solution Contentsolution Content

SUPPORT COMMUNICATION- SECURITY BULLETIN

Document ID: c05888592

Version: 3

HPSBHF03576 rev. 3 - Intel AMT MEBx Bypass

Notice: The information in this security bulletin should be acted upon as soon as possible.

Release date : 18-Jan-2018

Last updated : 05-Jul-2018

Potential Security Impact:
Elevation of Privilege/Information Disclosure.
Reported by: F-Secure, Google

VULNERABILITY SUMMARY
Un-provisioned Intel® vPro™ platforms containing Intel® Active Management Technology (Intel® AMT) are vulnerable to unauthorized local provisioning via physical access. The attack involves accessing the MEBx ( Management Engine BIOS Extensions) menu via the default MEBx password. When the device is shipped or if the coin cell battery is removed, MEBx uses the default password.
Note that Intel® AMT must be enabled to have the capability of being provisioned.
For non-vPro™ SKUs, Intel® AMT is not supported and the system is not affected.
Reference Number
PSR-2017-0115
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
See the RESOLUTION section for impacted products.
BACKGROUND
For a PGP signed version of this security bulletin please write to: hp-security-alert@hp.com.
CVSS 3.0 Base Metrics
Reference
Base Vector
Base Score
N/A
CVSSv3: AV:P/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H
4.5
RESOLUTION
This bulletin will be updated; check back frequently for updates.
The following platforms have an updated BIOS that protects the MEBx menu when the BIOS Admin password is created. Access to the MEBx menu will require a BIOS Admin password when the BIOS Admin is created. HP strongly recommends customers to setup a BIOS admin password.
MITIGATION
For platforms without an updated BIOS, HP strongly urges customers to do the following:
  • Change the MEBx password from the default setting.
  • Set BIOS Admin password.
  • Add power-on password to BIOS via F10. Adding this password will subsequently require physical presence from the user before system completes boot. It will also prevent the attacker from accessing MEBx.
  • Check USB Provisioning in F10 to ensure it is disabled in the system BIOS.
Product Name
Fixed Version(s)
SoftPaq#
SoftPaq Link
HP Elite Slice
2.16
SP87327
HP Elite x2 1011 G1 Tablet
1.22
SP87489
HP Elite x2 1012 G1
1.3
SP87110
HP Elite x2 1012 G2 Tablet
1.16
SP87225
HP EliteBook 1030 G1
1.16
SP87223
HP EliteBook 1040 G3
1.22
SP87196
HP EliteBook 1040 G4
1.18
SP87429
HP EliteBook 2170p Notebook PC
F.69
SP87506
HP EliteBook 2570p Notebook PC
F.70
SP87504
HP EliteBook 720 G1 Notebook PC
1.44
SP87482
HP EliteBook 720 G2 Notebook PC
1.25
SP87488
HP EliteBook 740 G1 Notebook PC
1.44
SP87482
HP EliteBook 740 G2 Notebook PC
1.25
SP87488
HP EliteBook 750 G1 Notebook PC
1.44
SP87482
HP EliteBook 750 G2 Notebook PC
1.25
SP87488
HP EliteBook 820 G1 Notebook PC
1.44
SP87482
HP EliteBook 820 G2 Notebook PC
1.25
SP87488
HP EliteBook 820/840/848 G4; Zbook 15u G4
1.16
SP87115
HP EliteBook 840 G1 Notebook PC
1.44
SP87482
HP EliteBook 840 G2 Notebook PC
1.25
SP87488
HP EliteBook 840/848/850 G3, 820/828 G3
1.25
SP87117
HP EliteBook 8470p Notebook PC
F.71
SP87467
HP EliteBook 8470w Mobile Workstation
F.71
SP87467
HP EliteBook 850 G1 Notebook PC
1.44
SP87482
HP EliteBook 850 G2 Notebook PC
1.25
SP87488
HP EliteBook 8570p Notebook PC
F.71
SP87467
HP EliteBook 8570w Mobile Workstation
F.68
SP87465
HP EliteBook 8770w Mobile Workstation
F.68
SP87465
HP EliteBook Folio 1020 G1/Special Notebook PC
1.2
SP87493
HP EliteBook Folio 1040 G1 Notebook PC
1.4
SP87484
HP EliteBook Folio 1040 G2 Notebook PC
1.13
SP87490
HP EliteBook Folio 9470m Notebook PC
F.70
SP87466
HP EliteBook Folio 9480m Notebook PC
1.43
SP87494
HP EliteBook Folio G1
1.22
SP87111
HP EliteBook Revolve 810 G1
F.70
SP87469
HP EliteBook Revolve 810 G2
1.41
SP87485
HP EliteBook Revolve 810 G3
1.15
SP87495
HP EliteBook x360 1020 G2
1.17
SP87190
HP EliteBook x360 1030 G2
1.19
SP87758
HP EliteDesk 800 G2
2.29
SP87215
HP EliteDesk 800 G3 DM
02.16/01.26
SP87254
HP EliteDesk 800 G3 MT/SFF
02.16/01.26
SP87228
HP EliteDesk Mini 800 G2
2.33
SP87247
HP EliteOne 1000 G1 AiO
02.16/01.26
SP87269
HP EliteOne 800 G2
2.29
SP87241
HP EliteOne 800 G3 AIO
02.16/01.26
SP87251
HP ElitePOS G1 Retail System
2.16
SP87272
HP Pro x2 612 G1 Tablet
1.45
SP87476 
HP Pro x2 612 G2
1.15
SP87236
HP ProBook 640 G1 Notebook PC
1.44
SP87503
HP ProBook 640/650 G2
1.19
SP87217
HP ProBook 640/650 G3
1.19
SP87183
HP ProBook 6470b Notebook PC
F.71
SP87467
HP ProBook 650 G1 Notebook PC
1.44
SP87503
HP ProBook 650 G3
1.19
SP87183
HP ProBook 6570b Notebook PC
F.71
SP87467
HP ProBook x360 11 G2
1.16
SP87186
HP ProDesk 600 G2 DM
2.28
SP87248
HP ProDesk 600 G2 MT/SFF
2.29
SP87220
HP ProDesk 600 G3 DM
02.16/01.26
SP87255
HP ProDesk 600 G3 MT
02.16/01.26
SP87230
HP ProDesk 600 G3 SFF
02.16/01.26
SP87242
HP ProOne 600 G2
2.27
SP87244
HP ProOne 600 G3 AIO
02.16/01.26
SP87252
HP RP9 G1 Retail System
2.19
SP87271
HP RP9 G1 Retail System (KBL)
2.19
SP87271
HP ZBook 14 G1 Mobile Workstation
1.44
SP87482
HP ZBook 14 G2 Mobile Workstation
1.25
SP87488
HP ZBook 15 G2 Mobile Workstation
1.21
SP87486
HP ZBook 15 Mobile Workstation
1.41
SP87481
HP ZBook 15u G1 Mobile Workstation
1.44
SP87482
HP ZBook 15u G2 Mobile Workstation
1.25
SP87488
HP Zbook 17 G2 Mobile Workstation
1.21
SP87486
HP Zbook 17 Mobile Workstation
1.41
SP87481
HP Zbook 17/15 G3
1.25
SP87193
HP Zbook Studio G3
1.26
SP87194
HP Zbook Studio G4
1.18
SP87189
...
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, visit http://www.hp.com/go/contacthp to learn about your HP support options.
Report: To report a potential security vulnerability with any HP supported product, send email to: hp-security-alert@hp.com.
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via email, visit https://h41369.www4.hp.com/alerts-signup.php?lang=en&cc=US&jumpid=hpsc_profile.
Security Bulletin Archive: To view released Security Bulletins, search the HP Support Site for "security bulletin".
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
PI
HP Printing and Imaging
HF
HP Hardware and Firmware
GN
HP General Software
It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
Subject: get key
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
REVISION HISTORY : Version 1: 18 January 2018 Initial publication; Version 2: 21 May 2018, added platform list, mitigation section; Version 3: 5 July 2018, updated platform list.

HP Inc. shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. HP Inc. and the names of HP products referenced herein are trademarks of HP Inc. in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.