From WikiChip
Editing intel/management engine

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

This page supports semantic in-text annotations (e.g. "[[Is specified as::World Heritage Site]]") to build structured and queryable content provided by Semantic MediaWiki. For a comprehensive description on how to use annotations or the #ask parser function, please have a look at the getting started, in-text annotation, or inline queries help pages.

Latest revision Your text
Line 21: Line 21:
 
| SEC/TXE || colspan="2" | Bay Trail (SoC) || {{intel|Silvermont|l=arch}} || {{arch|32}} [[SPARC]] {{sparc|V8}} MCU
 
| SEC/TXE || colspan="2" | Bay Trail (SoC) || {{intel|Silvermont|l=arch}} || {{arch|32}} [[SPARC]] {{sparc|V8}} MCU
 
|-
 
|-
| 6.x || {{intel|Ibex Peak|l=chipset}} || 5 || {{intel|Nehalem|l=arch}} || rowspan="5" | {{arch|32}} [[ARC]] MCU
+
| 6.x || Ibex Peak || 5 || {{intel|Nehalem|l=arch}} || rowspan="5" | {{arch|32}} [[ARC]] MCU
 
|-
 
|-
| 7.x || {{intel|Cougar Point|l=chipset}} || 6 ||  {{intel|Sandy Bridge|l=arch}}
+
| 7.x || Cougar Point || 6 ||  {{intel|Sandy Bridge|l=arch}}
 
|-
 
|-
| 8.x || {{intel|Panther Point|l=chipset}} || 7 ||  {{intel|Ivy Bridge|l=arch}}
+
| 8.x || Panther Point || 7 ||  {{intel|Ivy Bridge|l=arch}}
 
|-
 
|-
| 9.x || {{intel|Lynx Point|l=chipset}} || 8 ||  {{intel|Haswell|l=arch}}
+
| 9.x || Lynx Point || 8 ||  {{intel|Haswell|l=arch}}
 
|-
 
|-
| 10.x || {{intel|Wildcat Point|l=chipset}} || 9 ||  {{intel|Broadwell|l=arch}}
+
| 10.x || Wildcat Point || 9 ||  {{intel|Broadwell|l=arch}}
 
|-
 
|-
| 11.x || {{intel|Sunrise Point|l=chipset}} || 100 ||  {{intel|Skylake|l=arch}} || rowspan="6" | {{arch|32}} {{intel|Quark}} [[x86]] MCU
+
| 11.x || Sunrise Point || 100 ||  {{intel|Skylake|l=arch}} || rowspan="5" | {{arch|32}} {{intel|Quark}} [[x86]] MCU
 
|-
 
|-
| 11.x || {{intel|Union Point|l=chipset}} || 200 ||  {{intel|Kaby Lake|l=arch}}
+
| 11.x || Union Point || 200 ||  {{intel|Kaby Lake|l=arch}}
|-
 
| 12.x || {{intel|Cannon Point|l=chipset}} || 300 ||  {{intel|Coffee Lake|l=arch}}
 
|-
 
| 13.x || {{intel|Ice Lake|l=chipset}} || 495 ||  {{intel|Ice Lake|l=arch}}
 
|-
 
| 14.x || {{intel|Comet Lake|l=chipset}} || 400 ||  {{intel|Comet Lake|l=arch}}
 
 
|-
 
|-
 +
| 11.x || ? || 300 ||  {{intel|Coffee Lake|l=arch}}
 
|}
 
|}
  
Line 51: Line 46:
 
=== Historical Mechanism ===
 
=== Historical Mechanism ===
 
[[File:intel management engine.png|right|400px]]
 
[[File:intel management engine.png|right|400px]]
Originally, ME was a {{arch|32}} [[ARCompact]] microcontroller running ThreadX, a [[real-time OS]]. The firmware that was running was developed internally by Intel and provided key management support, access control, and other administrative services. The MCU supported SRAM and DRAM that is isolated from the host processor. Persistent data was stored in flash memory which was accessible by the [[SPI]] bus which stored things such as Intel's AT-d metadata. Data is encrypted in AES-CTR mode using the platform container key (PCK).
+
Originally, ME was a {{arch|32}} [[ARCompact]] microcontroller running ThreadX, a [[read-time OS]]. The firmware that was running was developed internally by Intel and provided key management support, access control, and other administrative services. The MCU supported SRAM and DRAM that is isolated from the host processor. Persistent data was stored in flash memory which was accessible by the [[SPI]] bus which stored things such as Intel's AT-d metadata. Data is encrypted in AES-CTR mode using the platform container key (PCK).
  
 
ME was connected to both the host driver through an internal bus called the '''Host Embedded Controller Interface''' ('''HECI''') . HECI is bidirectional bus that offers a direct line of communication between the Management Engine and the host OS. ME can also control various aspects of the Virtualization Engine directly over the '''ME Command Interface''' ('''MECI'''). ME also has access to the on-board network interface devices and Intel noted that ME has access to those interfaces even when the system is in [[C-states|low-power states]] and [[Sleep mode]]. Network resources are shared between the ME and the host OS without the host OS ever being aware of this (although Intel stated that some special monitoring tools can be used to detect it).
 
ME was connected to both the host driver through an internal bus called the '''Host Embedded Controller Interface''' ('''HECI''') . HECI is bidirectional bus that offers a direct line of communication between the Management Engine and the host OS. ME can also control various aspects of the Virtualization Engine directly over the '''ME Command Interface''' ('''MECI'''). ME also has access to the on-board network interface devices and Intel noted that ME has access to those interfaces even when the system is in [[C-states|low-power states]] and [[Sleep mode]]. Network resources are shared between the ME and the host OS without the host OS ever being aware of this (although Intel stated that some special monitoring tools can be used to detect it).
Line 67: Line 62:
  
 
== Vulnerabilities ==
 
== Vulnerabilities ==
{{collist
+
* {{cve|CVE-2017-5689}}
| count = 3
 
|
 
* CVE-2016-8224
 
* CVE-2017-5689
 
* CVE-2017-5698
 
* CVE-2017-5705
 
* CVE-2017-5706
 
* CVE-2017-5707
 
* CVE-2017-5708
 
* CVE-2017-5709
 
* CVE-2017-5710
 
* CVE-2017-5711
 
* CVE-2017-5712
 
* CVE-2018-3627
 
* CVE-2018-3628
 
* CVE-2018-3629
 
* CVE-2018-3632
 
}}
 
  
 
== Secure Coprocessors ==
 
== Secure Coprocessors ==
Line 93: Line 70:
 
* {{intel|Innovation Engine}} (IE)
 
* {{intel|Innovation Engine}} (IE)
  
== Bibliography ==
+
== References ==
 
* "Storage Protection with Intel® Anti-Theft Technology - Data Protection (Intel® AT-d)", Ned Smith. Intel Technology Journal, Volume 12, Issue 4, 2008.
 
* "Storage Protection with Intel® Anti-Theft Technology - Data Protection (Intel® AT-d)", Ned Smith. Intel Technology Journal, Volume 12, Issue 4, 2008.
 
* REcon 2014, "[https://www.youtube.com/watch?v=4kCICUPc9_8 Intel Management Engine Secrets]", Igor Skochinsky. ([https://recon.cx/2014/slides/Recon%202014%20Skochinsky.pdf Presentation])
 
* REcon 2014, "[https://www.youtube.com/watch?v=4kCICUPc9_8 Intel Management Engine Secrets]", Igor Skochinsky. ([https://recon.cx/2014/slides/Recon%202014%20Skochinsky.pdf Presentation])

Please note that all contributions to WikiChip may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see WikiChip:Copyrights for details). Do not submit copyrighted work without permission!

Cancel | Editing help (opens in new window)