Knowledge Base

Dell EMC Response to Intel AMT Advisory (INTEL-SA-00075) and CVE-2017-5689 (Common Vulnerabilities and Exposures)


The Intel security team recently published an industry-wide advisory highlighting a vulnerability that can affect systems which support system manageability via Intel Active Management Technology (iAMT), Intel Small Business Technology, or Intel Standard Manageability. These technologies are industry wide and are used by some customers to remotely manage the configuration of client and some enterprise systems.

Dell Engineering has determined that the vast majority of Enterprise products do not support AMT with the exception of the T20 & T30 platforms. All other Dell PowerEdge platforms and remote management controllers are unaffected. Planned BIOS releases are forthcoming and will patch the reported vulnerability.

Details about the vulnerability, immediate mitigation, and detection recommendations are available via Intel’s advisory website.


Dell recommends that customers follow best practices for securing internal networks and protecting systems from unauthorized physical access.

Dell recommends customers follow the Intel published Detection Guide and Mitigation Guide for these systems immediately. Intel has released a Discovery Tool that can be used by local users or IT administrators to determine whether a system is vulnerable to INTEL-SA-00075.

Customers should update to the latest BIOS by downloading the patched releases from as they become available.

BIOS Release Details

Dell is in the process of releasing BIOS updates for the affected platforms. This list is provided for customer planning purposes and will be updated with release information when available:

BIOS Release Details
Dell Enterprise System BIOS Version BIOS Release Date
PowerEdge T20 A12 15 May 2017
PowerEdge T30 1.0.5 11 May 2017


Intel Security Advisory (INTEL-SA-00075):
Intel Mitigation Guide:
Intel Detection Guide and Discovery Tool:

Article ID: SLN306252

Last Date Modified: 05/30/2017 08:50 AM

Rate this article

Easy to understand
Was this article helpful?
Yes No
Send us feedback
Comments cannot contain these special characters: <>()\
Sorry, our feedback system is currently down. Please try again later.

Thank you for your feedback.