Intel firmware vulnerability affecting some Genetec appliances

December 4, 2017

An important vulnerability affecting Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) has been announced by Intel, introducing new vulnerabilities for customers using some SV-16 and SV-32 models. 

An important vulnerability (INTEL-SA-00086) affecting Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) has been announced by Intel. These modules are embedded in a large number of Intel® Core™, Intel® Xeon® and Intel® Atom® processors.

This vulnerability makes it possible to load and execute arbitrary code outside the visibility of the user and operating system or cause a system crash. By using the INTEL-SA-00086 Detection Tool, we have determined that the following Genetec products are affected by this vulnerability: 
 
SV16 version 3
Potentially Vulnerable.
Patch available here
SV16 version 4
Vulnerable.
Patch available here
 
SV16 version 5
Vulnerable.
Patch available here
 
 
SV32 version 2
Vulnerable. 
Patch available here
 
 
SV32 version 3
Vulnerable. 
Patch available here
 
 
 
The SV version number can be found by opening the system item in the Windows Control Panel:
  • Right-click on the Windows Start button
  • Select "Control Panel"
  • Double-click on "System"
  • The SV version number can be found in the Model section
Genetec customers who are using the products listed above are urged to apply the respective patches as soon as possible.
Previous Article
Reducing the risk of cyberattacks
Reducing the risk of cyberattacks

Increasing your organization's cybersecurity can seem like a daunting task. But the following five steps ca...

Next Article
How to strengthen your cybersecurity posture with cloud services
How to strengthen your cybersecurity posture with cloud services

Cybersecurity is on all of our minds. Every other day, it seems like there’s news of another attack. As mor...