Intel (R) CSME Detection Tool For Legacy Systems User Guide
Intel (R) CSME Detection Tool For Legacy Systems User Guide
Tool
User Guide
September 2019
Introduction
You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning
Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter
drafted which includes subject matter disclosed herein.
No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service
activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with
your system manufacturer or retailer or learn more at intel.com.
Intel technologies may require enabled hardware, specific software, or services activation. Check with your system manufacturer
or retailer.
The products described may contain design defects or errors known as errata which may cause the product to deviate from
published specifications. Current characterized errata are available on request.
Intel disclaims all express and implied warranties, including without limitation, the implied warranties of merchantability, fitness
for a particular purpose, and non-infringement, as well as any warranty arising from course of performance, course of dealing, or
usage in trade.
All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
product specifications and roadmaps.
Copies of documents which have an order number and are referenced in this document may be obtained by calling 1-800-548-
4725 or visit www.intel.com/design/literature.htm.
Intel, and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
*Other names and brands may be claimed as the property of others.
2 User Guide
Introduction
Contents
1 Introduction ...................................................................................................... 5
2 Using the Intel CSME Legacy Detection Tool .......................................................... 6
2.1 Obtaining the Intel CSME Legacy Detection Tool ......................................... 6
2.2 System Requirements ............................................................................. 6
2.3 Installing the Tool – Linux* ...................................................................... 7
2.4 Running the Linux* Console Tool .............................................................. 7
2.5 Installing the Tool – Windows* ................................................................. 7
2.6 Running the GUI Tool .............................................................................. 8
2.7 Running the Windows* Console Tool ......................................................... 9
3 Results ........................................................................................................... 11
3.1 Registry Location .................................................................................. 11
3.2 XML .................................................................................................... 11
3.3 Console Return Codes ........................................................................... 11
3.4 Console Output Values .......................................................................... 12
4 Using the Intel SA-00125 Detection Tool to Identify Impacted Systems .................. 13
5 Troubleshooting Signature Validation Issues ....................................................... 14
User Guide 3
Introduction
Table of Figures
Figure 1: Program Screen Output Example for Vulnerable System ........................... 8
Figure 2: Output Example for System that is Not Vulnerable ................................... 9
Figure 3: Windows* Console Tool Options ........................................................... 10
Figure 4: Intel-Legacy Console Output Example................................................... 10
Figure 5: Risk Assessment Logic ........................................................................ 10
Figure 6: Console Return Codes......................................................................... 12
Figure 7: Console Output Values ........................................................................ 12
Figure 8: Criteria for Determining Whether a System is Vulnerable ........................ 13
4 User Guide
Introduction
1 Introduction
This document will guide you through multiple processes to detect the security
vulnerability described in Intel-SA00086 on platforms running Intel® Management
Engine firmware versions 6.x through 10.x.
For more information, refer to the relevant Intel Security Advisory list at
https://www.intel.com/content/www/us/en/support/articles/000031784/technologies.
html.
Note: This tool is for use only on platforms running Intel® Management Engine
firmware versions 6.x through 10.x. If your platform is running a later version of
firmware, use the tool at https://downloadcenter.intel.com/download/28632.
If you are a user of a single Windows* PC and you wish to determine its
status:
We have provided the Intel Legacy Detection GUI application
(CSME-Detection-Tool-Legacy-GUI.exe) for local analysis of a single or standalone
Windows* system.
If you are a user of a Linux* system and you wish to determine its status:
We have provided the Intel Legacy Detection Console application
(intel_csme_detection_tool_legacy) for analysis of Linux* systems.
User Guide 5
Using the Intel CSME Legacy
Detection Tool
The Intel Legacy Detection Tool can be used by local users or an IT administrator
to determine whether a system running Intel® Management Engine firmware versions
6.x through 10.x is vulnerable to the exploit documented in Intel
Security Advisory Intel-SA-000086.
The Detection Tool is offered in two versions for Windows* and in a single version for
Linux*.
For Windows* there is an interactive GUI tool that retrieves the device’s
hardware and software details and provides an indication of risk assessment.
This version is recommended for evaluating a local Windows* system.
The second version, for Linux* and Windows*, is a console executable that
can perform the risk assessment and optionally save the detection information
to the Windows* registry (Windows* only), to an XML file, and/or to a text
file. This version is more convenient for IT administrators who need to perform
bulk detection operations across multiple machines.
Administration privileges
Linux*:
Python* 2.6.6
6 User Guide
Using the Intel CSME Legacy
Detection Tool
Note: If Python 3.x (and not Python 2.x) is installed, execute the command:
sudo python3 intel_csme_detection_tool_legacy
The console tool can be found in the DiscoveryTool subdirectory. The GUI tool can be
User Guide 7
Using the Intel CSME Legacy
Detection Tool
8 User Guide
Using the Intel CSME Legacy
Detection Tool
Following is an example of the program’s output when run on a system that is not
vulnerable:
User Guide 9
Using the Intel CSME Legacy
Detection Tool
Message Meaning
May Be Tool could not communicate with the Intel® MEI/TXEI Driver. Platform
Vulnerable vulnerability cannot be ascertained.
The tool did not receive a valid response when requesting hardware
inventory data from your computer. Contact the system manufacturer
for assistance in determining the vulnerability of this system.
Unknown This message may be received on a server platform without a PMX Driver
installed. This driver may be not available on all versions of Windows*
OS. If the driver is not present, the recommended workaround is to
run spsInfo or spsManuf application provided with SPS Firmware
release. Both applications will install the PMX Driver.
Firmware versions of Intel® ME 3.x thru 5.x, Intel® TXE 1.x thru 2.x and Intel®
Not Server Platform Services 1.x thru 2.x are no longer supported, thus were not
Supported assessed for the vulnerabilities/CVEs listed in these security advisories There is
no new release planned for these versions.
This tool is applicable for Intel(R) Management Engine versions 6.x-10.x only.
Not
Please use the detection tool located at
applicable
https://downloadcenter.intel.com/download/28632 for this platform.
10 User Guide
Results
3 Results
The amount of data returned by the Intel-Legacy Detection command depends on
whether the Intel manageability driver stack is loaded onto the system. If the
Intel® Management Engine Interface (Intel® MEI) driver is present, a more verbose set
of data is displayed. Some of the fields may not be supported by the manufacturer.
Under this location, System Status/System Risk contains the vulnerability status
and System Status/System Risk Value contains the application’s return code.
3.2 XML
If you choose to write results to an XML file, that file will be stored in the directory
from which you executed Intel-legacy-console.exe or in the path specified by the
command line options. The results include information such as hardware inventory
and OS. The filename will have the format
CSME-Detection-Tool-Legacy -<ComputerName>-<date>-<Time>.xml.
User Guide 11
Results
Application
Version of the scanning tool used
Version
Computer
Name of the computer scanned
Name
*** Risk
Refer to Figure 5: Risk
Assessment Risk Assessment
Assessment Logic
***
12 User Guide
Using the Intel SA-00125 Detection Tool to Identify Impacted Systems
User Guide 13
Troubleshooting Signature Validation Issues
5 Troubleshooting Signature
Validation Issues
The Detection tool, as a tool that runs with administrative privileges, makes every
effort to validate its own authenticity before running.
14 User Guide