Intel (R) CSME Version Detection Tool User Guide
Intel (R) CSME Version Detection Tool User Guide
Tool
User Guide
November 2023
Introduction
You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning
Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter
drafted which includes subject matter disclosed herein.
No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service
activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with
your system manufacturer or retailer or learn more at intel.com.
Intel technologies may require enabled hardware, specific software, or services activation. Check with your system manufacturer
or retailer.
The products described may contain design defects or errors known as errata which may cause the product to deviate from
published specifications. Current characterized errata are available on request.
Intel disclaims all express and implied warranties, including without limitation, the implied warranties of merchantability, fitness
for a particular purpose, and non-infringement, as well as any warranty arising from course of performance, course of dealing, or
usage in trade.
All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
product specifications and roadmaps.
Copies of documents which have an order number and are referenced in this document may be obtained by calling 1-800-548-
4725 or visit www.intel.com/design/literature.htm.
Intel, and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
*Other names and brands may be claimed as the property of others.
2 User Guide
Introduction
Contents
1 Introduction ...................................................................................................... 5
2 Using the Intel® CSME Version Detection Tool ...................................................... 7
2.1 System Requirements ............................................................................. 8
2.2 Installing the Tool – Linux* ...................................................................... 8
2.3 Running the Linux* Console Tool .............................................................. 8
2.4 Installing the Tool – Windows* ................................................................. 8
2.5 Running the GUI Tool .............................................................................. 9
2.6 Running the Windows* Console Tool ....................................................... 12
3 Results ........................................................................................................... 15
3.1 Registry Location .................................................................................. 15
3.2 XML .................................................................................................... 15
3.3 Console Return Codes ........................................................................... 16
3.4 Console Output Values .......................................................................... 16
User Guide 3
Introduction
Table of Figures
Figure 1: Output example for a vulnerable system ............................................... 10
Figure 2: Output example for system that is not vulnerable .................................. 10
Figure 3: Output example for system not supported by the tool ............................. 11
Figure 4: Windows* Console Tool Options ........................................................... 12
Figure 5: Console Output Example ..................................................................... 13
Figure 6: Risk Assessment Logic ........................................................................ 14
Figure 7: Console Return Codes......................................................................... 16
Figure 8: Console Output Values ........................................................................ 17
4 User Guide
Introduction
1 Introduction
This document will guide you through multiple processes to detect the
following security vulnerabilities:
• SA-00086
• SA-00125
• SA-00213
• SA-00241
• SA-00295
• SA-00404
• SA-00391
• SA-00459
• SA-00470
• SA-00610
• SA-00613
• SA-00783
• SA-00923
For more information, refer to the relevant Intel Security Advisory list
at https://www.intel.com/content/www/us/en/support/articles/000031784/technologi
es.html.
If you are a user of a Linux* system and you wish to determine its
status:
User Guide 5
Introduction
6 User Guide
Using the Intel® CSME Version Detection Tool
The Intel® CSME Version Detection Tool can be used by local users or by
an IT administrator to determine whether a system is vulnerable to the
exploits documented in one or more of the following security advisories:
• SA-00086
• SA-00125
• SA-00213
• SA-00241
• SA-00295
• SA-00404
• SA-00391
• SA-00459
• SA-00470
• SA-00610
• SA-00613
• SA-00783
• SA-00923
The Detection Tool is offered in two versions for Windows* and in a single
version for Linux*:
• For Windows* there is an interactive GUI tool that retrieves the device’s
hardware and software details and provides an indication of risk assessment.
This version is recommended for evaluating a single local Windows* system.
• The second version, for Linux* and Windows*, is a console executable that
can perform the risk assessment and optionally save the detection information
to the Windows* registry (Windows* only), to an XML file, and/or to a text
file. This version is more convenient for IT administrators who need to perform
bulk detection operations across multiple machines.
User Guide 7
Using the Intel® CSME Version Detection Tool
• Administration privileges
Linux*:
• Ubuntu* LTS 16.04 (for client), Redhat 7.2 (for Server)
• Python* 2.6.6
- intel_csme_version_detection_tool
Note: If Python 3.x (and not Python 2.x) is installed, execute the command:
sudo python3 intel_csme_version_detection_tool
The console tool can be found in the DiscoveryTool subdirectory. The GUI tool can be
8 User Guide
Using the Intel® CSME Version Detection Tool
User Guide 9
Using the Intel® CSME Version Detection Tool
Following is an example of the program’s output when run on a system that is not
vulnerable:
10 User Guide
Using the Intel® CSME Version Detection Tool
Following is an example of the program’s output when run on a system that is not
supported by the tool:
Note: *On SPS platforms, the recovery version is displayed in the Intel® ME
Information section.
Note: If the tool displays a “Not Supported” message, and your Intel® ME version is
between 6.x and 10.x, refer to https://downloadcenter.intel.com/download/29057/
for the tool that is applicable for your platform.
User Guide 11
Using the Intel® CSME Version Detection Tool
12 User Guide
Using the Intel® CSME Version Detection Tool
The following table describes the logic that is used to determine a risk assessment:
User Guide 13
Using the Intel® CSME Version Detection Tool
Message Meaning
• SA-00086
• SA-00125
• SA-00213
• SA-00241
• SA-00295
Vulnerable • SA-00404
• SA-00391
• SA-00459
• SA-00470
• SA-00610
• SA-00613
• SA-00783
• SA-00923
May Be Tool could not communicate with the Intel® MEI/TXEI Driver. Platform
Vulnerable vulnerability cannot be ascertained.
The tool did not receive a valid response when requesting hardware inventory
Unknown data from your computer. Contact the system manufacturer for assistance in
determining the vulnerability of this system.
Firmware versions of Intel® ME 3.x thru 10.x, Intel® TXE 1.x thru 2.x and Intel®
Not Server Platform Services 1.x thru 2.x are no longer supported, thus were not
Supported assessed for the vulnerabilities/CVEs listed in these security advisories There is
no new release planned for these versions.
14 User Guide
Results
3 Results
The amount of data returned by the Intel-CSME-Detection command depends on
whether the Intel manageability driver stack is loaded onto the system. If the Intel®
Management Engine Interface (Intel® MEI) driver is present, a more verbose set of
data will be displayed. Some of the fields may not be supported by the manufacturer.
Under this location, System Status/System Risk contains the vulnerability status
and System Status/System Risk Value contains the application’s return code.
3.2 XML
If you choose to write results to an XML file, that file will be stored in the directory
from which you executed CSME-Version-Detection-Tool-console.exe or in the
path specified by the command line options. The results include information such as
hardware inventory and OS. The filename will have the format
CSME-Version-Detection-Tool-<ComputerName>-<date>-<Time>.xml.
User Guide 15
Results
Application
Version of the scanning tool used
Version
Computer
Hardware inventory Name of the computer scanned
Name
Computer
Computer’s manufacturer
Manufacturer
Computer
Computer’s model
Model
*** Risk
Refer to Figure 6: Risk
Assessment Risk Assessment
Assessment Logic
***
16 User Guide
Results
User Guide 17
Troubleshooting Signature Validation Issues
4 Troubleshooting Signature
Validation Issues
The Detection tool makes every effort to validate its own authenticity before running.
In the event that the tool cannot validate itself, a message similar to the following is
displayed:
The signature of the file cannot be validated. Please refer to the Intel® CSME Version
Detection Tool user guide for more information.
Note: In case of a validation issue, you should ensure that the latest Root Certificate
update for Windows* has been installed. For more information, refer to
https://support.microsoft.com/en-us/help/931125/how-to-get-a-root-
certificateupdate-for-windows
18 User Guide