Created
November 21, 2017 19:27
-
-
Save jtl999/878fe851911b3201298c0c4f16d09097 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
root@angrybear:~/IntelME# python intel_sa00086.py | |
INTEL-SA-00086 Detection Tool | |
Copyright(C) 2017, Intel Corporation, All rights reserved | |
Application Version: 1.0.0.128 | |
Scan date: 2017-11-21 19:27:20 GMT | |
*** Host Computer Information *** | |
Name: angrybear | |
Manufacturer: Supermicro | |
Model: Super Server | |
Processor Name: Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz | |
OS Version: debian 8.9 (4.4.83-1-pve) | |
*** Intel(R) ME Information *** | |
Engine: Intel(R) Server Platform Services | |
Version: 4.1.3.22 (Operational) 4.1.3.22 (Recovery) | |
*** Risk Assessment *** | |
Based on the analysis performed by this tool: This system is vulnerable. | |
Explanation: | |
The detected version of the Intel(R) Server Platform Services firmware is considered vulnerable for INTEL-SA-00086. | |
Contact your system manufacturer for support and remediation of this system. | |
For more information refer to the SA-00086 Detection Tool Guide or the Intel security advisory Intel-SA-00086 at the following link: | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment