Intel is also offering a tool to help IT administrators discover machines built with the vulnerability Credit: Magdalena Petrova Next week, PC vendors will start rolling out patches that fix a severe vulnerability found in certain Intel-based business systems, including laptops, making them easier to hack. Intel on Friday released a new notice urging clients to take steps to secure their systems.The chipmaker has also released a downloadable tool that can help IT administrators and users discover whether a machine they own has the vulnerability.In addition, vendors including Fujitsu, HP, and Lenovo have released lists showing which products are affected and when the patches will roll out. The products include laptops from Lenovo’s ThinkPad line and HP’s EliteBook series, along with servers, and desktops. Some of the patches are slated to come in June.Computers running enterprise management features found in Intel-based firmware from the past eight years will have the bug. Specifically, the vulnerability resides in past versions of Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability. Fortunately, the vulnerability can only be exploited if these features have been enabled, according to security firm Embedi, which uncovered the bug. These enterprise features were designed to help businesses remotely manage, track and repair huge fleets of connected computers, including retail checkout systems, digital signs, and PCs.However, Intel’s firmware bug could allow a hacker to take over the PCs and devices that use these remote management technologies, the chipmaker said. In March, Intel learned about the vulnerability from a researcher at Embedi, a security product provider.On Friday, Embedi released more technical details about the Intel firmware bug, saying it could be exploited to remotely control a machine’s mouse and keyboard and even turn the computer on or off. “Which means, you can remotely load, execute any program to the target system,” Embedi said.The vulnerability also bypasses the machine’s authentication processes, so no knowledge of the password is needed, Embedi said.Until the patch becomes available, Intel is recommending users manually apply temporary fixes to address the threat. Users can also contact Intel’s customer support.If you have any ideas on this, send them to our Facebook page. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe