* The information in this document is subject to change without notice.
Step 3: Download and run the firmware update tool provided by Toshiba.įor help finding your model number CLICK HERE Step 2: Review the INTEL-SA-00075 Detection Guide to assess if your PC has the impacted firmware.
If your PC is affected using the discovery tool, go to Step 3 below to locate your PC model and firmware availability.If you are unable to run the discovery tool follow the Step 2 below to determine if your PC is impacted by the Intel security advisory.If you determine that you do not have an Intel® AMT, Intel® SBA, or Intel® ISM capable system then no further action is required.Step 1: Determine if you have an Intel® AMT, Intel® SBA, or Intel® ISM capable system by running Intel's downloadable discovery tool, which will analyze your PC for the vulnerability. Intel® has provided the following mitigation options that may be used prior to the firmware being deployed:
Until firmware updates are available, it is recommended that people and companies using Toshiba PCs and devices that incorporate AMT, ISM or SBT to take steps to maintain the security of their systems and information.įor general guidance on this issue, please see this announcement from Intel. Toshiba is working closely with Intel® to validate their fix and ensure it works across Toshiba’s range of products. Toshiba PC's that were introduced in the market since 2010 which incorporate Intel® vPro™ CPU may be impacted. The vulnerability could enable a network attacker to remotely gain access to business PCs or devices that use these technologies. On May 1 2017, Intel® announced a security advisory regarding a critical firmware vulnerability in certain systems that utilize Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM) or Intel® Small Business Technology (SBT). Potential Security Impact: Remote escalation of privilege on provisioned systems or local escalation of privilege on unprovisioned systems. NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Intel® Active Management Technology (AMT), Escalation of Privilege Vulnerability