An attack can exploit this vulnerability on NI controllers with affected AMT firmware in two ways:
Intel has observed the vulnerability in AMT firmware versions 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, and 11.5.
Controller | Minimum Version of Fixed Firmware | Recommendation |
cRIO-9081 | 6.2.61.3535 | Apply Patch |
cRIO-9082 | 6.2.61.3535 | Apply Patch |
cDAQ-9138 | 6.2.61.3535 | Apply Patch |
cDAQ-9139 | 6.2.61.3535 | Apply Patch |
PXI-8109 | 6.2.61.3535 | Apply Patch |
PXIe-8115 | 7.1.91.3272 | Apply Patch |
PXI-8115 | 7.1.91.3272 | Apply Patch |
PXI-8119 | 8.1.71.3608 | Apply Patch |
PXIe-8133 | 6.2.61.3535 | Apply Patch |
PXIe-8135 | 8.1.71.3608 | Apply Patch |
PXIe-8821 | 9.1.41.3024 | Apply Patch |
PXIe-8830mc | 9.1.41.3024 | Contact NI |
PXIe-8840 Quad Core | 9.1.41.3024 | Apply Patch |
PXIe-8840 | 9.1.41.3024 | Apply Patch |
IC-3172 | 10.0.55.3000 | Apply Patch |
IC-3173 | 10.0.55.3000 | Apply Patch |
Apply the recommended patches above to mitigate the vulnerability for the corresponding controller. If you chose not to apply the mitigation patch, you can reduce the security risk on controllers with vulnerable firmware by applying the two mitigations described below. Refer to the INTEL-SA-00075 Mitigation Guide for the commands to perform the following steps.