Intel firmware vulnerability affecting some Genetec appliances

December 4, 2017

An important vulnerability affecting Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) has been announced by Intel, introducing new vulnerabilities for customers using some SV-16 and SV-32 models. 

An important vulnerability (INTEL-SA-00086) affecting Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) has been announced by Intel. These modules are embedded in a large number of Intel® Core™, Intel® Xeon® and Intel® Atom® processors.

This vulnerability makes it possible to load and execute arbitrary code outside the visibility of the user and operating system or cause a system crash. By using the INTEL-SA-00086 Detection Tool, we have determined that the following Genetec products are affected by this vulnerability: 
 
SV16 version 3
Potentially Vulnerable.
Patch available here
SV16 version 4
Vulnerable.
Patch available here
 
SV16 version 5
Vulnerable.
Patch available here
 
 
SV32 version 2
Vulnerable. 
Patch available here
 
 
SV32 version 3
Vulnerable. 
Patch available here
 
 
 
The SV version number can be found by opening the system item in the Windows Control Panel:
  • Right-click on the Windows Start button
  • Select "Control Panel"
  • Double-click on "System"
  • The SV version number can be found in the Model section
Genetec customers who are using the products listed above are urged to apply the respective patches as soon as possible.
Previous Article
Giving cities a new way to manage parking
Giving cities a new way to manage parking

All year long, historical towns and streets in Europe are bustling with locals and vacationers who take tim...

Next Article
A cloud-first approach to city security
A cloud-first approach to city security

Securing a city doesn't come without challenges. Find out how moving to the cloud can help.