<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>3rd party component upgrade required for security reasons: [Firmware] Intel-SA-00086 Security Review Cumulative Update</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-17-271</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2018-01-04T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2018-01-04T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2018-01-04T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            Intel recently released a security update (Intel-SA-00086), regarding Intel ME 11.x, SPS 4.0, and TXE 3.0 intel products.The following Firmware are impacted:Intel Management Engine (ME) Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20Intel Server Platform Services (SPS) Firmware version 4.0Intel Trusted Execution Engine (TXE) version 3.0And the following Intel products are affected:6th, 7th &amp; 8th Generation Intel Core Processor FamilyIntel Xeon Processor E3-1200 v5 &amp; v6 Product FamilyIntel Xeon Processor Scalable FamilyIntel Xeon Processor W FamilyIntel Atom C3000 Processor FamilyApollo Lake Intel Atom Processor E3900 seriesApollo Lake Intel PentiumCeleron N and J series ProcessorsAn attacker could gain unauthorized access to the platform, the Intel ME feature, and 3rd party secrets protected by the Intel Management Engine (ME), the Intel Server Platform Service (SPS), or the Intel Trusted Execution Engine (TXE).This includes scenarios where a successful attacker could Impersonate the ME/SPS/TXE, thereby impacting local security feature attestation validity. Concrete impact may be &#34;load and execute arbitrary code outside the visibility of the user and operating system&#34;, or &#34;system crash or system instability&#34;.The assigned CVEs are:CVEs:Intel Manageability Engine Firmware 11.0.x.x/11.5.x.x/11.6.x.x/11.7.x.x/11.10.x.x/11.20.x.xCVE-2017-5705CVE-2017-5708CVE-2017-5711CVE-2017-5712Intel Manageability Engine Firmware 8.x/9.x/10.xCVE-2017-5711CVE-2017-5712Server Platform Service 4.0.x.xCVE-2017-5706CVE-2017-5709IntelTrusted Execution Engine 3.0.x.xCVE-2017-5707CVE-2017-5710
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Escalation of privilege
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiGate model FGT-500E, FGT-501E, affected, but not exploitable under regular functioning conditions (see Solutions below).FortiWeb model FWB-1000E has a processor running a firmware affected by the issue, but the vulnerable functions were never enabled.The following products are NOT impacted:FortiAP FortiSwitchFortiAnalyzerFortiMailFortiManager
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Note that all related CVEs are &#34;Privilege Escalation&#34; type vulnerabilities. Arbitrary code execution is therefore only possible on the aforementioned products if the attack is combined with a local or remote code execution vulnerability (unrelated to intel issues) in the affected products. The Intel CVEs only aggravate the situation, if such vulnerabilities exist. Based on the above, the impact to Fortinet products is low to &#34;nonexistent&#34;.* For FortiWeb 1000E, the affected firmware has undergone a precaution patching, in system BIOS PN P21583-02: New units will run a non-affected firmware. There is no firmware upgrade needed for existing units, however (see above: vulnerable functions not enabled).For FortiGate 500E and 501E, the affected firmware has been patched under FortiBIOS version 05000003: new units will run a non-affected firmware.For existing units, the exploitation risk is low, as an attack may only be possible if combined with an additional local or remote code execution vulnerability, unrelated to this issue - if such vulnerabilities exist and are successfully exploited.To lower your attack risk and reduce the possibility of an &#34;already existing local or remote code execution vulnerability&#34; (as referred to above), upgrading to our latest publicly available software version is highly recommended.Please contact your local TAC for more information or request for BIOS update.Update History:01-04-2018 Initial version01-18-2018 Assessment and Solution updated
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-17-271</cvrf:URL>
            <cvrf:Description>3rd party component upgrade required for security reasons: [Firmware] Intel-SA-00086 Security Review Cumulative Update</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&amp;amp;languageid=en-fr</cvrf:URL>
            <cvrf:Description>https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&amp;amp;languageid=en-fr</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <Vulnerability Ordinal="1">
        <Title>3rd party component upgrade required for security reasons: [Firmware] Intel-SA-00086 Security Review Cumulative Update</Title>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>0</BaseScoreV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-17-271</URL>
                <Description>3rd party component upgrade required for security reasons: [Firmware] Intel-SA-00086 Security Review Cumulative Update</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&amp;amp;languageid=en-fr</URL>
                <Description>https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&amp;amp;languageid=en-fr</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>