* is a console executable that can
perform the risk assessment and optionally save the detection information to the
Windows* registry (Windows* only), to an XML and/or text file. This version is
more convenient for IT administrators wishing to perform bulk detection
operations across multiple machines.
Linux*:
• Ubuntu* LTS 16.0.4 (for client), Redhat 7.2 (for Server)
User Guide 5
Using the Intel–SA–00086 Detection Tool
• Python* 2.7
• Local operating system administrative access
The console tool can be found in the DiscoveryTool subdirectory. The GUI tool can be
found in the DiscoveryTool.GUI directory.
6 User Guide
Using the Intel–SA–00086 Detection Tool
User Guide 7
Using the Intel–SA–00086 Detection Tool
Usage:
Intel-SA-00086-console.exe [[option...]]
-f, -writefile Specifies writing results to a file. The filename uses the
following format: <computername>.xml
-p <filepath>, The path to store the output file. If no path is specified, the file
-filepath <filepath> will be written to the directory that the tool is running from.
-h, -help, -? Displays these command line switches and their functions
8 User Guide
Using the Intel–SA–00086 Detection Tool
Message Meaning
Not Vulnerable The system meets the “Not Vulnerable” criteria described in
Identifying impacted systems using the INTEL-SA-00086 Detection
Tool
Maybe Vulnerable Tool could not communicate with the MEI/TXEI Driver. Platform
vulnerability cannot be ascertained.
Unknown • The tool did not receive a valid response when requesting hardware
inventory data from your computer. Contact the system
manufacturer for assistance in determining the vulnerability of this
system.
2.8 Results
Note: The amount of data returned by the Intel-SA-00086 Detection command will depend
on if the Intel manageability driver stack is loaded on to the system. If the Intel®
Management Engine Interface (MEI) driver is present there will be a more verbose set
of data available. Some of the fields may not be supported by the manufacturer.
User Guide 9
Using the Intel–SA–00086 Detection Tool
2.10 XML
If you choose to write results to an XML file, that file will be stored in the directory
that Intel-SA-00086-console.exe is executed from or the path specified in the
command line options. Information such as hardware inventory and OS is included.
10 HECI_NOT_INSTALLED
11 HECI_ERROR
10 User Guide
Using the Intel–SA–00086 Detection Tool
Table 2-5. Criteria to determine if a System is Vulnerable to Intel - SA-00086 Using the
Intel-SA-00086 Detection Tool
ME Version ME Versions 11.x.x.x with ME Versions: 11.8 and higher with SVN
SVN < 3 >=3
TXE Version TXE Versions 3.0.x.x with TXE Versions 3.1 and higher with SVN >=3
SVN < 3
SPS Version Operational and Recovery Operational and Recovery Milestone >=4
Milestones <=3 For example:
For example: • SPS_E5_04.01.04.001.0
Both the operational
and recovery versions • SPS_E5_04.01.03.005.0 • SPS_E5_04.00.04.001.0
must be checked for • SPS_E5_04.00.03.237.0 • SPS_E3_04.01.04.001.0
vulnerability • SPS_E3_04.01.03.026.0
Message Action
Service Intel® Capability Licensing Service • Insure iCLS client software is properly
TCP IP Interface is not installed. Install iCLS installed.
Client software.
Service Intel® TPM Provisioning Service is • Insure iCLS client is properly installed.
not installed. Install iCLS Client software. Contact your OEM if problem persists.
User Guide 11
Using the Intel–SA–00086 Detection Tool
Message Action
Service Intel® TPM Provisioning Service is • Insure TPM Provisioning service is running.
not running. Contact the OEM for support. Contact your OEM if problem persists.
iCLS software is installed and healthy, but • Contact the OEM for support
re-key has failed. Contact the OEM for
support.
Network is OK but iCLS Client may require • Configure iCLS Client proxy server settings
HTTP proxy server settings to be configured as specified in the message.
in: "%%ProgramData%%\\Intel\\iCLS
Client\\conf\\iclsProxy.conf".
Note that iCLS Client does not support auto
configuration scripts nor automatic proxy
detection.
§§
12 User Guide