CINXE.COM

Intel Management Engine - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-sticky-header-enabled vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Intel Management Engine - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-sticky-header-enabled vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy","wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"4465c586-1165-47a1-a4ba-715c3af8c4ed","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Intel_Management_Engine","wgTitle":"Intel Management Engine","wgCurRevisionId":1277153617,"wgRevisionId":1277153617,"wgArticleId":42053808,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1: unfit URL","CS1 maint: archived copy as title","CS1 maint: numeric names: authors list","CS1 errors: generic name","CS1 German-language sources (de)","Articles with short description","Short description is different from Wikidata","Use American English from October 2020","All Wikipedia articles written in American English","Use mdy dates from October 2020","All articles with unsourced statements","Articles with unsourced statements from September 2021","Articles lacking reliable references from May 2023","All articles lacking reliable references","Articles with unsourced statements from September 2020","Articles containing potentially dated statements from 2017","All articles containing potentially dated statements","Computer security","Remote administration software","Firmware","Intel","BIOS","Minix"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Intel_Management_Engine","wgRelevantArticleId":42053808,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":50000,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q42915608","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false}; RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.19"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/2/2f/Priv_rings.svg/1200px-Priv_rings.svg.png"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="866"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/2/2f/Priv_rings.svg/800px-Priv_rings.svg.png"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="577"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/2/2f/Priv_rings.svg/640px-Priv_rings.svg.png"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="462"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Intel Management Engine - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Intel_Management_Engine"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Intel_Management_Engine&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Intel_Management_Engine"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Intel_Management_Engine rootpage-Intel_Management_Engine skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" title="Main menu" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li><li id="n-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages"><span>Special pages</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/?wmf_source=donate&amp;wmf_medium=sidebar&amp;wmf_campaign=en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Intel+Management+Engine" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Intel+Management+Engine" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/?wmf_source=donate&amp;wmf_medium=sidebar&amp;wmf_campaign=en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Intel+Management+Engine" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Intel+Management+Engine" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Difference_from_Intel_AMT" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Difference_from_Intel_AMT"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Difference from Intel AMT</span> </div> </a> <ul id="toc-Difference_from_Intel_AMT-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Design" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Design"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Design</span> </div> </a> <button aria-controls="toc-Design-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Design subsection</span> </button> <ul id="toc-Design-sublist" class="vector-toc-list"> <li id="toc-Hardware" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Hardware"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>Hardware</span> </div> </a> <ul id="toc-Hardware-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Firmware" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Firmware"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>Firmware</span> </div> </a> <ul id="toc-Firmware-sublist" class="vector-toc-list"> <li id="toc-Modules" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Modules"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2.1</span> <span>Modules</span> </div> </a> <ul id="toc-Modules-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-Security_vulnerabilities" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Security_vulnerabilities"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Security vulnerabilities</span> </div> </a> <button aria-controls="toc-Security_vulnerabilities-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Security vulnerabilities subsection</span> </button> <ul id="toc-Security_vulnerabilities-sublist" class="vector-toc-list"> <li id="toc-Ring_−3_rootkit" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Ring_−3_rootkit"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Ring −3 rootkit</span> </div> </a> <ul id="toc-Ring_−3_rootkit-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Zero-touch_provisioning" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Zero-touch_provisioning"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Zero-touch provisioning</span> </div> </a> <ul id="toc-Zero-touch_provisioning-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-SA-00075_(a.k.a._Silent_Bob_is_Silent)" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#SA-00075_(a.k.a._Silent_Bob_is_Silent)"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.3</span> <span>SA-00075 (a.k.a. Silent Bob is Silent)</span> </div> </a> <ul id="toc-SA-00075_(a.k.a._Silent_Bob_is_Silent)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-PLATINUM" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#PLATINUM"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.4</span> <span>PLATINUM</span> </div> </a> <ul id="toc-PLATINUM-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-SA-00086" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#SA-00086"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.5</span> <span>SA-00086</span> </div> </a> <ul id="toc-SA-00086-sublist" class="vector-toc-list"> <li id="toc-Affected_systems" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Affected_systems"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.5.1</span> <span>Affected systems</span> </div> </a> <ul id="toc-Affected_systems-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Mitigation" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Mitigation"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.5.2</span> <span>Mitigation</span> </div> </a> <ul id="toc-Mitigation-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-SA-00112" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#SA-00112"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.6</span> <span>SA-00112</span> </div> </a> <ul id="toc-SA-00112-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Assertions_that_ME_is_a_backdoor" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Assertions_that_ME_is_a_backdoor"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Assertions that ME is a backdoor</span> </div> </a> <ul id="toc-Assertions_that_ME_is_a_backdoor-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Disabling_the_ME" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Disabling_the_ME"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Disabling the ME</span> </div> </a> <button aria-controls="toc-Disabling_the_ME-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Disabling the ME subsection</span> </button> <ul id="toc-Disabling_the_ME-sublist" class="vector-toc-list"> <li id="toc-Undocumented_methods" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Undocumented_methods"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1</span> <span>Undocumented methods</span> </div> </a> <ul id="toc-Undocumented_methods-sublist" class="vector-toc-list"> <li id="toc-Firmware_neutralization" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Firmware_neutralization"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1.1</span> <span>Firmware neutralization</span> </div> </a> <ul id="toc-Firmware_neutralization-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-&quot;High_Assurance_Platform&quot;_mode" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#&quot;High_Assurance_Platform&quot;_mode"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1.2</span> <span>"High Assurance Platform" mode</span> </div> </a> <ul id="toc-&quot;High_Assurance_Platform&quot;_mode-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Commercial_ME_disablement" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Commercial_ME_disablement"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.2</span> <span>Commercial ME disablement</span> </div> </a> <ul id="toc-Commercial_ME_disablement-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Effectiveness_against_vulnerabilities" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Effectiveness_against_vulnerabilities"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.3</span> <span>Effectiveness against vulnerabilities</span> </div> </a> <ul id="toc-Effectiveness_against_vulnerabilities-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Reactions" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Reactions"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Reactions</span> </div> </a> <button aria-controls="toc-Reactions-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Reactions subsection</span> </button> <ul id="toc-Reactions-sublist" class="vector-toc-list"> <li id="toc-By_Google" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#By_Google"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1</span> <span>By Google</span> </div> </a> <ul id="toc-By_Google-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-By_AMD_processor_vendors" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#By_AMD_processor_vendors"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.2</span> <span>By AMD processor vendors</span> </div> </a> <ul id="toc-By_AMD_processor_vendors-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" title="Table of Contents" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Intel Management Engine</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 6 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-6" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">6 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Intel_Management_Engine" title="Intel Management Engine – Czech" lang="cs" hreflang="cs" data-title="Intel Management Engine" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%9D%B8%ED%85%94_%EA%B4%80%EB%A6%AC_%EC%97%94%EC%A7%84" title="인텔 관리 엔진 – Korean" lang="ko" hreflang="ko" data-title="인텔 관리 엔진" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/Intel_Management_Engine" title="Intel Management Engine – Russian" lang="ru" hreflang="ru" data-title="Intel Management Engine" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Intel_Management_Engine" title="Intel Management Engine – Turkish" lang="tr" hreflang="tr" data-title="Intel Management Engine" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/Intel_Management_Engine" title="Intel Management Engine – Ukrainian" lang="uk" hreflang="uk" data-title="Intel Management Engine" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E8%8B%B1%E7%89%B9%E5%B0%94%E7%AE%A1%E7%90%86%E5%BC%95%E6%93%8E" title="英特尔管理引擎 – Chinese" lang="zh" hreflang="zh" data-title="英特尔管理引擎" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q42915608#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Intel_Management_Engine" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Intel_Management_Engine" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Intel_Management_Engine"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Intel_Management_Engine&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Intel_Management_Engine"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Intel_Management_Engine&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Intel_Management_Engine" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Intel_Management_Engine" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Intel_Management_Engine&amp;oldid=1277153617" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Intel_Management_Engine&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Intel_Management_Engine&amp;id=1277153617&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FIntel_Management_Engine"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FIntel_Management_Engine"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Intel_Management_Engine&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Intel_Management_Engine&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q42915608" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Autonomous computer subsystem</div> <p class="mw-empty-elt"> </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Priv_rings.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/2/2f/Priv_rings.svg/220px-Priv_rings.svg.png" decoding="async" width="220" height="159" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/2f/Priv_rings.svg/330px-Priv_rings.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/2f/Priv_rings.svg/440px-Priv_rings.svg.png 2x" data-file-width="675" data-file-height="487" /></a><figcaption><a href="/wiki/Privilege_ring" class="mw-redirect" title="Privilege ring">Privilege rings</a> for the <a href="/wiki/X86" title="X86">x86</a> architecture. The ME is colloquially categorized as ring −3, below <a href="/wiki/System_Management_Mode" title="System Management Mode">System Management Mode</a> (ring −2) and the <a href="/wiki/Hypervisor" title="Hypervisor">hypervisor</a> (ring −1), all running at a higher privilege level than the kernel (ring 0).</figcaption></figure> <p>The <b>Intel Management Engine</b> (<b>ME</b>), also known as the <b>Intel Manageability Engine</b>,<sup id="cite_ref-intelamt_1-0" class="reference"><a href="#cite_note-intelamt-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-intel-amt-me_2-0" class="reference"><a href="#cite_note-intel-amt-me-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> is an autonomous subsystem that has been incorporated in virtually all of <a href="/wiki/Intel" title="Intel">Intel</a>'s <a href="/wiki/Central_processing_unit" title="Central processing unit">processor</a> <a href="/wiki/Chipset" title="Chipset">chipsets</a> since 2008.<sup id="cite_ref-intelamt_1-1" class="reference"><a href="#cite_note-intelamt-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-eff1_4-0" class="reference"><a href="#cite_note-eff1-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> It is located in the <a href="/wiki/Platform_Controller_Hub" title="Platform Controller Hub">Platform Controller Hub</a> of modern Intel <a href="/wiki/Motherboards" class="mw-redirect" title="Motherboards">motherboards</a>. </p><p>The Intel Management Engine always runs as long as the motherboard is receiving power, even when the computer is turned off. This issue can be mitigated with the deployment of a hardware device which is able to disconnect all connections to <a href="/wiki/Mains_power" class="mw-redirect" title="Mains power">mains power</a> as well as all internal forms of energy storage. The <a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a> and some security researchers have voiced concern that the Management Engine is a <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">backdoor</a>. </p><p>Intel's main competitor, <a href="/wiki/AMD" title="AMD">AMD</a>, has incorporated the equivalent <a href="/wiki/AMD_Secure_Technology" class="mw-redirect" title="AMD Secure Technology">AMD Secure Technology</a> (formally called Platform Security Processor) in virtually all of its post-2013 CPUs. </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Difference_from_Intel_AMT">Difference from Intel AMT</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=1" title="Edit section: Difference from Intel AMT"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Management Engine is often confused with <a href="/wiki/Intel_Active_Management_Technology" title="Intel Active Management Technology">Intel AMT</a> (Intel Active Management Technology). AMT runs on the ME, but is only available on processors with <a href="/wiki/VPro" class="mw-redirect" title="VPro">vPro</a>. AMT gives device owners remote administration of their computer,<sup id="cite_ref-techrepublicME_5-0" class="reference"><a href="#cite_note-techrepublicME-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> such as powering it on or off, and reinstalling the operating system. </p><p>However, the ME itself has been built into all Intel chipsets since 2008, not only those with AMT. While AMT can be unprovisioned by the owner, there is no official, documented way to disable the ME. </p> <div class="mw-heading mw-heading2"><h2 id="Design">Design</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=2" title="Edit section: Design"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The subsystem primarily consists of proprietary firmware running on a separate microprocessor that performs tasks during boot-up, while the computer is running, and while it is asleep.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> As long as the chipset or <a href="/wiki/System_on_a_chip" title="System on a chip">SoC</a> is supplied with power (via battery or power supply), it continues to run even when the system is turned off.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> Intel claims the ME is required to provide full performance.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> Its exact workings<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup> are largely undocumented<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> and its code is <a href="/wiki/Obfuscation_(software)" title="Obfuscation (software)">obfuscated</a> using confidential <a href="/wiki/Huffman_coding" title="Huffman coding">Huffman tables</a> stored directly in hardware, so the firmware does not contain the information necessary to decode its contents.<sup id="cite_ref-auto1_11-0" class="reference"><a href="#cite_note-auto1-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Hardware">Hardware</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=3" title="Edit section: Hardware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Starting with ME&#160;11 (introduced in <a href="/wiki/Skylake_(microarchitecture)" title="Skylake (microarchitecture)">Skylake</a> CPUs), it is based on the <a href="/wiki/Intel_Quark" title="Intel Quark">Intel Quark</a> x86-based <a href="/wiki/32-bit" class="mw-redirect" title="32-bit">32-bit</a> CPU and runs the <a href="/wiki/MINIX_3" class="mw-redirect" title="MINIX 3">MINIX 3</a> operating system.<sup id="cite_ref-ptsecurity1_12-0" class="reference"><a href="#cite_note-ptsecurity1-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> The ME firmware is stored in a partition of the <a href="/wiki/Serial_Peripheral_Interface_Bus" class="mw-redirect" title="Serial Peripheral Interface Bus">SPI</a> BIOS Flash, using the <a href="/w/index.php?title=Embedded_Flash_File_System&amp;action=edit&amp;redlink=1" class="new" title="Embedded Flash File System (page does not exist)">Embedded Flash File System</a> (EFFS).<sup id="cite_ref-is_13-0" class="reference"><a href="#cite_note-is-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> Previous versions were based on an <a href="/wiki/ARC_(processor)" title="ARC (processor)">ARC core</a>, with the Management Engine running the <a href="/wiki/ThreadX" title="ThreadX">ThreadX</a> <a href="/wiki/RTOS" class="mw-redirect" title="RTOS">RTOS</a>. Versions 1.x to 5.x of the ME used the ARCTangent-A4 (32-bit only instructions) whereas versions 6.x to 8.x used the newer ARCompact (mixed 32- and <a href="/wiki/16-bit" class="mw-redirect" title="16-bit">16-bit</a> <a href="/wiki/Instruction_set_architecture" title="Instruction set architecture">instruction set architecture</a>). Starting with ME 7.1, the ARC processor could also execute signed <a href="/wiki/Java_applets" class="mw-redirect" title="Java applets">Java applets</a>. </p><p>The ME has its own MAC and IP address for the <a href="/wiki/Out-of-band_management" title="Out-of-band management">out-of-band management</a> interface, with direct access to the Ethernet controller; one portion of the Ethernet traffic is diverted to the ME even before reaching the host's operating system, for what support exists in various Ethernet controllers, exported and made configurable via <a href="/wiki/Management_Component_Transport_Protocol" title="Management Component Transport Protocol">Management Component Transport Protocol</a> (MCTP).<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> The ME also communicates with the host via PCI interface.<sup id="cite_ref-is_13-1" class="reference"><a href="#cite_note-is-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> Under Linux, communication between the host and the ME is done via <style data-mw-deduplicate="TemplateStyles:r886049734">.mw-parser-output .monospaced{font-family:monospace,monospace}</style><span class="monospaced">/dev/mei</span> or <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r886049734" /><span class="monospaced">/dev/mei0</span>.<sup id="cite_ref-meilnx_16-0" class="reference"><a href="#cite_note-meilnx-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-meilnx2_17-0" class="reference"><a href="#cite_note-meilnx2-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> </p><p>Until the release of <a href="/wiki/Nehalem_(microarchitecture)" title="Nehalem (microarchitecture)">Nehalem</a> processors, the ME was usually embedded into the motherboard's <a href="/wiki/Northbridge_(computing)" title="Northbridge (computing)">northbridge</a>, following the <a href="/wiki/Memory_Controller_Hub" class="mw-redirect" title="Memory Controller Hub">Memory Controller Hub</a> (MCH) layout.<sup id="cite_ref-quest_18-0" class="reference"><a href="#cite_note-quest-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> With the newer Intel architectures (<a href="/wiki/Intel_5_Series" title="Intel 5 Series">Intel 5 Series</a> onwards), the ME is integrated into the <a href="/wiki/Platform_Controller_Hub" title="Platform Controller Hub">Platform Controller Hub</a> (PCH).<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Firmware">Firmware</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=4" title="Edit section: Firmware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>By Intel's current terminology as of 2017, ME is one of several firmware sets for the Converged Security and Manageability Engine (CSME). Prior to AMT version 11, CSME was called Intel Management Engine BIOS Extension (Intel MEBx).<sup id="cite_ref-intelamt_1-2" class="reference"><a href="#cite_note-intelamt-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> </p> <ul><li>Management Engine (ME) – mainstream chipsets<sup id="cite_ref-supermicrosps_21-0" class="reference"><a href="#cite_note-supermicrosps-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup></li> <li>Server Platform Services (SPS) – server chipsets and <a href="/wiki/System_on_a_chip" title="System on a chip">SoCs</a><sup id="cite_ref-intelsps_22-0" class="reference"><a href="#cite_note-intelsps-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-supermicrosps_21-1" class="reference"><a href="#cite_note-supermicrosps-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-xeondsps_23-0" class="reference"><a href="#cite_note-xeondsps-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup></li> <li>Trusted Execution Engine (TXE) – tablet/embedded/low power<sup id="cite_ref-delltxe_24-0" class="reference"><a href="#cite_note-delltxe-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-inteltxe_25-0" class="reference"><a href="#cite_note-inteltxe-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup></li></ul> <p>It was also found that the ME firmware version 11 runs <a href="/wiki/MINIX_3" class="mw-redirect" title="MINIX 3">MINIX 3</a>.<sup id="cite_ref-ptsecurity1_12-1" class="reference"><a href="#cite_note-ptsecurity1-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Modules">Modules</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=5" title="Edit section: Modules"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Active_Management_Technology" class="mw-redirect" title="Active Management Technology">Active Management Technology</a> (AMT)<sup id="cite_ref-intel-amt-me_2-1" class="reference"><a href="#cite_note-intel-amt-me-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup></li> <li>Intel <a href="/wiki/Boot_Guard" class="mw-redirect" title="Boot Guard">Boot Guard</a> (IBG)<sup id="cite_ref-intel-ppt_27-0" class="reference"><a href="#cite_note-intel-ppt-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup> and <a href="/wiki/Secure_Boot" class="mw-redirect" title="Secure Boot">Secure Boot</a><sup id="cite_ref-inteltxe_25-1" class="reference"><a href="#cite_note-inteltxe-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Quiet_System_Technology" class="mw-redirect" title="Quiet System Technology">Quiet System Technology</a> (QST), formerly known as Advanced Fan Speed Control (AFSC), which provides support for acoustically optimized fan speed control, and monitoring of temperature, voltage, current and fan speed sensors that are provided in the chipset, CPU and other devices present on the motherboard. Communication with the QST firmware subsystem is documented and available through the official <a href="/wiki/Software_development_kit" title="Software development kit">software development kit</a> (SDK).<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup></li> <li>Protected Audio Video Path, enforces <a href="/wiki/HDCP" class="mw-redirect" title="HDCP">HDCP</a><sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-auto1_11-1" class="reference"><a href="#cite_note-auto1-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup></li> <li>Intel Anti-Theft Technology (AT), discontinued in 2015<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Serial_over_LAN" title="Serial over LAN">Serial over LAN</a> (SOL)<sup id="cite_ref-intel-sol_32-0" class="reference"><a href="#cite_note-intel-sol-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/w/index.php?title=Intel_Platform_Trust_Technology&amp;action=edit&amp;redlink=1" class="new" title="Intel Platform Trust Technology (page does not exist)">Intel Platform Trust Technology</a> (PTT), a firmware-based <a href="/wiki/Trusted_Platform_Module" title="Trusted Platform Module">Trusted Platform Module</a> (TPM)<sup id="cite_ref-intel-ppt_27-1" class="reference"><a href="#cite_note-intel-ppt-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Near_Field_Communication" class="mw-redirect" title="Near Field Communication">Near Field Communication</a>, a middleware for NFC readers and vendors to access NFC cards and provide secure element access, found in later MEI versions.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="Security_vulnerabilities">Security vulnerabilities</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=6" title="Edit section: Security vulnerabilities"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Several weaknesses have been found in the ME. On May 1, 2017, Intel confirmed a Remote Elevation of Privilege bug (SA-00075) in its Management Technology.<sup id="cite_ref-intelmay_35-0" class="reference"><a href="#cite_note-intelmay-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup> Every Intel platform with provisioned Intel Standard Manageability, Active Management Technology, or Small Business Technology, from <a href="/wiki/Intel_Nehalem" class="mw-redirect" title="Intel Nehalem">Nehalem</a> in 2008 to <a href="/wiki/Intel_Kaby_Lake" class="mw-redirect" title="Intel Kaby Lake">Kaby Lake</a> in 2017 has a remotely exploitable security hole in the ME.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-reg-2017-05-01_37-0" class="reference"><a href="#cite_note-reg-2017-05-01-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> Several ways to disable the ME without authorization that could allow ME's functions to be sabotaged have been found.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-ptsecurity1_12-2" class="reference"><a href="#cite_note-ptsecurity1-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> Additional major security flaws in the ME affecting a very large number of computers incorporating ME, Trusted Execution Engine (TXE), and Server Platform Services (SPS) firmware, from <a href="/wiki/Intel_Skylake" class="mw-redirect" title="Intel Skylake">Skylake</a> in 2015 to <a href="/wiki/Coffee_Lake" title="Coffee Lake">Coffee Lake</a> in 2017, were confirmed by Intel on 20 November 2017 (SA-00086).<sup id="cite_ref-extreme1_40-0" class="reference"><a href="#cite_note-extreme1-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup> Unlike SA-00075, this bug is even present if AMT is absent, not provisioned or if the ME was "disabled" by any of the known unofficial methods.<sup id="cite_ref-auto2_42-0" class="reference"><a href="#cite_note-auto2-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup> In July 2018, another set of vulnerabilities was disclosed (SA-00112).<sup id="cite_ref-SA-00112_43-0" class="reference"><a href="#cite_note-SA-00112-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup> In September 2018, yet another vulnerability was published (SA-00125).<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Ring_−3_rootkit"><span id="Ring_.E2.88.923_rootkit"></span><span class="anchor" id="Ring_-3"></span>Ring −3 rootkit</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=7" title="Edit section: Ring −3 rootkit"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A <a href="/wiki/Protection_ring" title="Protection ring">ring</a>&#160;−3 rootkit was demonstrated by Invisible Things Lab for the Q35 chipset; it does not work for the later Q45 chipset as Intel implemented additional protections.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup> The exploit worked by remapping the normally protected memory region (top 16&#160;MB of RAM) reserved for the ME. The ME rootkit could be installed regardless of whether the AMT is present or enabled on the system, as the chipset always contains the ARC ME coprocessor. (The "−3" designation was chosen because the ME coprocessor works even when the system is in the <a href="/wiki/Sleep_mode" title="Sleep mode">S3 state</a>. Thus, it was considered a layer below the <a href="/wiki/System_Management_Mode" title="System Management Mode">System Management Mode</a> rootkits.<sup id="cite_ref-quest_18-1" class="reference"><a href="#cite_note-quest-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup>) For the vulnerable Q35 chipset, a <a href="/wiki/Keystroke_logger" class="mw-redirect" title="Keystroke logger">keystroke logger</a> ME-based rootkit was demonstrated by Patrick Stewin.<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Zero-touch_provisioning">Zero-touch provisioning</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=8" title="Edit section: Zero-touch provisioning"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Another security evaluation by Vassilios Ververis showed serious weaknesses in the GM45 chipset implementation. In particular, it criticized AMT for transmitting unencrypted passwords in the SMB provisioning mode when the IDE redirection and Serial over LAN features are used. It also found that the "zero touch" provisioning mode (ZTC) is still enabled even when the AMT appears to be disabled in BIOS. For about 60 euros, Ververis purchased from <a href="/wiki/GoDaddy" title="GoDaddy">GoDaddy</a> a certificate that is accepted by the ME firmware and allows remote <a href="/wiki/Zero-touch_provisioning" title="Zero-touch provisioning">"zero touch" provisioning</a> of (possibly unsuspecting) machines, which broadcast their HELLO packets to would-be configuration servers.<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="SA-00075_(a.k.a._Silent_Bob_is_Silent)"><span id="SA-00075_.28a.k.a._Silent_Bob_is_Silent.29"></span>SA-00075 (a.k.a. Silent Bob is Silent)</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=9" title="Edit section: SA-00075 (a.k.a. Silent Bob is Silent)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In May 2017, Intel confirmed that many computers with AMT have had an unpatched critical privilege escalation vulnerability (<a href="/wiki/CVE-2017-5689" class="mw-redirect" title="CVE-2017-5689">CVE-2017-5689</a>).<sup id="cite_ref-reg-2017-05-01_37-1" class="reference"><a href="#cite_note-reg-2017-05-01-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-intelmay_35-1" class="reference"><a href="#cite_note-intelmay-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> The vulnerability was nicknamed "Silent Bob is Silent" by the researchers who had reported it to Intel.<sup id="cite_ref-ssh-com_52-0" class="reference"><a href="#cite_note-ssh-com-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup> It affects numerous laptops, desktops and servers sold by <a href="/wiki/Dell" title="Dell">Dell</a>, <a href="/wiki/Fujitsu" title="Fujitsu">Fujitsu</a>, <a href="/wiki/Hewlett-Packard" title="Hewlett-Packard">Hewlett-Packard</a> (later <a href="/wiki/Hewlett_Packard_Enterprise" title="Hewlett Packard Enterprise">Hewlett Packard Enterprise</a> and <a href="/wiki/HP_Inc." title="HP Inc.">HP Inc.</a>), Intel, <a href="/wiki/Lenovo" title="Lenovo">Lenovo</a>, and possibly others.<sup id="cite_ref-ssh-com_52-1" class="reference"><a href="#cite_note-ssh-com-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">&#91;</span>56<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-58" class="reference"><a href="#cite_note-58"><span class="cite-bracket">&#91;</span>58<span class="cite-bracket">&#93;</span></a></sup> Those researchers claimed that the bug affects systems made in 2010 or later.<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">&#91;</span>59<span class="cite-bracket">&#93;</span></a></sup> Other reports claimed the bug also affects systems made as long ago as 2008.<sup id="cite_ref-60" class="reference"><a href="#cite_note-60"><span class="cite-bracket">&#91;</span>60<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-reg-2017-05-01_37-2" class="reference"><a href="#cite_note-reg-2017-05-01-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> The vulnerability was described as giving remote attackers: </p> <style data-mw-deduplicate="TemplateStyles:r1244412712">.mw-parser-output .templatequote{overflow:hidden;margin:1em 0;padding:0 32px}.mw-parser-output .templatequotecite{line-height:1.5em;text-align:left;margin-top:0}@media(min-width:500px){.mw-parser-output .templatequotecite{padding-left:1.6em}}</style><blockquote class="templatequote"><p>"full control of affected machines, including the ability to read and modify everything. It can be used to install persistent malware (possibly in firmware), and read and modify any data."</p><div class="templatequotecite">—&#8202;<cite>Tatu Ylönen, <i>ssh.com</i><sup id="cite_ref-ssh-com_52-2" class="reference"><a href="#cite_note-ssh-com-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup></cite></div></blockquote> <div class="mw-heading mw-heading3"><h3 id="PLATINUM">PLATINUM</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=10" title="Edit section: PLATINUM"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In June 2017, the <a href="/wiki/PLATINUM_(cybercrime_group)" title="PLATINUM (cybercrime group)">PLATINUM</a> cybercrime group became notable for exploiting the <a href="/wiki/Serial_over_LAN" title="Serial over LAN">serial over LAN (SOL)</a> capabilities of AMT to perform data exfiltration of stolen documents.<sup id="cite_ref-61" class="reference"><a href="#cite_note-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-62" class="reference"><a href="#cite_note-62"><span class="cite-bracket">&#91;</span>62<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-microsoft.com_63-0" class="reference"><a href="#cite_note-microsoft.com-63"><span class="cite-bracket">&#91;</span>63<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">&#91;</span>64<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">&#91;</span>65<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">&#91;</span>66<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">&#91;</span>67<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">&#91;</span>68<span class="cite-bracket">&#93;</span></a></sup> SOL is disabled by default and must be enabled to exploit this vulnerability.<sup id="cite_ref-69" class="reference"><a href="#cite_note-69"><span class="cite-bracket">&#91;</span>69<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="SA-00086">SA-00086</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=11" title="Edit section: SA-00086"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Some months after the previous bugs, and subsequent warnings from the EFF,<sup id="cite_ref-eff1_4-1" class="reference"><a href="#cite_note-eff1-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> security firm Positive Technologies claimed to have developed a working <a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">exploit</a>.<sup id="cite_ref-70" class="reference"><a href="#cite_note-70"><span class="cite-bracket">&#91;</span>70<span class="cite-bracket">&#93;</span></a></sup> On 20 November 2017, Intel confirmed that a number of serious flaws had been found in the Management Engine (mainstream), Trusted Execution Engine (tablet/mobile), and Server Platform Services (high end server) firmware, and released a "critical firmware update".<sup id="cite_ref-intel2_71-0" class="reference"><a href="#cite_note-intel2-71"><span class="cite-bracket">&#91;</span>71<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-wired1_72-0" class="reference"><a href="#cite_note-wired1-72"><span class="cite-bracket">&#91;</span>72<span class="cite-bracket">&#93;</span></a></sup> Essentially, every Intel-based computer for the last several years, including most desktops and servers, were found to be vulnerable to having their security compromised, although all the potential routes of exploitation were not entirely known.<sup id="cite_ref-wired1_72-1" class="reference"><a href="#cite_note-wired1-72"><span class="cite-bracket">&#91;</span>72<span class="cite-bracket">&#93;</span></a></sup> It is not possible to patch the problems from the operating system, and a firmware (UEFI, BIOS) update to the motherboard is required, which was anticipated to take quite some time for the many individual manufacturers to accomplish, if it ever would be for many systems.<sup id="cite_ref-extreme1_40-1" class="reference"><a href="#cite_note-extreme1-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Affected_systems">Affected systems</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=12" title="Edit section: Affected systems"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Source:<sup id="cite_ref-intel2_71-1" class="reference"><a href="#cite_note-intel2-71"><span class="cite-bracket">&#91;</span>71<span class="cite-bracket">&#93;</span></a></sup> </p> <ul><li><a href="/wiki/Intel_Atom" title="Intel Atom">Intel Atom</a> – C3000 family</li> <li>Intel Atom – Apollo Lake E3900 series</li> <li><a href="/wiki/Intel_Celeron" class="mw-redirect" title="Intel Celeron">Intel Celeron</a> – N and J series</li> <li><a href="/wiki/Intel_Core" title="Intel Core">Intel Core</a> (i3, i5, i7, i9) – 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, and 8th generation</li> <li><a href="/wiki/Intel_Pentium" class="mw-redirect" title="Intel Pentium">Intel Pentium</a> – Apollo Lake</li> <li><a href="/wiki/Intel_Xeon" class="mw-redirect" title="Intel Xeon">Intel Xeon</a> – E3-1200 v5 and v6 product family</li> <li>Intel Xeon – Scalable family</li> <li>Intel Xeon – W family</li></ul> <div class="mw-heading mw-heading4"><h4 id="Mitigation">Mitigation</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=13" title="Edit section: Mitigation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>None of the known unofficial methods to disable the ME prevent exploitation of the vulnerability. A firmware update by the vendor is required. However, those who discovered the vulnerability note that firmware updates are not fully effective either, as an attacker with access to the ME firmware region can simply flash an old, vulnerable version and then exploit the bug.<sup id="cite_ref-auto2_42-1" class="reference"><a href="#cite_note-auto2-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="SA-00112">SA-00112</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=14" title="Edit section: SA-00112"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In July 2018, Intel announced that three vulnerabilities (<a href="/wiki/CVE_(identifier)" class="mw-redirect" title="CVE (identifier)">CVE</a>-<style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><a rel="nofollow" class="external text" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3628">2018-3628</a>,&#32;CVE-<a rel="nofollow" class="external text" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3629">2018-3629</a>,&#32;CVE-<a rel="nofollow" class="external text" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3632">2018-3632</a>) had been discovered and that a patch for the CSME firmware would be required. Intel indicated there would be no patch for 3rd generation Core processors or earlier despite chips or their chipsets as far back as Intel Core 2 Duo vPro and Intel Centrino 2 vPro being affected. However, Intel AMT must be enabled and provisioned for the vulnerability to exist.<sup id="cite_ref-SA-00112_43-1" class="reference"><a href="#cite_note-SA-00112-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">&#91;</span>73<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Assertions_that_ME_is_a_backdoor">Assertions that ME is a backdoor</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=15" title="Edit section: Assertions that ME is a backdoor"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Critics like the <a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a> (EFF), <a href="/wiki/Libreboot" title="Libreboot">Libreboot</a> developers, and security expert Damien Zammit accused the ME of being a <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">backdoor</a> and a privacy concern.<sup id="cite_ref-softpediaME_74-0" class="reference"><a href="#cite_note-softpediaME-74"><span class="cite-bracket">&#91;</span>74<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-eff1_4-2" class="reference"><a href="#cite_note-eff1-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> Zammit stresses that the ME has full access to memory (without the owner-controlled CPU cores having any knowledge), and has full access to the TCP/IP stack and can send and receive network packets independently of the operating system, thus bypassing its firewall.<sup id="cite_ref-techrepublicME_5-1" class="reference"><a href="#cite_note-techrepublicME-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> </p><p>Intel responded by saying, "Intel does not put backdoors in its products, nor do our products give Intel control or access to computing systems without the explicit permission of the end user."<sup id="cite_ref-techrepublicME_5-2" class="reference"><a href="#cite_note-techrepublicME-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> and "Intel does not and will not design backdoors for access into its products. Recent reports claiming otherwise are misinformed and blatantly false. Intel does not participate in any efforts to decrease the security of its technology."<sup id="cite_ref-register_can_disable_75-0" class="reference"><a href="#cite_note-register_can_disable-75"><span class="cite-bracket">&#91;</span>75<span class="cite-bracket">&#93;</span></a></sup> </p><p>In the context of criticism of the Intel ME and <a href="/wiki/AMD_Secure_Technology" class="mw-redirect" title="AMD Secure Technology">AMD Secure Technology</a> it has been pointed out that the <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a> (NSA) budget request for 2013 contained a <a href="/wiki/Sigint" class="mw-redirect" title="Sigint">Sigint</a> Enabling Project with the goal to "Insert vulnerabilities into commercial encryption systems, IT systems, ..." and it has been conjectured that Intel ME and AMD Secure Technology might be part of that program.<sup id="cite_ref-76" class="reference"><a href="#cite_note-76"><span class="cite-bracket">&#91;</span>76<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-77" class="reference"><a href="#cite_note-77"><span class="cite-bracket">&#91;</span>77<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Disabling_the_ME">Disabling the ME</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=16" title="Edit section: Disabling the ME"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>It is normally not possible for the end-user to disable the ME and there is no officially supported method to disable it, but some undocumented methods to do so were discovered.<sup id="cite_ref-extreme1_40-2" class="reference"><a href="#cite_note-extreme1-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup> The ME's security architecture is designed to prevent disabling. Intel considers disabling the ME to be a security vulnerability, as a malware could abuse it to make the computer lose some of the functionality that the typical user expects, such as the ability to play media with <a href="/wiki/Digital_rights_management" title="Digital rights management">DRM</a>, specifically DRM media that is using <a href="/wiki/HDCP" class="mw-redirect" title="HDCP">HDCP</a>.<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">&#91;</span>78<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-79" class="reference"><a href="#cite_note-79"><span class="cite-bracket">&#91;</span>79<span class="cite-bracket">&#93;</span></a></sup> On the other hand, it is also possible for malicious actors to use the ME to remotely compromise a system. </p><p>Strictly speaking, none of the known methods can disable the ME completely, since it is required for booting the main CPU. The currently known methods merely make the ME go into abnormal states soon after boot, in which it seems not to have any working functionality. The ME is still physically connected to the system and its microprocessor continues to execute code.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="There&#39;s no source citated that support this statement (September 2021)">citation needed</span></a></i>&#93;</sup> <a href="#Commercial_ME_disablement">Some manufacturers</a> like <a href="/wiki/Purism_(company)" title="Purism (company)">Purism</a> and <a href="/wiki/System76" title="System76">System76</a> disable the Intel Management Engine.<sup id="cite_ref-80" class="reference"><a href="#cite_note-80"><span class="cite-bracket">&#91;</span>80<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-81" class="reference"><a href="#cite_note-81"><span class="cite-bracket">&#91;</span>81<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Undocumented_methods">Undocumented methods</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=17" title="Edit section: Undocumented methods"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading4"><h4 id="Firmware_neutralization">Firmware neutralization</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=18" title="Edit section: Firmware neutralization"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2016, the <i>me_cleaner</i> project found that the ME's integrity verification is broken. The ME is supposed to detect that it has been tampered with and, if this is the case, shut down the PC forcibly 30 minutes after system start.<sup id="cite_ref-82" class="reference"><a href="#cite_note-82"><span class="cite-bracket">&#91;</span>82<span class="cite-bracket">&#93;</span></a></sup> This prevents a compromised system from running undetected, yet allows the owner to fix the issue by flashing a valid version of the ME firmware during the grace period. As the project found out, by making unauthorized changes to the ME firmware, it was possible to force it into an abnormal error state that prevented triggering the shutdown even if large parts of the firmware had been overwritten and thus made inoperable. </p> <div class="mw-heading mw-heading4"><h4 id="&quot;High_Assurance_Platform&quot;_mode"><span id=".22High_Assurance_Platform.22_mode"></span>"High Assurance Platform" mode</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=19" title="Edit section: &quot;High Assurance Platform&quot; mode"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In August 2017, Positive Technologies (<a href="/wiki/Dmitry_Sklyarov" class="mw-redirect" title="Dmitry Sklyarov">Dmitry Sklyarov</a>) published a method to disable the ME via an <a href="/wiki/Undocumented_feature" title="Undocumented feature">undocumented built-in mode</a>. As Intel has confirmed<sup id="cite_ref-83" class="reference"><a href="#cite_note-83"><span class="cite-bracket">&#91;</span>83<span class="cite-bracket">&#93;</span></a></sup> the ME contains a switch to enable government authorities such as the <a href="/wiki/National_Security_Agency" title="National Security Agency">NSA</a> to make the ME go into High-Assurance Platform (HAP) mode after boot. This mode disables most of ME's functions,<sup id="cite_ref-register_can_disable_75-1" class="reference"><a href="#cite_note-register_can_disable-75"><span class="cite-bracket">&#91;</span>75<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-auto3_84-0" class="reference"><a href="#cite_note-auto3-84"><span class="cite-bracket">&#91;</span>84<span class="cite-bracket">&#93;</span></a></sup> and was intended to be available only in machines produced for specific purchasers like the US government; however, most machines sold on the retail market can be made to activate the switch.<sup id="cite_ref-auto3_84-1" class="reference"><a href="#cite_note-auto3-84"><span class="cite-bracket">&#91;</span>84<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-85" class="reference"><a href="#cite_note-85"><span class="cite-bracket">&#91;</span>85<span class="cite-bracket">&#93;</span></a></sup> Manipulation of the HAP bit was quickly incorporated into the me_cleaner project.<sup id="cite_ref-86" class="reference"><a href="#cite_note-86"><span class="cite-bracket">&#91;</span>86<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Commercial_ME_disablement">Commercial ME disablement</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=20" title="Edit section: Commercial ME disablement"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-Primary_sources plainlinks metadata ambox ambox-content ambox-Primary_sources" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><a href="/wiki/File:Question_book-new.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/en/thumb/9/99/Question_book-new.svg/50px-Question_book-new.svg.png" decoding="async" width="50" height="39" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/99/Question_book-new.svg/75px-Question_book-new.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/99/Question_book-new.svg/100px-Question_book-new.svg.png 2x" data-file-width="512" data-file-height="399" /></a></span></div></td><td class="mbox-text"><div class="mbox-text-span">This article <b>relies excessively on <a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability">references</a> to <a href="/wiki/Wikipedia:No_original_research#Primary,_secondary_and_tertiary_sources" title="Wikipedia:No original research">primary sources</a></b>.<span class="hide-when-compact"> Please improve this article by adding <a href="/wiki/Wikipedia:No_original_research#Primary,_secondary_and_tertiary_sources" title="Wikipedia:No original research">secondary or tertiary sources</a>. <br /><small><span class="plainlinks"><i>Find sources:</i>&#160;<a rel="nofollow" class="external text" href="https://www.google.com/search?as_eq=wikipedia&amp;q=%22Intel+Management+Engine%22">"Intel Management Engine"</a>&#160;–&#160;<a rel="nofollow" class="external text" href="https://www.google.com/search?tbm=nws&amp;q=%22Intel+Management+Engine%22+-wikipedia&amp;tbs=ar:1">news</a>&#160;<b>·</b> <a rel="nofollow" class="external text" href="https://www.google.com/search?&amp;q=%22Intel+Management+Engine%22&amp;tbs=bkt:s&amp;tbm=bks">newspapers</a>&#160;<b>·</b> <a rel="nofollow" class="external text" href="https://www.google.com/search?tbs=bks:1&amp;q=%22Intel+Management+Engine%22+-wikipedia">books</a>&#160;<b>·</b> <a rel="nofollow" class="external text" href="https://scholar.google.com/scholar?q=%22Intel+Management+Engine%22">scholar</a>&#160;<b>·</b> <a rel="nofollow" class="external text" href="https://www.jstor.org/action/doBasicSearch?Query=%22Intel+Management+Engine%22&amp;acc=on&amp;wc=on">JSTOR</a></span></small></span> <span class="date-container"><i>(<span class="date">May 2023</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <p>From late 2017 on, several laptop vendors announced their intentions to ship laptops with the Intel ME disabled or let the end-users disable it manually: </p> <ul><li>Minifree Ltd has provided <a href="/wiki/Libreboot" title="Libreboot">Libreboot</a> pre-loaded laptops with Intel ME either not present or disabled since at least 2015.<sup id="cite_ref-87" class="reference"><a href="#cite_note-87"><span class="cite-bracket">&#91;</span>87<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-88" class="reference"><a href="#cite_note-88"><span class="cite-bracket">&#91;</span>88<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-89" class="reference"><a href="#cite_note-89"><span class="cite-bracket">&#91;</span>89<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Purism_(company)" title="Purism (company)">Purism</a> previously petitioned Intel to sell processors without the ME, or release its source code, calling it "a threat to users' digital rights".<sup id="cite_ref-90" class="reference"><a href="#cite_note-90"><span class="cite-bracket">&#91;</span>90<span class="cite-bracket">&#93;</span></a></sup> In March 2017, Purism announced that it had neutralized the ME by erasing the majority of the ME code from the flash memory.<sup id="cite_ref-91" class="reference"><a href="#cite_note-91"><span class="cite-bracket">&#91;</span>91<span class="cite-bracket">&#93;</span></a></sup> It further announced in October 2017<sup id="cite_ref-92" class="reference"><a href="#cite_note-92"><span class="cite-bracket">&#91;</span>92<span class="cite-bracket">&#93;</span></a></sup> that new batches of their <a href="/wiki/Librem" title="Librem">Librem</a> line of laptops running <a href="/wiki/PureOS" title="PureOS">PureOS</a> will ship with the ME neutralized, and additionally disable most ME operation via the HAP bit. Updates for existing Librem laptops were also announced.</li> <li>In November, <a href="/wiki/System76" title="System76">System76</a> announced their plan to disable the ME on their new and recent machines which ship with <a href="/wiki/Pop!_OS" title="Pop! OS">Pop!_OS</a> via the HAP bit.<sup id="cite_ref-93" class="reference"><a href="#cite_note-93"><span class="cite-bracket">&#91;</span>93<span class="cite-bracket">&#93;</span></a></sup></li> <li>In December, <a href="/wiki/Dell" title="Dell">Dell</a> began showing certain laptops on its website that offered the "Systems Management" option "Intel vPro - ME Inoperable, Custom Order" for an additional fee. Dell has not announced or publicly explained the methods used. In response to press requests, Dell stated that those systems had been offered for quite a while, but not for the general public, and had found their way to the website only inadvertently.<sup id="cite_ref-extremedell_94-0" class="reference"><a href="#cite_note-extremedell-94"><span class="cite-bracket">&#91;</span>94<span class="cite-bracket">&#93;</span></a></sup> The laptops are available only by custom order and only to military, government and intelligence agencies.<sup id="cite_ref-95" class="reference"><a href="#cite_note-95"><span class="cite-bracket">&#91;</span>95<span class="cite-bracket">&#93;</span></a></sup> They are specifically designed for covert operations, such as providing a very robust case and a "stealth" operating mode kill switch that disables display, LED lights, speaker, fan and any wireless technology.<sup id="cite_ref-96" class="reference"><a href="#cite_note-96"><span class="cite-bracket">&#91;</span>96<span class="cite-bracket">&#93;</span></a></sup></li> <li>In March 2018, <a href="/wiki/Tuxedo_Computers" title="Tuxedo Computers">Tuxedo Computers</a>, a German company which specializes in PCs which run <a href="/wiki/Linux" title="Linux">Linux kernel-based operating systems</a>, announced an option in the BIOS of their system to disable ME.<sup id="cite_ref-97" class="reference"><a href="#cite_note-97"><span class="cite-bracket">&#91;</span>97<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="Effectiveness_against_vulnerabilities">Effectiveness against vulnerabilities</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=21" title="Edit section: Effectiveness against vulnerabilities"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Neither of the two methods to disable the ME discovered so far turned out to be an effective countermeasure against the SA-00086 vulnerability.<sup id="cite_ref-auto2_42-2" class="reference"><a href="#cite_note-auto2-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup> This is because the vulnerability is in an early-loaded ME module that is essential to boot the main CPU.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (September 2020)">citation needed</span></a></i>&#93;</sup> </p> <div class="mw-heading mw-heading2"><h2 id="Reactions">Reactions</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=22" title="Edit section: Reactions"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="By_Google">By Google</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=23" title="Edit section: By Google"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>As of 2017,<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&amp;action=edit">&#91;update&#93;</a></sup> Google was attempting to eliminate <a href="/wiki/Proprietary_software" title="Proprietary software">proprietary</a> firmware from its servers and found that the ME was a hurdle to that.<sup id="cite_ref-extreme1_40-3" class="reference"><a href="#cite_note-extreme1-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="By_AMD_processor_vendors">By AMD processor vendors</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=24" title="Edit section: By AMD processor vendors"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Shortly after SA-00086 was patched, vendors for AMD processor mainboards started shipping BIOS updates that allow disabling the <a href="/wiki/AMD_Platform_Security_Processor" title="AMD Platform Security Processor">AMD Platform Security Processor</a>,<sup id="cite_ref-98" class="reference"><a href="#cite_note-98"><span class="cite-bracket">&#91;</span>98<span class="cite-bracket">&#93;</span></a></sup> a subsystem with a similar function as the ME. </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=25" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/AMD_Platform_Security_Processor" title="AMD Platform Security Processor">AMD Platform Security Processor</a></li> <li><a href="/wiki/ARM_TrustZone" class="mw-redirect" title="ARM TrustZone">ARM TrustZone</a></li> <li><a href="/wiki/Intel_AMT_versions" title="Intel AMT versions">Intel AMT versions</a></li> <li><a href="/wiki/Intel_vPro" title="Intel vPro">Intel vPro</a></li> <li><a href="/wiki/Meltdown_(security_vulnerability)" title="Meltdown (security vulnerability)">Meltdown (security vulnerability)</a></li> <li><a href="/wiki/Microsoft_Pluton" class="mw-redirect" title="Microsoft Pluton">Microsoft Pluton</a></li> <li><a href="/wiki/Next-Generation_Secure_Computing_Base" title="Next-Generation Secure Computing Base">Next-Generation Secure Computing Base</a></li> <li><a href="/wiki/Samsung_Knox" title="Samsung Knox">Samsung Knox</a></li> <li><a href="/wiki/Spectre_(security_vulnerability)" title="Spectre (security vulnerability)">Spectre (security vulnerability)</a></li> <li><a href="/wiki/Trusted_Computing" title="Trusted Computing">Trusted Computing</a></li> <li><a href="/wiki/Trusted_Execution_Technology" title="Trusted Execution Technology">Trusted Execution Technology</a></li> <li><a href="/wiki/Trusted_Platform_Module" title="Trusted Platform Module">Trusted Platform Module</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=26" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-intelamt-1"><span class="mw-cite-backlink">^ <a href="#cite_ref-intelamt_1-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-intelamt_1-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-intelamt_1-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFOster2019" class="citation web cs1">Oster, Joseph E. (September 3, 2019). <a rel="nofollow" class="external text" href="https://software.intel.com/en-us/articles/getting-started-with-intel-active-management-technology-amt">"Getting Started with Intel Active Management Technology (Intel AMT)"</a>. Intel<span class="reference-accessdate">. Retrieved <span class="nowrap">September 22,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Getting+Started+with+Intel+Active+Management+Technology+%28Intel+AMT%29&amp;rft.pub=Intel&amp;rft.date=2019-09-03&amp;rft.aulast=Oster&amp;rft.aufirst=Joseph+E.&amp;rft_id=https%3A%2F%2Fsoftware.intel.com%2Fen-us%2Farticles%2Fgetting-started-with-intel-active-management-technology-amt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-intel-amt-me-2"><span class="mw-cite-backlink">^ <a href="#cite_ref-intel-amt-me_2-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-intel-amt-me_2-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1 cs1-prop-unfit"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20190221093441/https://software.intel.com/en-us/blogs/2011/12/14/intelr-amt-and-the-intelr-me/">"Intel AMT and the Intel ME"</a>. Intel. Archived from the original on February 21, 2019.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+AMT+and+the+Intel+ME&amp;rft.pub=Intel&amp;rft_id=https%3A%2F%2Fsoftware.intel.com%2Fen-us%2Fblogs%2F2011%2F12%2F14%2Fintelr-amt-and-the-intelr-me&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/support/articles/000005974/software/chipset-software.html">"Frequently Asked Questions for the Intel Management Engine Verification Utility"</a>. <q>Built into many Intel Chipset–based platforms is a small, low-power computer subsystem called the Intel Management Engine (Intel ME).</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Frequently+Asked+Questions+for+the+Intel+Management+Engine+Verification+Utility&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fsupport%2Farticles%2F000005974%2Fsoftware%2Fchipset-software.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-eff1-4"><span class="mw-cite-backlink">^ <a href="#cite_ref-eff1_4-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-eff1_4-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-eff1_4-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFPortnoyEckersley2017" class="citation web cs1">Portnoy, Erica; Eckersley, Peter (May 8, 2017). <a rel="nofollow" class="external text" href="https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it">"Intel's Management Engine is a security hazard, and users need a way to disable it"</a>. Electronic Frontier Foundation<span class="reference-accessdate">. Retrieved <span class="nowrap">February 21,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel%27s+Management+Engine+is+a+security+hazard%2C+and+users+need+a+way+to+disable+it&amp;rft.pub=Electronic+Frontier+Foundation&amp;rft.date=2017-05-08&amp;rft.aulast=Portnoy&amp;rft.aufirst=Erica&amp;rft.au=Eckersley%2C+Peter&amp;rft_id=https%3A%2F%2Fwww.eff.org%2Fdeeplinks%2F2017%2F05%2Fintels-management-engine-security-hazard-and-users-need-way-disable-it&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-techrepublicME-5"><span class="mw-cite-backlink">^ <a href="#cite_ref-techrepublicME_5-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-techrepublicME_5-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-techrepublicME_5-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFWallen2016" class="citation web cs1">Wallen, Jack (July 1, 2016). <a rel="nofollow" class="external text" href="https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/">"Is the Intel Management Engine a backdoor?"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Is+the+Intel+Management+Engine+a+backdoor%3F&amp;rft.date=2016-07-01&amp;rft.aulast=Wallen&amp;rft.aufirst=Jack&amp;rft_id=https%3A%2F%2Fwww.techrepublic.com%2Farticle%2Fis-the-intel-management-engine-a-backdoor%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/support/articles/000005974/software/chipset-software.html">"Frequently Asked Questions for the Intel Management Engine Verification Utility"</a>. <q>The Intel ME performs various tasks while the system is in sleep, during the boot process, and when your system is running.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Frequently+Asked+Questions+for+the+Intel+Management+Engine+Verification+Utility&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fsupport%2Farticles%2F000005974%2Fsoftware%2Fchipset-software.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.blackhat.com/eu-17/briefings/schedule/#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668">"Black Hat Europe 2017"</a>. <i>BlackHat.com</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=BlackHat.com&amp;rft.atitle=Black+Hat+Europe+2017&amp;rft_id=https%3A%2F%2Fwww.blackhat.com%2Feu-17%2Fbriefings%2Fschedule%2F%23how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/support/articles/000005974/software/chipset-software.html">"Frequently Asked Questions for the Intel Management Engine Verification Utility"</a>. <q>This subsystem must function correctly to get the most performance and capability from your PC.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Frequently+Asked+Questions+for+the+Intel+Management+Engine+Verification+Utility&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fsupport%2Farticles%2F000005974%2Fsoftware%2Fchipset-software.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFHoffman2017" class="citation web cs1">Hoffman, Chris (November 22, 2017). <a rel="nofollow" class="external text" href="https://www.howtogeek.com/334013/intel-management-engine-explained-the-tiny-computer-inside-your-cpu/">"Intel Management Engine, Explained: The Tiny Computer Inside Your CPU"</a>. <i>How-To Geek</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=How-To+Geek&amp;rft.atitle=Intel+Management+Engine%2C+Explained%3A+The+Tiny+Computer+Inside+Your+CPU&amp;rft.date=2017-11-22&amp;rft.aulast=Hoffman&amp;rft.aufirst=Chris&amp;rft_id=https%3A%2F%2Fwww.howtogeek.com%2F334013%2Fintel-management-engine-explained-the-tiny-computer-inside-your-cpu%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFEckersley2017" class="citation web cs1">Eckersley, Erica Portnoy and Peter (May 8, 2017). <a rel="nofollow" class="external text" href="https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it">"Intel's Management Engine is a security hazard, and users need a way to disable it"</a>. <i>Electronic Frontier Foundation</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Electronic+Frontier+Foundation&amp;rft.atitle=Intel%27s+Management+Engine+is+a+security+hazard%2C+and+users+need+a+way+to+disable+it&amp;rft.date=2017-05-08&amp;rft.aulast=Eckersley&amp;rft.aufirst=Erica+Portnoy+and+Peter&amp;rft_id=https%3A%2F%2Fwww.eff.org%2Fdeeplinks%2F2017%2F05%2Fintels-management-engine-security-hazard-and-users-need-way-disable-it&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-auto1-11"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto1_11-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto1_11-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://io.netgarage.org/me/">"Intel ME huffman dictionaries - Unhuffme v2.4"</a>. <i>IO.NetGarage.org</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=IO.NetGarage.org&amp;rft.atitle=Intel+ME+huffman+dictionaries+-+Unhuffme+v2.4&amp;rft_id=http%3A%2F%2Fio.netgarage.org%2Fme%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-ptsecurity1-12"><span class="mw-cite-backlink">^ <a href="#cite_ref-ptsecurity1_12-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ptsecurity1_12-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-ptsecurity1_12-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170828150536/http://blog.ptsecurity.com/2017/08/disabling-intel-me.html">"Positive Technologies Blog: Disabling Intel ME 11 via undocumented mode"</a>. Archived from <a rel="nofollow" class="external text" href="http://blog.ptsecurity.com/2017/08/disabling-intel-me.html">the original</a> on August 28, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">August 30,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Positive+Technologies+Blog%3A+Disabling+Intel+ME+11+via+undocumented+mode&amp;rft_id=http%3A%2F%2Fblog.ptsecurity.com%2F2017%2F08%2Fdisabling-intel-me.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-is-13"><span class="mw-cite-backlink">^ <a href="#cite_ref-is_13-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-is_13-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">Igor Skochinsky (<a href="/wiki/Hex-Rays" class="mw-redirect" title="Hex-Rays">Hex-Rays</a>) <a rel="nofollow" class="external text" href="http://2012.ruxconbreakpoint.com/assets/Uploads/bpx/Breakpoint%202012%20Skochinsky.pdf">Rootkit in your laptop</a>, Ruxcon Breakpoint 2012</span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/i210-ethernet-controller-datasheet.pdf">"Intel Ethernet Controller I210 Datasheet"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Intel" title="Intel">Intel</a>. 2013. pp.&#160;1, 15, 52, <span class="nowrap">621–</span>776<span class="reference-accessdate">. Retrieved <span class="nowrap">November 9,</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Ethernet+Controller+I210+Datasheet&amp;rft.pages=1%2C+15%2C+52%2C+%3Cspan+class%3D%22nowrap%22%3E621-%3C%2Fspan%3E776&amp;rft.pub=Intel&amp;rft.date=2013&amp;rft_id=http%3A%2F%2Fwww.intel.com%2Fcontent%2Fdam%2Fwww%2Fpublic%2Fus%2Fen%2Fdocuments%2Fdatasheets%2Fi210-ethernet-controller-datasheet.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.intel.com/content/dam/www/public/us/en/documents/product-briefs/ethernet-x540-brief.pdf">"Intel Ethernet Controller X540 Product Brief"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Intel" title="Intel">Intel</a>. 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">February 26,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Ethernet+Controller+X540+Product+Brief&amp;rft.pub=Intel&amp;rft.date=2012&amp;rft_id=http%3A%2F%2Fwww.intel.com%2Fcontent%2Fdam%2Fwww%2Fpublic%2Fus%2Fen%2Fdocuments%2Fproduct-briefs%2Fethernet-x540-brief.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-meilnx-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-meilnx_16-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20141101045709/https://www.kernel.org/doc/Documentation/misc-devices/mei/mei.txt">"Archived copy"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.kernel.org/doc/Documentation/misc-devices/mei/mei.txt">the original</a> on November 1, 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">February 25,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Archived+copy&amp;rft_id=https%3A%2F%2Fwww.kernel.org%2Fdoc%2FDocumentation%2Fmisc-devices%2Fmei%2Fmei.txt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: archived copy as title (<a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">link</a>)</span></span> </li> <li id="cite_note-meilnx2-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-meilnx2_17-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.kernel.org/doc/html/latest/driver-api/mei/mei.html">"Introduction — The Linux Kernel documentation"</a>. <i>Kernel.org</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Kernel.org&amp;rft.atitle=Introduction+%E2%80%94+The+Linux+Kernel+documentation&amp;rft_id=https%3A%2F%2Fwww.kernel.org%2Fdoc%2Fhtml%2Flatest%2Fdriver-api%2Fmei%2Fmei.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-quest-18"><span class="mw-cite-backlink">^ <a href="#cite_ref-quest_18-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-quest_18-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFRutkowska" class="citation web cs1">Rutkowska, Joanna. <a rel="nofollow" class="external text" href="http://invisiblethingslab.com/resources/misc09/Quest%20To%20The%20Core%20%28public%29.pdf">"A Quest to the Core"</a> <span class="cs1-format">(PDF)</span>. <i>Invisiblethingslab.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 25,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Invisiblethingslab.com&amp;rft.atitle=A+Quest+to+the+Core&amp;rft.aulast=Rutkowska&amp;rft.aufirst=Joanna&amp;rft_id=http%3A%2F%2Finvisiblethingslab.com%2Fresources%2Fmisc09%2FQuest%2520To%2520The%2520Core%2520%2528public%2529.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20140211075753/http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/celeron-mobile-p4000-u3000-datasheet.pdf">"Archived copy"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/celeron-mobile-p4000-u3000-datasheet.pdf">the original</a> <span class="cs1-format">(PDF)</span> on February 11, 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">February 26,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Archived+copy&amp;rft_id=http%3A%2F%2Fwww.intel.com%2Fcontent%2Fdam%2Fwww%2Fpublic%2Fus%2Fen%2Fdocuments%2Fdatasheets%2Fceleron-mobile-p4000-u3000-datasheet.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: archived copy as title (<a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">link</a>)</span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://users.nik.uni-obuda.hu/sima/letoltes/magyar/SZA2011_osz/nappali/Platforms-3_E_2011_12_14.ppt">"Platforms II"</a> <span class="cs1-format">(PDF)</span>. <i>Users.nik.uni-obuda.hu</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 25,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Users.nik.uni-obuda.hu&amp;rft.atitle=Platforms+II&amp;rft_id=http%3A%2F%2Fusers.nik.uni-obuda.hu%2Fsima%2Fletoltes%2Fmagyar%2FSZA2011_osz%2Fnappali%2FPlatforms-3_E_2011_12_14.ppt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-supermicrosps-21"><span class="mw-cite-backlink">^ <a href="#cite_ref-supermicrosps_21-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-supermicrosps_21-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.supermicro.com/manuals/superserver/4U/MNL-1765.pdf">"FatTwin F618R3-FT+ F618R3-FTPT+ User's Manual"</a> <span class="cs1-format">(PDF)</span>. Super Micro. <q>The Manageability Engine, which is an ARC controller embedded in the IOH (I/O Hub), provides Server Platform Services (SPS) to your system. The services provided by SPS are different from those provided by the ME on client platforms.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=FatTwin+F618R3-FT%2B+F618R3-FTPT%2B+User%27s+Manual&amp;rft.pub=Super+Micro&amp;rft_id=https%3A%2F%2Fwww.supermicro.com%2Fmanuals%2Fsuperserver%2F4U%2FMNL-1765.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-intelsps-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-intelsps_22-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200-v6-family-brief.html">"Intel Xeon Processor E3-1200 v6 Product Family Product Brief"</a>. Intel. <q>Intel Server Platform Services (Intel SPS): Designed for managing rack-mount servers, Intel Server Platform Services provides a suite of tools to control and monitor power, thermal, and resource utilization.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Xeon+Processor+E3-1200+v6+Product+Family+Product+Brief&amp;rft.pub=Intel&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fprocessors%2Fxeon%2Fxeon-e3-1200-v6-family-brief.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-xeondsps-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-xeondsps_23-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/dam/www/public/us/en/documents/platform-briefs/xeon-processor-d-platform-brief.pdf">"Intel Xeon Processor D-1500 Product Family"</a> <span class="cs1-format">(PDF)</span>. Intel.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Xeon+Processor+D-1500+Product+Family&amp;rft.pub=Intel&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fdam%2Fwww%2Fpublic%2Fus%2Fen%2Fdocuments%2Fplatform-briefs%2Fxeon-processor-d-platform-brief.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-delltxe-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-delltxe_24-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.dell.com/support/home/us/en/19/drivers/driversdetails?driverId=K9HM7">"Intel Trusted Execution Engine Driver"</a>. Dell. <q>This package provides the drivers for the Intel Trusted Execution Engine and is supported on Dell Venue 11 Pro 5130 Tablet</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Trusted+Execution+Engine+Driver&amp;rft.pub=Dell&amp;rft_id=https%3A%2F%2Fwww.dell.com%2Fsupport%2Fhome%2Fus%2Fen%2F19%2Fdrivers%2Fdriversdetails%3FdriverId%3DK9HM7&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-inteltxe-25"><span class="mw-cite-backlink">^ <a href="#cite_ref-inteltxe_25-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-inteltxe_25-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://downloadcenter.intel.com/download/24892/Intel-Trusted-Execution-Engine-Driver-for-Intel-NUC-Kit-NUC5CPYH-NUC5PPYH-NUC5PGYH">"Intel Trusted Execution Engine Driver for Intel NUC Kit NUC5CPYH, NUC5PPYH, NUC5PGYH"</a>. Intel. <q>Installs the Intel Trusted Execution Engine (Intel TXE) driver and firmware for Windows 10 and Windows 7*/8.1*, 64-bit. The Intel TXE driver is required for Secure Boot and platform security features.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Trusted+Execution+Engine+Driver+for+Intel+NUC+Kit+NUC5CPYH%2C+NUC5PPYH%2C+NUC5PGYH&amp;rft.pub=Intel&amp;rft_id=https%3A%2F%2Fdownloadcenter.intel.com%2Fdownload%2F24892%2FIntel-Trusted-Execution-Engine-Driver-for-Intel-NUC-Kit-NUC5CPYH-NUC5PPYH-NUC5PGYH&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.troopers.de/downloads/troopers17/TR17_ME11_Static.pdf">Positive Technologies Blog:The Way of the Static Analysis</a></span> </li> <li id="cite_note-intel-ppt-27"><span class="mw-cite-backlink">^ <a href="#cite_ref-intel-ppt_27-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-intel-ppt_27-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/dam/www/public/us/en/documents/white-papers/security-technologies-4th-gen-core-retail-paper.pdf">"Intel Hardware-based Security Technologies for Intelligent Retail Devices"</a> <span class="cs1-format">(PDF)</span>. Intel.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Hardware-based+Security+Technologies+for+Intelligent+Retail+Devices&amp;rft.pub=Intel&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fdam%2Fwww%2Fpublic%2Fus%2Fen%2Fdocuments%2Fwhite-papers%2Fsecurity-technologies-4th-gen-core-retail-paper.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://software.intel.com/sites/default/files/af/73/Intel_QST_Programmers_Reference_Manual.pdf">"Intel Quiet System Technology 2.0: Programmer's Reference Manual"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Intel" title="Intel">Intel</a>. February 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">August 25,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Quiet+System+Technology+2.0%3A+Programmer%27s+Reference+Manual&amp;rft.pub=Intel&amp;rft.date=2010-02&amp;rft_id=https%3A%2F%2Fsoftware.intel.com%2Fsites%2Fdefault%2Ffiles%2Faf%2F73%2FIntel_QST_Programmers_Reference_Manual.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://proprivacy.com/privacy-news/intel-management-engine">"The Intel Management Engine – a Privacy Nightmare"</a>. <i>ProPrivacy.com</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=ProPrivacy.com&amp;rft.atitle=The+Intel+Management+Engine+%E2%80%93+a+Privacy+Nightmare&amp;rft_id=https%3A%2F%2Fproprivacy.com%2Fprivacy-news%2Fintel-management-engine&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFSeptember_20122012" class="citation web cs1">September 2012, Patrick Kennedy 21 (September 21, 2012). <a rel="nofollow" class="external text" href="https://www.tomshardware.com/reviews/vpro-anti-theft-small-business-advantage,3259.html">"Intel vPro In 2012, Small Business Advantage, And Anti-Theft Tech"</a>. <i>Tom's Hardware</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Tom%27s+Hardware&amp;rft.atitle=Intel+vPro+In+2012%2C+Small+Business+Advantage%2C+And+Anti-Theft+Tech.&amp;rft.date=2012-09-21&amp;rft.aulast=September+2012&amp;rft.aufirst=Patrick+Kennedy+21&amp;rft_id=https%3A%2F%2Fwww.tomshardware.com%2Freviews%2Fvpro-anti-theft-small-business-advantage%2C3259.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: numeric names: authors list (<a href="/wiki/Category:CS1_maint:_numeric_names:_authors_list" title="Category:CS1 maint: numeric names: authors list">link</a>)</span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20200801222002/https://service.mcafee.com/webcenter/portal/oracle/webcenter/page/scopedMD/s55728c97_466d_4ddb_952d_05484ea932c6/Page29.jspx?wc.contextURL=%2Fspaces%2Fcp&amp;articleId=TS101986&amp;leftWidth=0%25&amp;showFooter=false&amp;showHeader=false&amp;rightWidth=0%25&amp;centerWidth=100%25&amp;_afrLoop=383304777056094#!@@?showFooter=false&amp;_afrLoop=383304777056094&amp;articleId=TS101986&amp;leftWidth=0%2525&amp;showHeader=false&amp;wc.contextURL=%252Fspaces%252Fcp&amp;rightWidth=0%2525&amp;centerWidth=100%2525&amp;_adf.ctrl-state=o56hl18tm_9">"McAfee KB - End of Life for McAfee/Intel Anti-Theft (TS101986)"</a>. <i>service.mcafee.com</i>. Archived from <a rel="nofollow" class="external text" href="https://service.mcafee.com/webcenter/portal/oracle/webcenter/page/scopedMD/s55728c97_466d_4ddb_952d_05484ea932c6/Page29.jspx?wc.contextURL=%2Fspaces%2Fcp&amp;articleId=TS101986&amp;leftWidth=0%25&amp;showFooter=false&amp;showHeader=false&amp;rightWidth=0%25&amp;centerWidth=100%25&amp;_afrLoop=383304777056094#!@@?showFooter=false&amp;_afrLoop=383304777056094&amp;articleId=TS101986&amp;leftWidth=0%2525&amp;showHeader=false&amp;wc.contextURL=%252Fspaces%252Fcp&amp;rightWidth=0%2525&amp;centerWidth=100%2525&amp;_adf.ctrl-state=o56hl18tm_9">the original</a> on August 1, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">September 10,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=service.mcafee.com&amp;rft.atitle=McAfee+KB+-+End+of+Life+for+McAfee%2FIntel+Anti-Theft+%28TS101986%29&amp;rft_id=https%3A%2F%2Fservice.mcafee.com%2Fwebcenter%2Fportal%2Foracle%2Fwebcenter%2Fpage%2FscopedMD%2Fs55728c97_466d_4ddb_952d_05484ea932c6%2FPage29.jspx%3Fwc.contextURL%3D%252Fspaces%252Fcp%26articleId%3DTS101986%26leftWidth%3D0%2525%26showFooter%3Dfalse%26showHeader%3Dfalse%26rightWidth%3D0%2525%26centerWidth%3D100%2525%26_afrLoop%3D383304777056094%23%21%40%40%3FshowFooter%3Dfalse%26_afrLoop%3D383304777056094%26articleId%3DTS101986%26leftWidth%3D0%252525%26showHeader%3Dfalse%26wc.contextURL%3D%25252Fspaces%25252Fcp%26rightWidth%3D0%252525%26centerWidth%3D100%252525%26_adf.ctrl-state%3Do56hl18tm_9&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-intel-sol-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-intel-sol_32-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://software.intel.com/en-us/articles/using-intel-amt-serial-over-lan-to-the-fullest">"Using Intel AMT serial-over-LAN to the fullest"</a>. Intel.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Using+Intel+AMT+serial-over-LAN+to+the+fullest&amp;rft.pub=Intel&amp;rft_id=https%3A%2F%2Fsoftware.intel.com%2Fen-us%2Farticles%2Fusing-intel-amt-serial-over-lan-to-the-fullest&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.legitreviews.com/how-to-enable-bitlocker-with-intel-ptt-and-no-tpm-for-better-security_211713">"How To Enable BitLocker With Intel PTT and No TPM For Better Security"</a>. <i>Legit Reviews</i>. May 8, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">September 8,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Legit+Reviews&amp;rft.atitle=How+To+Enable+BitLocker+With+Intel+PTT+and+No+TPM+For+Better+Security&amp;rft.date=2019-05-08&amp;rft_id=https%3A%2F%2Fwww.legitreviews.com%2Fhow-to-enable-bitlocker-with-intel-ptt-and-no-tpm-for-better-security_211713&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.kernel.org/doc/html/latest/driver-api/mei/nfc.html">"MEI NFC"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=MEI+NFC&amp;rft_id=https%3A%2F%2Fwww.kernel.org%2Fdoc%2Fhtml%2Flatest%2Fdriver-api%2Fmei%2Fnfc.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-intelmay-35"><span class="mw-cite-backlink">^ <a href="#cite_ref-intelmay_35-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-intelmay_35-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00075.html">"Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Escalation of Privilege"</a>. <i>Intel.com</i>. March 17, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">September 22,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Intel.com&amp;rft.atitle=Intel+Active+Management+Technology%2C+Intel+Small+Business+Technology%2C+and+Intel+Standard+Manageability+Escalation+of+Privilege&amp;rft.date=2020-03-17&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fsecurity-center%2Fadvisory%2Fintel-sa-00075.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFCharlie_Demerjian2017" class="citation web cs1">Charlie Demerjian (May 1, 2017). <a rel="nofollow" class="external text" href="https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/">"Remote security exploit in all 2008+ Intel platforms"</a>. SemiAccurate<span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Remote+security+exploit+in+all+2008%2B+Intel+platforms&amp;rft.pub=SemiAccurate&amp;rft.date=2017-05-01&amp;rft.au=Charlie+Demerjian&amp;rft_id=https%3A%2F%2Fsemiaccurate.com%2F2017%2F05%2F01%2Fremote-security-exploit-2008-intel-platforms%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-reg-2017-05-01-37"><span class="mw-cite-backlink">^ <a href="#cite_ref-reg-2017-05-01_37-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-reg-2017-05-01_37-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-reg-2017-05-01_37-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2017/05/01/intel_amt_me_vulnerability/">"Red alert! Intel patches remote execution hole that's been hidden in chips since 2010"</a>. <i>TheRegister.co.uk</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TheRegister.co.uk&amp;rft.atitle=Red+alert%21+Intel+patches+remote+execution+hole+that%27s+been+hidden+in+chips+since+2010&amp;rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2017%2F05%2F01%2Fintel_amt_me_vulnerability%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFAlaoui2017" class="citation web cs1">Alaoui, Youness (October 19, 2017). <a rel="nofollow" class="external text" href="https://puri.sm/posts/deep-dive-into-intel-me-disablement/">"Deep dive into Intel Management Engine disablement"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Deep+dive+into+Intel+Management+Engine+disablement&amp;rft.date=2017-10-19&amp;rft.aulast=Alaoui&amp;rft.aufirst=Youness&amp;rft_id=https%3A%2F%2Fpuri.sm%2Fposts%2Fdeep-dive-into-intel-me-disablement%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFAlaoui2017" class="citation web cs1">Alaoui, Youness (March 9, 2017). <a rel="nofollow" class="external text" href="https://puri.sm/posts/neutralizing-intel-management-engine-on-librem-laptops/">"Neutralizing the Intel Management Engine on Librem Laptops"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Neutralizing+the+Intel+Management+Engine+on+Librem+Laptops&amp;rft.date=2017-03-09&amp;rft.aulast=Alaoui&amp;rft.aufirst=Youness&amp;rft_id=https%3A%2F%2Fpuri.sm%2Fposts%2Fneutralizing-intel-management-engine-on-librem-laptops%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-extreme1-40"><span class="mw-cite-backlink">^ <a href="#cite_ref-extreme1_40-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-extreme1_40-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-extreme1_40-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-extreme1_40-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.extremetech.com/computing/259426-intel-patches-major-flaws-intel-management-engine">"Intel Patches Major Flaws in the Intel Management Engine"</a>. Extreme Tech.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Patches+Major+Flaws+in+the+Intel+Management+Engine&amp;rft.pub=Extreme+Tech&amp;rft_id=https%3A%2F%2Fwww.extremetech.com%2Fcomputing%2F259426-intel-patches-major-flaws-intel-management-engine&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFClaburn2017" class="citation web cs1">Claburn, Thomas (November 20, 2017). <a rel="nofollow" class="external text" href="https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/">"Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets"</a>. <i>The Register</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Register&amp;rft.atitle=Intel+finds+critical+holes+in+secret+Management+Engine+hidden+in+tons+of+desktop%2C+server+chipsets&amp;rft.date=2017-11-20&amp;rft.aulast=Claburn&amp;rft.aufirst=Thomas&amp;rft_id=https%3A%2F%2Fwww.theregister.com%2F2017%2F11%2F20%2Fintel_flags_firmware_flaws%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-auto2-42"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto2_42-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto2_42-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-auto2_42-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.theregister.com/2017/12/06/intel_management_engine_pwned_by_buffer_overflow/">"Intel Management Engine pwned by buffer overflow"</a>. <i>TheRegister.com</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TheRegister.com&amp;rft.atitle=Intel+Management+Engine+pwned+by+buffer+overflow&amp;rft_id=https%3A%2F%2Fwww.theregister.com%2F2017%2F12%2F06%2Fintel_management_engine_pwned_by_buffer_overflow%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-SA-00112-43"><span class="mw-cite-backlink">^ <a href="#cite_ref-SA-00112_43-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-SA-00112_43-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html">"INTEL-SA-00112"</a>. <i>Intel</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Intel&amp;rft.atitle=INTEL-SA-00112&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fsecurity-center%2Fadvisory%2Fintel-sa-00112.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00125.html">"INTEL-SA-00125"</a>. <i>Intel</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Intel&amp;rft.atitle=INTEL-SA-00125&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fsecurity-center%2Fadvisory%2Fintel-sa-00125.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160412045958/http://invisiblethingslab.com/press/itl-press-2009-03.pdf">"Invisible Things Lab to present two new technical presentations disclosing system-level vulnerabilities affecting modern PC hardware at its core"</a> <span class="cs1-format">(PDF)</span>. <i>Invisiblethingslab.com</i>. Archived from <a rel="nofollow" class="external text" href="http://invisiblethingslab.com/press/itl-press-2009-03.pdf">the original</a> <span class="cs1-format">(PDF)</span> on April 12, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">May 25,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Invisiblethingslab.com&amp;rft.atitle=Invisible+Things+Lab+to+present+two+new+technical+presentations+disclosing+system-level+vulnerabilities+affecting+modern+PC+hardware+at+its+core&amp;rft_id=http%3A%2F%2Finvisiblethingslab.com%2Fpress%2Fitl-press-2009-03.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160304033404/http://www.stewin.org/slides/pstewin-SPRING6-EvaluatingRing-3Rootkits.pdf">"FG Security in telecommunications&#160;: Evaluating "Ring-3" Rootkits"</a> <span class="cs1-format">(PDF)</span>. <i>Stewin.org</i>. Archived from <a rel="nofollow" class="external text" href="http://www.stewin.org/slides/pstewin-SPRING6-EvaluatingRing-3Rootkits.pdf">the original</a> <span class="cs1-format">(PDF)</span> on March 4, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">May 25,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Stewin.org&amp;rft.atitle=FG+Security+in+telecommunications+%3A+Evaluating+%22Ring-3%22+Rootkits&amp;rft_id=http%3A%2F%2Fwww.stewin.org%2Fslides%2Fpstewin-SPRING6-EvaluatingRing-3Rootkits.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160303222145/http://stewin.org/slides/44con_2013-dedicated_hw_malware-stewin_bystrov.pdf">"Persistent, Stealthy Remote-controlled Dedicated Hardware Malware"</a> <span class="cs1-format">(PDF)</span>. <i>Stewin.org</i>. Archived from <a rel="nofollow" class="external text" href="http://stewin.org/slides/44con_2013-dedicated_hw_malware-stewin_bystrov.pdf">the original</a> <span class="cs1-format">(PDF)</span> on March 3, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">May 25,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Stewin.org&amp;rft.atitle=Persistent%2C+Stealthy+Remote-controlled+Dedicated+Hardware+Malware&amp;rft_id=http%3A%2F%2Fstewin.org%2Fslides%2F44con_2013-dedicated_hw_malware-stewin_bystrov.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100402-Vassilios_Ververis-with-cover.pdf">"Security Evaluation of Intel's Active Management Technology"</a> <span class="cs1-format">(PDF)</span>. <i>Web.it.kth.se</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 25,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Web.it.kth.se&amp;rft.atitle=Security+Evaluation+of+Intel%27s+Active+Management+Technology&amp;rft_id=http%3A%2F%2Fweb.it.kth.se%2F~maguire%2FDEGREE-PROJECT-REPORTS%2F100402-Vassilios_Ververis-with-cover.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170505125225/http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5689">"CVE - CVE-2017-5689"</a>. <i>Cve.mitre.org</i>. Archived from <a rel="nofollow" class="external text" href="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5689">the original</a> on May 5, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Cve.mitre.org&amp;rft.atitle=CVE+-+CVE-2017-5689&amp;rft_id=https%3A%2F%2Fwww.cve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3D2017-5689&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.darknet.org.uk/2016/06/intel-hidden-management-engine-x86-security-risk/">"Intel Hidden Management Engine - x86 Security Risk?"</a>. Darknet. June 16, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Hidden+Management+Engine+-+x86+Security+Risk%3F&amp;rft.pub=Darknet&amp;rft.date=2016-06-16&amp;rft_id=https%3A%2F%2Fwww.darknet.org.uk%2F2016%2F06%2Fintel-hidden-management-engine-x86-security-risk%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFGarrett2017" class="citation web cs1">Garrett, Matthew (May 1, 2017). <a rel="nofollow" class="external text" href="https://mjg59.dreamwidth.org/48429.html">"Intel's remote AMT vulnerablity"</a>. <i>mjg59.dreamwidth.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=mjg59.dreamwidth.org&amp;rft.atitle=Intel%27s+remote+AMT+vulnerablity&amp;rft.date=2017-05-01&amp;rft.aulast=Garrett&amp;rft.aufirst=Matthew&amp;rft_id=https%3A%2F%2Fmjg59.dreamwidth.org%2F48429.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-ssh-com-52"><span class="mw-cite-backlink">^ <a href="#cite_ref-ssh-com_52-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ssh-com_52-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-ssh-com_52-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20180305001456/https://www.ssh.com/vulnerability/intel-amt/">"2017-05-05 ALERT! Intel AMT EXPLOIT OUT! IT'S BAD! DISABLE AMT NOW!"</a>. <i>Ssh.com\Accessdate=2017-05-07</i>. Archived from <a rel="nofollow" class="external text" href="https://www.ssh.com/vulnerability/intel-amt/">the original</a> on March 5, 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">November 25,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Ssh.com%5CAccessdate%3D2017-05-07&amp;rft.atitle=2017-05-05+ALERT%21+Intel+AMT+EXPLOIT+OUT%21+IT%27S+BAD%21+DISABLE+AMT+NOW%21&amp;rft_id=https%3A%2F%2Fwww.ssh.com%2Fvulnerability%2Fintel-amt%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFDan_Goodin2017" class="citation web cs1">Dan Goodin (May 6, 2017). <a rel="nofollow" class="external text" href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">"The Hijacking Flaw That Lurked in Intel Chips Is Worse than Anyone Thought"</a>. Ars Technica<span class="reference-accessdate">. Retrieved <span class="nowrap">May 8,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+Hijacking+Flaw+That+Lurked+in+Intel+Chips+Is+Worse+than+Anyone+Thought&amp;rft.pub=Ars+Technica&amp;rft.date=2017-05-06&amp;rft.au=Dan+Goodin&amp;rft_id=https%3A%2F%2Farstechnica.com%2Fsecurity%2F2017%2F05%2Fthe-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170511075221/http://en.community.dell.com/support-forums/laptop/f/3518/t/20011662">"General: BIOS updates due to Intel AMT IME vulnerability - General Hardware - Laptop - Dell Community"</a>. <i>En.Community.Dell.com</i>. May 2, 2017. Archived from <a rel="nofollow" class="external text" href="http://en.community.dell.com/support-forums/laptop/f/3518/t/20011662">the original</a> on May 11, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=En.Community.Dell.com&amp;rft.atitle=General%3A+BIOS+updates+due+to+Intel+AMT+IME+vulnerability+-+General+Hardware+-+Laptop+-+Dell+Community&amp;rft.date=2017-05-02&amp;rft_id=http%3A%2F%2Fen.community.dell.com%2Fsupport-forums%2Flaptop%2Ff%2F3518%2Ft%2F20011662&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://support.ts.fujitsu.com/content/Intel_Firmware.asp">"Advisory note: Intel Firmware vulnerability – Fujitsu Technical Support pages from Fujitsu Fujitsu Continental Europe, Middle East, Africa &amp; India"</a>. Support.ts.fujitsu.com. May 1, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">May 8,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Advisory+note%3A+Intel+Firmware+vulnerability+%E2%80%93+Fujitsu+Technical+Support+pages+from+Fujitsu+Fujitsu+Continental+Europe%2C+Middle+East%2C+Africa+%26+India&amp;rft.pub=Support.ts.fujitsu.com&amp;rft.date=2017-05-01&amp;rft_id=http%3A%2F%2Fsupport.ts.fujitsu.com%2Fcontent%2FIntel_Firmware.asp&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170508041543/http://h22208.www2.hpe.com/eginfolib/securityalerts/CVE-2017-5689-Intel/CVE-2017-5689.html">"HPE &#124; HPE CS700 2.0 for VMware"</a>. <i>H22208.www2.hpe.com</i>. May 1, 2017. Archived from <a rel="nofollow" class="external text" href="http://h22208.www2.hpe.com/eginfolib/securityalerts/CVE-2017-5689-Intel/CVE-2017-5689.html">the original</a> on May 8, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=H22208.www2.hpe.com&amp;rft.atitle=HPE+%26%23124%3B+HPE+CS700+2.0+for+VMware&amp;rft.date=2017-05-01&amp;rft_id=http%3A%2F%2Fh22208.www2.hpe.com%2Feginfolib%2Fsecurityalerts%2FCVE-2017-5689-Intel%2FCVE-2017-5689.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://communities.intel.com/thread/114071">"Intel Security Advisory regarding escalation o... &#124;Intel Communities"</a>. <i>Communities.Intel.com</i>. May 4, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Communities.Intel.com&amp;rft.atitle=Intel+Security+Advisory+regarding+escalation+o...+%26%23124%3BIntel+Communities&amp;rft.date=2017-05-04&amp;rft_id=https%3A%2F%2Fcommunities.intel.com%2Fthread%2F114071&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-58">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://support.lenovo.com/us/en/product_security/LEN-14963">"Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Remote Privilege Escalation"</a>. <i>Support.lenovo.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Support.lenovo.com&amp;rft.atitle=Intel+Active+Management+Technology%2C+Intel+Small+Business+Technology%2C+and+Intel+Standard+Manageability+Remote+Privilege+Escalation&amp;rft_id=https%3A%2F%2Fsupport.lenovo.com%2Fus%2Fen%2Fproduct_security%2FLEN-14963&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20180817215423/https://embedi.com/news/mythbusters-cve-2017-5689">"MythBusters: CVE-2017-5689"</a>. <i>Embedi.com</i>. May 2, 2017. Archived from <a rel="nofollow" class="external text" href="https://www.embedi.com/news/mythbusters-cve-2017-5689">the original</a> on August 17, 2018.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Embedi.com&amp;rft.atitle=MythBusters%3A+CVE-2017-5689&amp;rft.date=2017-05-02&amp;rft_id=https%3A%2F%2Fwww.embedi.com%2Fnews%2Fmythbusters-cve-2017-5689&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-60">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFCharlie_Demerjian2017" class="citation web cs1">Charlie Demerjian (May 1, 2017). <a rel="nofollow" class="external text" href="https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/">"Remote security exploit in all 2008+ Intel platforms"</a>. <i>SemiAccurate.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=SemiAccurate.com&amp;rft.atitle=Remote+security+exploit+in+all+2008%2B+Intel+platforms&amp;rft.date=2017-05-01&amp;rft.au=Charlie+Demerjian&amp;rft_id=https%3A%2F%2Fsemiaccurate.com%2F2017%2F05%2F01%2Fremote-security-exploit-2008-intel-platforms%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-61">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://arstechnica.com/security/2017/06/sneaky-hackers-use-intel-management-tools-to-bypass-windows-firewall/">"Sneaky hackers use Intel management tools to bypass Windows firewall"</a>. June 9, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">June 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Sneaky+hackers+use+Intel+management+tools+to+bypass+Windows+firewall&amp;rft.date=2017-06-09&amp;rft_id=https%3A%2F%2Farstechnica.com%2Fsecurity%2F2017%2F06%2Fsneaky-hackers-use-intel-management-tools-to-bypass-windows-firewall%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-62">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFTung" class="citation web cs1">Tung, Liam. <a rel="nofollow" class="external text" href="https://www.zdnet.com/article/windows-firewall-dodged-by-hot-patching-spies-using-intel-amt-says-microsoft/">"Windows firewall dodged by 'hot-patching' spies using Intel AMT, says Microsoft - ZDNet"</a>. <i><a href="/wiki/ZDNet" class="mw-redirect" title="ZDNet">ZDNet</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">June 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=ZDNet&amp;rft.atitle=Windows+firewall+dodged+by+%27hot-patching%27+spies+using+Intel+AMT%2C+says+Microsoft+-+ZDNet&amp;rft.aulast=Tung&amp;rft.aufirst=Liam&amp;rft_id=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fwindows-firewall-dodged-by-hot-patching-spies-using-intel-amt-says-microsoft%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-microsoft.com-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-microsoft.com_63-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://blogs.technet.microsoft.com/mmpc/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/">"PLATINUM continues to evolve, find ways to maintain invisibility"</a>. June 7, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">June 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=PLATINUM+continues+to+evolve%2C+find+ways+to+maintain+invisibility&amp;rft.date=2017-06-07&amp;rft_id=https%3A%2F%2Fblogs.technet.microsoft.com%2Fmmpc%2F2017%2F06%2F07%2Fplatinum-continues-to-evolve-find-ways-to-maintain-invisibility%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.bleepingcomputer.com/news/security/malware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls/">"Malware Uses Obscure Intel CPU Feature to Steal Data and Avoid Firewalls"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Malware+Uses+Obscure+Intel+CPU+Feature+to+Steal+Data+and+Avoid+Firewalls&amp;rft_id=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fmalware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.itnews.com.au/news/hackers-abuse-low-level-management-feature-for-invisible-backdoor-464499">"Hackers abuse low-level management feature for invisible backdoor"</a>. <i>iTnews</i><span class="reference-accessdate">. Retrieved <span class="nowrap">June 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=iTnews&amp;rft.atitle=Hackers+abuse+low-level+management+feature+for+invisible+backdoor&amp;rft_id=https%3A%2F%2Fwww.itnews.com.au%2Fnews%2Fhackers-abuse-low-level-management-feature-for-invisible-backdoor-464499&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.theregister.co.uk/AMP/2017/06/08/vxers_exploit_intels_amt_for_malwareoverlan/">"Vxers exploit Intel's Active Management for malware-over-LAN • The Register"</a>. <i>TheRegister.co.uk</i><span class="reference-accessdate">. Retrieved <span class="nowrap">June 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TheRegister.co.uk&amp;rft.atitle=Vxers+exploit+Intel%27s+Active+Management+for+malware-over-LAN+%E2%80%A2+The+Register&amp;rft_id=https%3A%2F%2Fwww.theregister.co.uk%2FAMP%2F2017%2F06%2F08%2Fvxers_exploit_intels_amt_for_malwareoverlan%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFSecurity2017" class="citation web cs1">Security, heise (June 9, 2017). <a rel="nofollow" class="external text" href="https://www.heise.de/security/meldung/Intel-Fernwartung-AMT-bei-Angriffen-auf-PCs-genutzt-3739441.html">"Intel-Fernwartung AMT bei Angriffen auf PCs genutzt"</a>. <i>Security</i><span class="reference-accessdate">. Retrieved <span class="nowrap">June 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Security&amp;rft.atitle=Intel-Fernwartung+AMT+bei+Angriffen+auf+PCs+genutzt&amp;rft.date=2017-06-09&amp;rft.aulast=Security&amp;rft.aufirst=heise&amp;rft_id=https%3A%2F%2Fwww.heise.de%2Fsecurity%2Fmeldung%2FIntel-Fernwartung-AMT-bei-Angriffen-auf-PCs-genutzt-3739441.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://channel9.msdn.com/Shows/Windows-Security-Blog/PLATINUM-activity-group-file-transfer-method-using-Intel-AMT-SOL">"PLATINUM activity group file-transfer method using Intel AMT SOL"</a>. <i>Channel 9</i><span class="reference-accessdate">. Retrieved <span class="nowrap">June 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Channel+9&amp;rft.atitle=PLATINUM+activity+group+file-transfer+method+using+Intel+AMT+SOL&amp;rft_id=https%3A%2F%2Fchannel9.msdn.com%2FShows%2FWindows-Security-Blog%2FPLATINUM-activity-group-file-transfer-method-using-Intel-AMT-SOL&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-69">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.bleepingcomputer.com/news/security/malware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls/">"Malware Uses Obscure Intel CPU Feature to Steal Data and Avoid Firewalls"</a>. <i>BleepingComputer</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=BleepingComputer&amp;rft.atitle=Malware+Uses+Obscure+Intel+CPU+Feature+to+Steal+Data+and+Avoid+Firewalls&amp;rft_id=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fmalware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-70">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.blackhat.com/eu-17/briefings/schedule/#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668">"Black Hat Europe 2017"</a>. <i>BlackHat.com</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=BlackHat.com&amp;rft.atitle=Black+Hat+Europe+2017&amp;rft_id=https%3A%2F%2Fwww.blackhat.com%2Feu-17%2Fbriefings%2Fschedule%2F%23how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-intel2-71"><span class="mw-cite-backlink">^ <a href="#cite_ref-intel2_71-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-intel2_71-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/support/articles/000025619/software.html">"Intel Management Engine Critical Firmware Update (Intel SA-00086)"</a>. Intel.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Management+Engine+Critical+Firmware+Update+%28Intel+SA-00086%29&amp;rft.pub=Intel&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fsupport%2Farticles%2F000025619%2Fsoftware.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-wired1-72"><span class="mw-cite-backlink">^ <a href="#cite_ref-wired1_72-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-wired1_72-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFNewman" class="citation magazine cs1">Newman, Lily Hay. <a rel="nofollow" class="external text" href="https://www.wired.com/story/intel-management-engine-vulnerabilities-pcs-servers-iot/">"Intel Chip Flaws Leave Millions of Devices Exposed"</a>. <i>Wired</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Wired&amp;rft.atitle=Intel+Chip+Flaws+Leave+Millions+of+Devices+Exposed&amp;rft.aulast=Newman&amp;rft.aufirst=Lily+Hay&amp;rft_id=https%3A%2F%2Fwww.wired.com%2Fstory%2Fintel-management-engine-vulnerabilities-pcs-servers-iot%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/ca/en/support/articles/000029388/software/chipset-software.html">"Intel Active Management Technology 9.x/10.x/11.x Security Review..."</a> <i>Intel</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Intel&amp;rft.atitle=Intel+Active+Management+Technology+9.x%2F10.x%2F11.x+Security+Review...&amp;rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fca%2Fen%2Fsupport%2Farticles%2F000029388%2Fsoftware%2Fchipset-software.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-softpediaME-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-softpediaME_74-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFCimpanu2016" class="citation web cs1">Cimpanu, Catalin (June 17, 2016). <a rel="nofollow" class="external text" href="https://news.softpedia.com/news/intel-x86-cpus-come-with-a-secret-backdoor-that-nobody-can-touch-or-disable-505347.shtml">"Intel x86 CPUs Come with a Secret Backdoor That Nobody Can Touch or Disable"</a>. <i>softpedia</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=softpedia&amp;rft.atitle=Intel+x86+CPUs+Come+with+a+Secret+Backdoor+That+Nobody+Can+Touch+or+Disable&amp;rft.date=2016-06-17&amp;rft.aulast=Cimpanu&amp;rft.aufirst=Catalin&amp;rft_id=https%3A%2F%2Fnews.softpedia.com%2Fnews%2Fintel-x86-cpus-come-with-a-secret-backdoor-that-nobody-can-touch-or-disable-505347.shtml&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-register_can_disable-75"><span class="mw-cite-backlink">^ <a href="#cite_ref-register_can_disable_75-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-register_can_disable_75-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.theregister.com/2017/08/29/intel_management_engine_can_be_disabled/">"Intel ME controller chip has secret kill switch"</a>. <i>TheRegister.com</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TheRegister.com&amp;rft.atitle=Intel+ME+controller+chip+has+secret+kill+switch&amp;rft_id=https%3A%2F%2Fwww.theregister.com%2F2017%2F08%2F29%2Fintel_management_engine_can_be_disabled%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-76">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html">"Documents Reveal N.S.A. Campaign Against Encryption"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+New+York+Times&amp;rft.atitle=Documents+Reveal+N.S.A.+Campaign+Against+Encryption&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2Finteractive%2F2013%2F09%2F05%2Fus%2Fdocuments-reveal-nsa-campaign-against-encryption.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-77">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://www.heise.de/select/ct/2018/7/1522460661786091">"Leserforum"</a>. <i>C't</i>. <b>2018</b> (7): <span class="nowrap">10–</span>11. March 16, 2018.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=C%27t&amp;rft.atitle=Leserforum&amp;rft.volume=2018&amp;rft.issue=7&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E10-%3C%2Fspan%3E11&amp;rft.date=2018-03-16&amp;rft_id=https%3A%2F%2Fwww.heise.de%2Fselect%2Fct%2F2018%2F7%2F1522460661786091&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.phoronix.com/news/HDCP-2.2-For-i915-DRM">"HDCP 2.2 Content Protection Being Worked On For The i915 DRM Driver"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=HDCP+2.2+Content+Protection+Being+Worked+On+For+The+i915+DRM+Driver&amp;rft_id=https%3A%2F%2Fwww.phoronix.com%2Fnews%2FHDCP-2.2-For-i915-DRM&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-79">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.phoronix.com/news/HDCP-2.2-Intel-Linux-Driver">"HDCP 2.2 Support Updated For The Intel DRM Linux Driver"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=HDCP+2.2+Support+Updated+For+The+Intel+DRM+Linux+Driver&amp;rft_id=https%3A%2F%2Fwww.phoronix.com%2Fnews%2FHDCP-2.2-Intel-Linux-Driver&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-80">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://puri.sm/faq/what-is-intel-management-engine-and-what-are-concerns-with-it-regarding-librem-laptops/">"What is Intel Management Engine and what are concerns with it regarding Librem laptops?"</a>. September 27, 2018.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=What+is+Intel+Management+Engine+and+what+are+concerns+with+it+regarding+Librem+laptops%3F&amp;rft.date=2018-09-27&amp;rft_id=https%3A%2F%2Fpuri.sm%2Ffaq%2Fwhat-is-intel-management-engine-and-what-are-concerns-with-it-regarding-librem-laptops%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-81">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://blog.system76.com/post/major-updates-for-system76-open-firmware-june-2023">"Major Updates for System76 Open Firmware!"</a>. June 2, 2023.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Major+Updates+for+System76+Open+Firmware%21&amp;rft.date=2023-06-02&amp;rft_id=https%3A%2F%2Fblog.system76.com%2Fpost%2Fmajor-updates-for-system76-open-firmware-june-2023&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-82">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/corna/me_cleaner">"corna/me_cleaner"</a>. September 10, 2020 &#8211; via GitHub.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=corna%2Fme_cleaner&amp;rft.date=2020-09-10&amp;rft_id=https%3A%2F%2Fgithub.com%2Fcorna%2Fme_cleaner&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-83">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/">"Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA"</a>. <i>BleepingComputer</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=BleepingComputer&amp;rft.atitle=Researchers+Find+a+Way+to+Disable+Much-Hated+Intel+ME+Component+Courtesy+of+the+NSA&amp;rft_id=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fhardware%2Fresearchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-auto3-84"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto3_84-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto3_84-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFResearch" class="citation web cs1">Research, Author Positive. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201201175708/http://blog.ptsecurity.com/2017/08/disabling-intel-me.html?m=1">"Disabling Intel ME 11 via undocumented mode"</a>. Archived from <a rel="nofollow" class="external text" href="http://blog.ptsecurity.com/2017/08/disabling-intel-me.html?m=1">the original</a> on December 1, 2020.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Disabling+Intel+ME+11+via+undocumented+mode&amp;rft.aulast=Research&amp;rft.aufirst=Author+Positive&amp;rft_id=http%3A%2F%2Fblog.ptsecurity.com%2F2017%2F08%2Fdisabling-intel-me.html%3Fm%3D1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span> <span class="cs1-visible-error citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: </span><span class="cs1-visible-error citation-comment"><code class="cs1-code">&#124;first=</code> has generic name (<a href="/wiki/Help:CS1_errors#generic_name" title="Help:CS1 errors">help</a>)</span></span> </li> <li id="cite_note-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-85">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/corna/me_cleaner">"corna/me_cleaner"</a>. <i>GitHub</i>. March 19, 2022.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=GitHub&amp;rft.atitle=corna%2Fme_cleaner&amp;rft.date=2022-03-19&amp;rft_id=https%3A%2F%2Fgithub.com%2Fcorna%2Fme_cleaner&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-86">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/corna/me_cleaner/commit/ced3b46ba2ccd74602b892f9594763ef34671652">"Set the HAP bit (ME &gt;= 11) or the AltMeDisable bit (ME &lt; 11) · corna/me_cleaner@ced3b46"</a>. <i>GitHub</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=GitHub&amp;rft.atitle=Set+the+HAP+bit+%28ME+%3E%3D+11%29+or+the+AltMeDisable+bit+%28ME+%3C+11%29+%C2%B7+corna%2Fme_cleaner%40ced3b46&amp;rft_id=https%3A%2F%2Fgithub.com%2Fcorna%2Fme_cleaner%2Fcommit%2Fced3b46ba2ccd74602b892f9594763ef34671652&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-87">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.fsf.org/news/libreboot-t400-laptop-now-fsf-certified-to-respect-your-freedom">"Libreboot T400 laptop now FSF-certified to respect your freedom — Free Software Foundation — Working together for free software"</a>. <i>www.fsf.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">April 30,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.fsf.org&amp;rft.atitle=Libreboot+T400+laptop+now+FSF-certified+to+respect+your+freedom+%E2%80%94+Free+Software+Foundation+%E2%80%94+Working+together+for+free+software&amp;rft_id=https%3A%2F%2Fwww.fsf.org%2Fnews%2Flibreboot-t400-laptop-now-fsf-certified-to-respect-your-freedom&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-88">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFBärwaldt" class="citation web cs1">Bärwaldt, Erik. <a rel="nofollow" class="external text" href="http://www.linux-magazine.com/Issues/2018/210/Free-Firmware-with-Libreboot">"Liberated&#160;» Linux Magazine"</a>. <i>Linux Magazine</i><span class="reference-accessdate">. Retrieved <span class="nowrap">April 30,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Linux+Magazine&amp;rft.atitle=Liberated+%C2%BB+Linux+Magazine&amp;rft.aulast=B%C3%A4rwaldt&amp;rft.aufirst=Erik&amp;rft_id=http%3A%2F%2Fwww.linux-magazine.com%2FIssues%2F2018%2F210%2FFree-Firmware-with-Libreboot&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-89">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFBiggs2017" class="citation web cs1">Biggs, John (August 11, 2017). <a rel="nofollow" class="external text" href="https://techcrunch.com/2017/08/11/the-minifree-libreboot-t400-is-free-as-in-freedom/">"The Minifree Libreboot T400 is free as in freedom"</a>. <i>TechCrunch</i><span class="reference-accessdate">. Retrieved <span class="nowrap">April 30,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TechCrunch&amp;rft.atitle=The+Minifree+Libreboot+T400+is+free+as+in+freedom&amp;rft.date=2017-08-11&amp;rft.aulast=Biggs&amp;rft.aufirst=John&amp;rft_id=https%3A%2F%2Ftechcrunch.com%2F2017%2F08%2F11%2Fthe-minifree-libreboot-t400-is-free-as-in-freedom%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-90"><span class="mw-cite-backlink"><b><a href="#cite_ref-90">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160616070449/https://puri.sm/posts/petition-for-intel-to-release-an-me-less-cpu-design/">"Petition for Intel to Release an ME-Less CPU Design"</a>. June 16, 2016. Archived from <a rel="nofollow" class="external text" href="https://puri.sm/posts/petition-for-intel-to-release-an-me-less-cpu-design/">the original</a> on June 16, 2016.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Petition+for+Intel+to+Release+an+ME-Less+CPU+Design&amp;rft.date=2016-06-16&amp;rft_id=https%3A%2F%2Fpuri.sm%2Fposts%2Fpetition-for-intel-to-release-an-me-less-cpu-design%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-91">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFAlaoui2017" class="citation web cs1">Alaoui, Youness (March 9, 2017). <a rel="nofollow" class="external text" href="https://puri.sm/posts/neutralizing-intel-management-engine-on-librem-laptops/">"Neutralizing the Intel Management Engine on Librem Laptops"</a>. <i>puri.sm</i><span class="reference-accessdate">. Retrieved <span class="nowrap">December 13,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=puri.sm&amp;rft.atitle=Neutralizing+the+Intel+Management+Engine+on+Librem+Laptops&amp;rft.date=2017-03-09&amp;rft.aulast=Alaoui&amp;rft.aufirst=Youness&amp;rft_id=https%3A%2F%2Fpuri.sm%2Fposts%2Fneutralizing-intel-management-engine-on-librem-laptops%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-92">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://puri.sm/posts/purism-librem-laptops-completely-disable-intel-management-engine/">"Purism Librem Laptops Completely Disable Intel's Management Engine"</a>. October 19, 2017.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Purism+Librem+Laptops+Completely+Disable+Intel%27s+Management+Engine&amp;rft.date=2017-10-19&amp;rft_id=https%3A%2F%2Fpuri.sm%2Fposts%2Fpurism-librem-laptops-completely-disable-intel-management-engine%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-93">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20200815170940/https://blog.system76.com/post/168050597573/system76-me-firmware-updates-plan">"System76 ME Firmware Updates Plan"</a>. <i>System76 Blog</i>. Archived from <a rel="nofollow" class="external text" href="https://blog.system76.com/post/168050597573/system76-me-firmware-updates-plan">the original</a> on August 15, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">September 10,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=System76+Blog&amp;rft.atitle=System76+ME+Firmware+Updates+Plan&amp;rft_id=https%3A%2F%2Fblog.system76.com%2Fpost%2F168050597573%2Fsystem76-me-firmware-updates-plan&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-extremedell-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-extremedell_94-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.extremetech.com/computing/260219-dell-sells-pcs-without-intel-management-engine-tradeoffs">"Dell Sells PCs without Intel's Management Engine, but with Tradeoffs"</a>. <i>ExtremeTech.com</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=ExtremeTech.com&amp;rft.atitle=Dell+Sells+PCs+without+Intel%27s+Management+Engine%2C+but+with+Tradeoffs&amp;rft_id=https%3A%2F%2Fwww.extremetech.com%2Fcomputing%2F260219-dell-sells-pcs-without-intel-management-engine-tradeoffs&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-95">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFonline2017" class="citation web cs1 cs1-prop-foreign-lang-source">online, heise (December 6, 2017). <a rel="nofollow" class="external text" href="https://www.heise.de/newsticker/meldung/Dell-schaltet-Intel-Management-Engine-in-Spezial-Notebooks-ab-3909860.html">"Dell schaltet Intel Management Engine in Spezial-Notebooks ab"</a> &#91;Dell switches off Intel Management Engine in special notebooks&#93;. <i>heise online</i> (in German).</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=heise+online&amp;rft.atitle=Dell+schaltet+Intel+Management+Engine+in+Spezial-Notebooks+ab&amp;rft.date=2017-12-06&amp;rft.aulast=online&amp;rft.aufirst=heise&amp;rft_id=https%3A%2F%2Fwww.heise.de%2Fnewsticker%2Fmeldung%2FDell-schaltet-Intel-Management-Engine-in-Spezial-Notebooks-ab-3909860.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-96">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.dell.com/support/manuals/us/en/04/latitude-14-5414-laptop/5414_om/stealth-mode?guid=guid-3655713b-6a1b-46a8-ba69-eaa3c324b3cd&amp;lang=en-us">"Dell Latitude 14 Rugged — 5414 Series Owner's Manual"</a>. <i>Dell.com</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Dell.com&amp;rft.atitle=Dell+Latitude+14+Rugged+%E2%80%94+5414+Series+Owner%27s+Manual&amp;rft_id=https%3A%2F%2Fwww.dell.com%2Fsupport%2Fmanuals%2Fus%2Fen%2F04%2Flatitude-14-5414-laptop%2F5414_om%2Fstealth-mode%3Fguid%3Dguid-3655713b-6a1b-46a8-ba69-eaa3c324b3cd%26lang%3Den-us&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-97">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.tuxedocomputers.com/de/Infos/News/TUXEDO-deaktiviert-Intels-Management-Engine">"TUXEDO deaktiviert Intels Management Engine - TUXEDO Computers"</a>. <i>www.tuxedocomputers.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">February 7,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.tuxedocomputers.com&amp;rft.atitle=TUXEDO+deaktiviert+Intels+Management+Engine+-+TUXEDO+Computers&amp;rft_id=https%3A%2F%2Fwww.tuxedocomputers.com%2Fde%2FInfos%2FNews%2FTUXEDO-deaktiviert-Intels-Management-Engine&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> <li id="cite_note-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-98">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=AMD-PSP-Disable-Option">"AMD Reportedly Allows Disabling PSP Secure Processor With Latest AGESA - Phoronix"</a>. <i>Phoronix.com</i>. December 7, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">April 16,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Phoronix.com&amp;rft.atitle=AMD+Reportedly+Allows+Disabling+PSP+Secure+Processor+With+Latest+AGESA+-+Phoronix&amp;rft.date=2017-12-07&amp;rft_id=https%3A%2F%2Fwww.phoronix.com%2Fscan.php%3Fpage%3Dnews_item%26px%3DAMD-PSP-Disable-Option&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AIntel+Management+Engine" class="Z3988"></span></span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Intel_Management_Engine&amp;action=edit&amp;section=27" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a rel="nofollow" class="external text" href="https://downloadcenter.intel.com/download/27150">Intel® Converged Security and Management Engine Version Detection Tool (Intel® CSMEVDT) (Intel-SA-00086 security vulnerability detection tool)</a> from Intel Download Center</li> <li><a rel="nofollow" class="external text" href="https://i.blackhat.com/USA-19/Wednesday/us-19-Hasarfaty-Behind-The-Scenes-Of-Intel-Security-And-Manageability-Engine.pdf">Behind the Scenes of Intel Security and Manageability Engine</a>&#160;&#8211;&#32; A presentation by Intel security researchers presented in Black Hat USA 2019</li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Firmware_and_booting244" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374" /><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Firmware_and_booting" title="Template:Firmware and booting"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Firmware_and_booting" title="Template talk:Firmware and booting"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Firmware_and_booting" title="Special:EditPage/Template:Firmware and booting"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Firmware_and_booting244" style="font-size:114%;margin:0 4em"><a href="/wiki/Firmware" title="Firmware">Firmware</a> and <a href="/wiki/Booting" title="Booting">booting</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Processes</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Booting_process_of_Windows" title="Booting process of Windows">Windows</a></span> <ul><li><span class="nowrap"><a href="/wiki/Architecture_of_Windows_9x#Boot_sequence" title="Architecture of Windows 9x">9x</a></span></li> <li><span class="nowrap"><a href="/wiki/Booting_process_of_Windows_NT" class="mw-redirect" title="Booting process of Windows NT">NT</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/Booting_process_of_Linux" title="Booting process of Linux">Linux</a></span> <ul><li><span class="nowrap"><a href="/wiki/Booting_process_of_Android_devices" title="Booting process of Android devices">Android</a></span></li></ul></li></ul> </div></td><td class="noviewer navbox-image" rowspan="10" style="width:1px;padding:0 0 0 2px"><div><span typeof="mw:File"><a href="/wiki/File:WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/100px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg" decoding="async" width="100" height="100" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/150px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/200px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg 2x" data-file-width="1535" data-file-height="1535" /></a></span></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Booting <a href="/wiki/Firmware#Computers" title="Firmware">firmware</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%">Types</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Proprietary_firmware" title="Proprietary firmware">Proprietary firmware</a></span></li> <li><span class="nowrap"><a href="/wiki/Open-source_firmware" title="Open-source firmware">Open-source firmware</a></span></li> <li><span class="nowrap"><a href="/wiki/Custom_firmware" title="Custom firmware">Custom firmware</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Interfaces</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/UEFI" title="UEFI">UEFI</a></span></li> <li><span class="nowrap"><a href="/wiki/BIOS" title="BIOS">BIOS</a></span> <ul><li><span class="nowrap"><a href="/wiki/Video_BIOS" title="Video BIOS">Video BIOS</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/Open_Firmware" title="Open Firmware">Open Firmware</a></span></li> <li><span class="nowrap"><a href="/wiki/ACPI" title="ACPI">ACPI</a></span></li> <li><span class="nowrap"><a href="/wiki/MultiProcessor_Specification" title="MultiProcessor Specification">MultiProcessor Specification</a></span></li> <li><span class="nowrap"><a href="/wiki/Advanced_Power_Management" title="Advanced Power Management">APM</a></span></li> <li><span class="nowrap"><a href="/wiki/Legacy_Plug_and_Play" title="Legacy Plug and Play">Legacy Plug and Play</a></span></li> <li><span class="nowrap"><a href="/wiki/ARC_(specification)" title="ARC (specification)">AlphaBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/SRM_firmware" title="SRM firmware">SRM</a></span></li> <li><span class="nowrap"><a href="/wiki/Simple_Firmware_Interface" title="Simple Firmware Interface">SFI</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Implementations</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/SeaBIOS" title="SeaBIOS">SeaBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/Award_Software" title="Award Software">Award BIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/American_Megatrends" title="American Megatrends">American Megatrends</a></span> <ul><li><span class="nowrap"><a href="/wiki/AMIBIOS" class="mw-redirect" title="AMIBIOS">AMIBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/AMI_Aptio" class="mw-redirect" title="AMI Aptio">AMI Aptio</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/Insyde_Software" title="Insyde Software">InsydeH2O</a></span></li> <li><span class="nowrap"><a href="/wiki/Phoenix_Technologies" title="Phoenix Technologies">Phoenix SecureCore UEFI</a></span></li> <li><span class="nowrap"><a href="/wiki/TianoCore_EDK_II" title="TianoCore EDK II">TianoCore EDK II</a></span></li> <li><span class="nowrap"><a href="/wiki/OpenBIOS" title="OpenBIOS">OpenBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/Coreboot" title="Coreboot">Coreboot</a></span></li> <li><span class="nowrap"><a href="/wiki/Libreboot" title="Libreboot">Libreboot</a></span></li> <li><span class="nowrap"><a href="/wiki/LinuxBoot" title="LinuxBoot">LinuxBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Kickstart_(Amiga)" title="Kickstart (Amiga)">Kickstart</a></span></li> <li><span class="nowrap"><a href="/wiki/Run-Time_Abstraction_Services" title="Run-Time Abstraction Services">Run-Time Abstraction Services</a></span></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Hybrid firmware bootloader</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Common_Firmware_Environment" title="Common Firmware Environment">Common Firmware Environment</a> </span></li> <li><span class="nowrap"><a href="/wiki/Das_U-Boot" title="Das U-Boot">Das U-Boot</a></span></li> <li><span class="nowrap"><a href="/wiki/ARCS_(computing)" title="ARCS (computing)">ARCS</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Bootloaders" class="mw-redirect" title="Bootloaders">Bootloaders</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Bootloader_unlocking" title="Bootloader unlocking">Bootloader unlocking</a></span></li> <li><span class="nowrap"><a href="/wiki/Comparison_of_bootloaders" title="Comparison of bootloaders">Comparison of bootloaders</a></span></li></ul> </div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th id="Implementations15" scope="row" class="navbox-group" style="width:1%">Implementations</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Acronis_OS_Selector" class="mw-redirect" title="Acronis OS Selector">Acronis OS Selector</a></span></li> <li><span class="nowrap"><a href="/wiki/Barebox" title="Barebox">Barebox</a></span></li> <li><span class="nowrap"><a href="/wiki/BootManager" class="mw-redirect" title="BootManager">BootManager</a></span></li> <li><span class="nowrap"><a href="/wiki/BootX_(Apple)" title="BootX (Apple)">BootX (Apple)</a></span></li> <li><span class="nowrap"><a href="/wiki/BootX_(Linux)" title="BootX (Linux)">BootX (Linux)</a></span></li> <li><span class="nowrap"><a href="/wiki/GNU_GRUB" title="GNU GRUB">GNU GRUB</a></span></li> <li><span class="nowrap"><a href="/wiki/IBoot" title="IBoot">iBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Systemd-boot" title="Systemd-boot">systemd-boot</a></span></li> <li><span class="nowrap"><a href="/wiki/Limine_(bootloader)" title="Limine (bootloader)">Limine</a></span></li> <li><span class="nowrap"><a href="/wiki/Loadlin" title="Loadlin">loadlin</a></span></li> <li><span class="nowrap"><a href="/wiki/MILO_(bootloader)" title="MILO (bootloader)">MILO</a></span></li> <li><span class="nowrap"><a href="/wiki/NTLDR" title="NTLDR">NTLDR</a></span></li> <li><span class="nowrap"><a href="/wiki/OpeniBoot" title="OpeniBoot">OpeniBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Plop_Boot_Manager" title="Plop Boot Manager">Plop Boot Manager</a></span></li> <li><span class="nowrap"><a href="/wiki/RedBoot" title="RedBoot">RedBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/REFInd" title="REFInd">rEFInd</a></span></li> <li><span class="nowrap"><a href="/wiki/REFIt" title="REFIt">rEFIt</a></span></li> <li><span class="nowrap"><a href="/wiki/SYSLINUX" title="SYSLINUX">SYSLINUX</a></span></li> <li><span class="nowrap"><a href="/wiki/Windows_Boot_Manager" title="Windows Boot Manager">Windows Boot Manager</a></span></li> <li><span class="nowrap"><a href="/wiki/XOSL" title="XOSL">xOSL</a></span></li> <li><span class="nowrap"><a href="/wiki/Yaboot" title="Yaboot">Yaboot</a></span></li></ul> </div></td></tr></tbody></table><div> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Partition layouts</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/GUID_Partition_Table" title="GUID Partition Table">GUID Partition Table</a></span></li> <li><span class="nowrap"><a href="/wiki/Master_boot_record" title="Master boot record">Master boot record</a></span></li> <li><span class="nowrap"><a href="/wiki/Apple_Partition_Map" title="Apple Partition Map">Apple Partition Map</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/System_partition_and_boot_partition" title="System partition and boot partition">Partitions</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/EFI_system_partition" title="EFI system partition">EFI system partition</a></span></li> <li><span class="nowrap"><a href="/wiki/BIOS_boot_partition" title="BIOS boot partition">BIOS boot partition</a></span></li> <li><span class="nowrap"><a href="/wiki//boot/" class="mw-redirect" title="/boot/">/boot/</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Utilities</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%">Software</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Flashrom_(utility)" title="Flashrom (utility)">flashrom</a></span></li> <li><span class="nowrap"><a href="/wiki/Fwupd" title="Fwupd">fwupd</a></span></li> <li><span class="nowrap"><a href="/wiki/UEFITool" title="UEFITool">UEFITool</a></span></li> <li><span class="nowrap"><a href="/wiki/Odin_(firmware_flashing_software)" title="Odin (firmware flashing software)">Odin</a></span> <ul><li><span class="nowrap"><a href="/wiki/Odin_(firmware_flashing_software)#Heimdall" title="Odin (firmware flashing software)">Heimdall</a></span></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Hardware</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Bus_Pirate" title="Bus Pirate">Bus Pirate</a></span></li> <li><span class="nowrap"><a href="/wiki/Raspberry_Pi" title="Raspberry Pi">Raspberry Pi</a></span></li> <li><span class="nowrap"><a href="/wiki/FTDI" title="FTDI">ft2232</a></span></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Network_booting" title="Network booting">Network boot</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Preboot_Execution_Environment" title="Preboot Execution Environment">Preboot Execution Environment</a></span> <ul><li><span class="nowrap"><a href="/wiki/GPXE" title="GPXE">gPXE</a></span></li> <li><span class="nowrap"><a href="/wiki/IPXE" title="IPXE">iPXE</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/NetBoot" title="NetBoot">NetBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Remote_Initial_Program_Load" title="Remote Initial Program Load">Remote Initial Program Load</a></span></li> <li><span class="nowrap"><a href="/wiki/Wake-on-LAN" title="Wake-on-LAN">Wake-on-LAN</a></span></li> <li><span class="nowrap"><a href="/wiki/Wake-on-ring" title="Wake-on-ring">Wake-on-ring</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">ROM variants</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Read-only_memory" title="Read-only memory">ROM</a></span></li> <li><span class="nowrap"><a href="/wiki/Programmable_ROM" title="Programmable ROM">PROM</a></span></li> <li><span class="nowrap"><a href="/wiki/EPROM" title="EPROM">EPROM</a></span></li> <li><span class="nowrap"><a href="/wiki/EEPROM" title="EEPROM">EEPROM</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Boot_ROM" title="Boot ROM">Boot ROM</a></span></li> <li><span class="nowrap"><a href="/wiki/ROM_hacking" title="ROM hacking">ROM hacking</a></span></li> <li><span class="nowrap"><a href="/wiki/ROM_image" title="ROM image">ROM image</a></span></li> <li><span class="nowrap"><a href="/wiki/Execute_in_place" title="Execute in place">Execute in place</a></span></li> <li><span class="nowrap"><a href="/wiki/Devicetree" title="Devicetree">Devicetree</a></span></li> <li><span class="nowrap"><a href="/wiki/Fastboot" title="Fastboot">Fastboot</a></span></li> <li><span class="nowrap"><a href="/wiki/Instant-on" title="Instant-on">Instant-on</a></span></li> <li><span class="nowrap"><a href="/wiki/Power-on_self-test" title="Power-on self-test">Power-on self-test</a></span></li> <li><span class="nowrap"><a href="/wiki/Qualcomm_EDL_mode" title="Qualcomm EDL mode">EDL mode</a></span></li></ul> </div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐api‐int.codfw.main‐d7d595bbd‐tb8pw Cached time: 20250312010450 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.842 seconds Real time usage: 0.940 seconds Preprocessor visited node count: 5549/1000000 Post‐expand include size: 206938/2097152 bytes Template argument size: 3244/2097152 bytes Highest expansion depth: 15/100 Expensive parser function count: 7/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 346133/5000000 bytes Lua time usage: 0.524/10.000 seconds Lua memory usage: 7381749/52428800 bytes Number of Wikibase entities loaded: 0/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 826.847 1 -total 55.11% 455.654 1 Template:Reflist 46.57% 385.103 93 Template:Cite_web 10.35% 85.580 4 Template:Navbox 10.02% 82.882 1 Template:Firmware_and_booting 9.11% 75.330 1 Template:Short_description 5.23% 43.214 2 Template:Pagetype 5.10% 42.134 2 Template:Citation_needed 4.50% 37.196 2 Template:Fix 4.23% 34.962 1 Template:CVE --> <!-- Saved in parser cache with key enwiki:pcache:42053808:|#|:idhash:canonical and timestamp 20250312010450 and revision id 1277153617. Rendering was triggered because: api-parse --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?useformat=desktop&amp;type=1x1&amp;usesul3=0" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&amp;oldid=1277153617">https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&amp;oldid=1277153617</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Computer_security" title="Category:Computer security">Computer security</a></li><li><a href="/wiki/Category:Remote_administration_software" title="Category:Remote administration software">Remote administration software</a></li><li><a href="/wiki/Category:Firmware" title="Category:Firmware">Firmware</a></li><li><a href="/wiki/Category:Intel" title="Category:Intel">Intel</a></li><li><a href="/wiki/Category:BIOS" title="Category:BIOS">BIOS</a></li><li><a href="/wiki/Category:Minix" title="Category:Minix">Minix</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1:_unfit_URL" title="Category:CS1: unfit URL">CS1: unfit URL</a></li><li><a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">CS1 maint: archived copy as title</a></li><li><a href="/wiki/Category:CS1_maint:_numeric_names:_authors_list" title="Category:CS1 maint: numeric names: authors list">CS1 maint: numeric names: authors list</a></li><li><a href="/wiki/Category:CS1_errors:_generic_name" title="Category:CS1 errors: generic name">CS1 errors: generic name</a></li><li><a href="/wiki/Category:CS1_German-language_sources_(de)" title="Category:CS1 German-language sources (de)">CS1 German-language sources (de)</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_American_English_from_October_2020" title="Category:Use American English from October 2020">Use American English from October 2020</a></li><li><a href="/wiki/Category:All_Wikipedia_articles_written_in_American_English" title="Category:All Wikipedia articles written in American English">All Wikipedia articles written in American English</a></li><li><a href="/wiki/Category:Use_mdy_dates_from_October_2020" title="Category:Use mdy dates from October 2020">Use mdy dates from October 2020</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_September_2021" title="Category:Articles with unsourced statements from September 2021">Articles with unsourced statements from September 2021</a></li><li><a href="/wiki/Category:Articles_lacking_reliable_references_from_May_2023" title="Category:Articles lacking reliable references from May 2023">Articles lacking reliable references from May 2023</a></li><li><a href="/wiki/Category:All_articles_lacking_reliable_references" title="Category:All articles lacking reliable references">All articles lacking reliable references</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_September_2020" title="Category:Articles with unsourced statements from September 2020">Articles with unsourced statements from September 2020</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_2017" title="Category:Articles containing potentially dated statements from 2017">Articles containing potentially dated statements from 2017</a></li><li><a href="/wiki/Category:All_articles_containing_potentially_dated_statements" title="Category:All articles containing potentially dated statements">All articles containing potentially dated statements</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 23 February 2025, at 00:17<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Intel_Management_Engine&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><picture><source media="(min-width: 500px)" srcset="/static/images/footer/wikimedia-button.svg" width="84" height="29"><img src="/static/images/footer/wikimedia.svg" width="25" height="25" alt="Wikimedia Foundation" lang="en" loading="lazy"></picture></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><picture><source media="(min-width: 500px)" srcset="/w/resources/assets/poweredby_mediawiki.svg" width="88" height="31"><img src="/w/resources/assets/mediawiki_compact.svg" alt="Powered by MediaWiki" lang="en" width="25" height="25" loading="lazy"></picture></a></li> </ul> </footer> </div> </div> </div> <div class="vector-header-container vector-sticky-header-container"> <div id="vector-sticky-header" class="vector-sticky-header"> <div class="vector-sticky-header-start"> <div class="vector-sticky-header-icon-start vector-button-flush-left vector-button-flush-right" aria-hidden="true"> <button class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-sticky-header-search-toggle" tabindex="-1" data-event-name="ui.vector-sticky-search-form.icon"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </button> </div> <div role="search" class="vector-search-box-vue vector-search-box-show-thumbnail vector-search-box"> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail"> <form action="/w/index.php" id="vector-sticky-search-form" class="cdx-search-input cdx-search-input--has-end-button"> <div class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia"> <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <div class="vector-sticky-header-context-bar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-sticky-header-toc" class="vector-dropdown mw-portlet mw-portlet-sticky-header-toc vector-sticky-header-toc vector-button-flush-left" > <input type="checkbox" id="vector-sticky-header-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-sticky-header-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-sticky-header-toc-label" for="vector-sticky-header-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-sticky-header-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div class="vector-sticky-header-context-bar-primary" aria-hidden="true" ><span class="mw-page-title-main">Intel Management Engine</span></div> </div> </div> <div class="vector-sticky-header-end" aria-hidden="true"> <div class="vector-sticky-header-icons"> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-talk-sticky-header" tabindex="-1" data-event-name="talk-sticky-header"><span class="vector-icon mw-ui-icon-speechBubbles mw-ui-icon-wikimedia-speechBubbles"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-subject-sticky-header" tabindex="-1" data-event-name="subject-sticky-header"><span class="vector-icon mw-ui-icon-article mw-ui-icon-wikimedia-article"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-history-sticky-header" tabindex="-1" data-event-name="history-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-history mw-ui-icon-wikimedia-wikimedia-history"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only mw-watchlink" id="ca-watchstar-sticky-header" tabindex="-1" data-event-name="watch-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-star mw-ui-icon-wikimedia-wikimedia-star"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-edit-sticky-header" tabindex="-1" data-event-name="wikitext-edit-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-wikiText mw-ui-icon-wikimedia-wikimedia-wikiText"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-ve-edit-sticky-header" tabindex="-1" data-event-name="ve-edit-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-edit mw-ui-icon-wikimedia-wikimedia-edit"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-viewsource-sticky-header" tabindex="-1" data-event-name="ve-edit-protected-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-editLock mw-ui-icon-wikimedia-wikimedia-editLock"></span> <span></span> </a> </div> <div class="vector-sticky-header-buttons"> <button class="cdx-button cdx-button--weight-quiet mw-interlanguage-selector" id="p-lang-btn-sticky-header" tabindex="-1" data-event-name="ui.dropdown-p-lang-btn-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-language mw-ui-icon-wikimedia-wikimedia-language"></span> <span>6 languages</span> </button> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive" id="ca-addsection-sticky-header" tabindex="-1" data-event-name="addsection-sticky-header"><span class="vector-icon mw-ui-icon-speechBubbleAdd-progressive mw-ui-icon-wikimedia-speechBubbleAdd-progressive"></span> <span>Add topic</span> </a> </div> <div class="vector-sticky-header-icon-end"> <div class="vector-user-links"> </div> </div> </div> </div> </div> <div class="mw-portlet mw-portlet-dock-bottom emptyPortlet" id="p-dock-bottom"> <ul> </ul> </div> <script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.next-577f6fdb4b-ws5ld","wgBackendResponseTime":186,"wgPageParseReport":{"limitreport":{"cputime":"0.842","walltime":"0.940","ppvisitednodes":{"value":5549,"limit":1000000},"postexpandincludesize":{"value":206938,"limit":2097152},"templateargumentsize":{"value":3244,"limit":2097152},"expansiondepth":{"value":15,"limit":100},"expensivefunctioncount":{"value":7,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":346133,"limit":5000000},"entityaccesscount":{"value":0,"limit":400},"timingprofile":["100.00% 826.847 1 -total"," 55.11% 455.654 1 Template:Reflist"," 46.57% 385.103 93 Template:Cite_web"," 10.35% 85.580 4 Template:Navbox"," 10.02% 82.882 1 Template:Firmware_and_booting"," 9.11% 75.330 1 Template:Short_description"," 5.23% 43.214 2 Template:Pagetype"," 5.10% 42.134 2 Template:Citation_needed"," 4.50% 37.196 2 Template:Fix"," 4.23% 34.962 1 Template:CVE"]},"scribunto":{"limitreport-timeusage":{"value":"0.524","limit":"10.000"},"limitreport-memusage":{"value":7381749,"limit":52428800}},"cachereport":{"origin":"mw-api-int.codfw.main-d7d595bbd-tb8pw","timestamp":"20250312010450","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Intel Management Engine","url":"https:\/\/en.wikipedia.org\/wiki\/Intel_Management_Engine","sameAs":"http:\/\/www.wikidata.org\/entity\/Q42915608","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q42915608","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2014-02-26T13:00:27Z","dateModified":"2025-02-23T00:17:54Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/2\/2f\/Priv_rings.svg","headline":"firmware and software that runs on all modern Intel CPUs at a higher level than user-facing operating system"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10