so someone with root privileges who logs in locally could take over the machine?


I'm guessing local admin is more of a Windows concept.


________________________________
From: aholt...@gmail.com <aholt...@gmail.com> on behalf of Adam Holt 
<h...@laptop.org>
Sent: Monday, October 10, 2016 9:55 AM
To: xsce-devel; server-devel
Subject: [XSCE] NUCs Vulnerable to SMM Exploit (System Management Mode)


"pretty much all NUCs from 2015 and 2016 are vulnerable to this.

The issue has been fixed in the BIOS versions that were released earlier in 
September..."

http://nucblog.net/2016/10/security-nucs-vulnerable-to-smm-exploit/

Security Alert: NUCs Vulnerable to SMM Exploit - The NUC 
Blog<http://nucblog.net/2016/10/security-nucs-vulnerable-to-smm-exploit/>
nucblog.net
Intel has released on Monday a security advisory regarding a flaw in the Intel 
NUC BIOS. This flaw allows a user with local administrative right to access the 
system management mode (SMM) and take...



http://www.fanlesstech.com/2016/10/alert-major-nuc-security-flaw.html

[https://3.bp.blogspot.com/-9H0ehzTKRBY/V_QfMfS-LzI/AAAAAAAALRc/xIuOwXQra2oJvgy1sPzIHsKDb5dkac2zACLcB/w1200-h630-p-nu/nuc.jpg]<http://www.fanlesstech.com/2016/10/alert-major-nuc-security-flaw.html>

ALERT: Major NUC security 
flaw<http://www.fanlesstech.com/2016/10/alert-major-nuc-security-flaw.html>
www.fanlesstech.com
Intel is releasing updated BIOS firmware for a privilege escalation issue. This 
issue affects Intel NUC Kits listed in the affected produ...


_______________________________________________
Server-devel mailing list
Server-devel@lists.laptop.org
http://lists.laptop.org/listinfo/server-devel

Reply via email to