Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The Linux kernel modules are mei_me and mei. To check: modprobe -nr mei_me mei #dry run modprobe -r mei_me mei #to unload the module This will not persist across reboots.

There is also a lms package.

I don't know whether any of this is required for a remote exploit, or if it's only needed for local escallation.



Thanks.

Both "# modprobe -nr mei" and "# modprobe -nr mei_me" report that the module isn't found.


From my understanding, this exploit can work regardless of the operating system. I mean, if this Intel hardware can get network packets without the operating system being aware, then not having those modules loaded won't help.


Correct. This is only to close the local exploit route.


Right. And in my case, also no vPro on the CPU.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: