Stone Branded Products

Intel SA-00075 Security Bulletin - Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) and Intel Small Business Technology

On May 1st 2017, Intel published a security advisory regarding a firmware vulnerability in certain systems that utilize Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM) or Intel® Small Business Technology (SBT). The vulnerability could enable a network attacker to remotely gain access to business PCs or devices that use these technologies.

Summary

There is an escalation of privilege vulnerability in Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small Business Technology versions firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 that can allow an unprivileged attacker to gain control of the manageability features provided by these products.  This vulnerability does not exist on Intel-based consumer PCs with consumer firmware, Intel servers utilizing Intel® Server Platform Services (Intel® SPS), or Intel® Xeon® Processor E3 and Intel® Xeon® Processor E5 workstations utilizing Intel® SPS firmware.

Description

There are two ways this vulnerability may be accessed, please note that Intel® Small Business Technology is only vulnerable to the second method:

Threat level

Severe.

Recommendations

Our customer's security is paramount, to that end Stone are working with key vendors to provide firmware updates which close this vulnerability as quickly as possible. Those updates will be able available to download from this article as soon as they are made available to us

Intel has released a discovery tool which will analyse your systems for the vulnerability.

Actions:

1. Determine if you have an Intel® AMT, Intel® SBA, or Intel® ISM capable systems. If you determine that you do not have an Intel® AMT, Intel® SBA, or Intel® ISM capable system then no further action is required.

2. Utilize the INTEL-SA-00075 Detection Guide to assess if your system has the impacted firmware.

3. Stone highly recommends updating affected systems Management Engine (ME) firmware as soon as they become available. Please review the affected products section of this article for ME firmware update availability.

4. If a firmware update is not yet available, mitigations are provided by the INTEL-SA-00075 Mitigation Guide. It is recommended that unpatched systems should have the steps detailed in the mitgation guide applied to them until such time as an ME firmware update becomes available.

Affected Products

The issue has been observed in Intel manageability firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 for Intel® Active Management Technology, Intel® Small Business Technology, and Intel® Standard Manageability. Versions before 6 or after 11.6 are not impacted.

Where possible, updated BIOSes or patches for Management Engine Firmware are shown below. This article will be updated as more BIOSes or patches become available.

Note 1: Management Engine patches require a compatible, similar management engine version is already installed. For example, a system with a 2xxx Management Engine version will require the BIOS to be updated to include the 3xxx Management Engine version before then applying the patch. The Asus patch update utility may offer to attempt to do this for you by requesting the latest motherboard BIOS .CAP file. Please note that the Asus patches require that Intel Management Engine Components Driver is installed.

Note 2: Always check and test the update process, both in terms of resolving the issue, and also compatibility with your software images etc., before rolling this process out to your users on a wider scale.

Note 3: Windows patches, for example, for the Asus motherboards, that use the Intel Firmware Update Utility, may not run on Windows Server. In this instance, use the DOS patch.

StonePC Lite/Tower / All In One

 Product code / General BIOS Update Link

Motherboard model

Updated ME Download

BOAMOT-458 Asus P8B75-M

(Asus Ivybridge)

Windows Patch: 8.1.x.3608

BOAMOT-461 Asus P8Q77-M

BOAMOT-463

Asus B85M-E

(Asus Haswell)

Windows Patch: 9.1.41.3024 (updated 29/6/17 with improved update utility)

DOS Patch: 9.1.41.3024

BOAMOT-467

Asus CS-B

BOAMOT-470

Asus Q87T

BOAMOT-473 / BOAMOT-462

Asus Q87M-E

BOAMOT-480

Asus B150M-A

(Asus Skylake / Kaby Lake)

Windows Patch: 11.6.27.3264

DOS Patch: 11.6.27.3264

BOAMOT-482

Asus Q170M-C

BOAMOT-484

Asus Q170T

BOAMOT-485

Asus B150M-A/M.2

BOAMOT-488

Asus B250M-A

BOAMOT-489

Asus Q270M-C

ISRMOT-174 Gigabyte MW50-SV0

(Gigabyte C612 Xeon Workstation)

BIOS R06 with patched Workstation / HEDT ME Firmware.

Legacy Desktop Products

Stock code

Motherboard model

Patched ME firmware

BOAMOT-370

DQ57TM

Windows Patch: 6.2.61.3635

BOAMOT-406

DQ67SW

Windows Patch: 7.1.91.3272

BOAMOT-412

DQ67OW

BOAMOT-420

DQ67EP

BOAMOT-436

DQ77MK

Windows Patch: 8.1.71.3708

BOAMOT-437

DB75EN

BOAMOT-450

DQ77CP

BOAMOT-451

DQ77KB

Further information regarding Intel’s release schedule for their own branded desktop products can be found here.

StonePC Micro

Stock code

Kit model

Motherboard model

Patched ME firmware

INTNUC-10007

DC53427HYE

D53427RKE

Windows BIOS: 8.1.71.3608

INTNUC-10009

NUC5i5MYHE

NUC5i5MYBE

Windows BIOS: 10.0.55.3000

Stone Notebooks

Chassis Part Code

Notebook Model

Patched ME firmware

NOTCHA-256

NOTCHA-257

NT310

Not currently available, please follow mitigating actions.

NOTCHA-261

NOTCHA-262

NT310

Applies to:

Asus B150M-A/M.2


Intel SA-00086 - Intel Management Engine Critical Firmware Update

Intel Management Engine (Intel ME 11.0.0-11.7.0), Intel Trusted Execution Engine (Intel TXE 3.0), and Intel Server Platform Services (Intel SPS 4.0) vulnerability (Intel-SA-00086)

Summary
On November 20th 2017, Intel published a security advisory regarding a firmware vulnerability in certain systems that utilize ME Firmware versions 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20, SPS Firmware version 4.0, and TXE version 3.0.

Please download and view the document attached to this article for further information and firmware / BIOS patch availability.

Note: The attached document will be updated as new information becomes available.

Applies to:


Bitlocker automatic device encryption on Stone brand desktop, notebook and workstation


What is BitLocker automatic device encryption

BitLocker is a security technology incorporated into Microsoft Windows operating systems starting from Windows 8, which is intended to protect users by encrypting data stored on a device, or external storage media (such as USB hard disk drives).

During the ongoing development of Windows 10, Microsoft made a change which sought to automatically provide this data security to its customers by activating BitLocker for devices which were designed to meet modern hardware standards.

With the continued evolution of hardware standards, alongside the release of Windows 11 24H2 Microsoft have now introduced a reduced set of hardware requirements which devices need to meet to become eligible for BitLocker automatic encryption.
 

Which devices are eligible?

Going forward from Windows 11 24H2 the requirements will be:

This essentially means all Stone brand devices which already meet the hardware requirements for Windows 11 (external link), are now in-scope for BitLocker automatic encryption.
 

When does BitLocker automatic encryption occur?

Following a clean installation of Windows 11 24H2 (Home, Professional, Enterprise and Education) and the completion of OOBE (Out Of Box Experience) where users go through the initial Windows setup, BitLocker will initialise and prepare to encrypt data on all fixed internal storage drives.
However, data encryption will not take effect until the first time a user logs into the device using a Microsoft Account (available for individual users) or an Azure Active Directory Account (likely to be provided by an education institution or employer).
Once either of these two scenarios occur, BitLocker will arm, link the encryption keys to your account and store them in the cloud.

We strongly recommend that all users or administrators ensure that BitLocker keys are backed up, as they will be required if a device enters BitLocker Recovery Mode for any reason.

Important: Users who exclusively use local accounts on their device, and/or who are updating their existing operating system to Windows 11 24H2 using Windows Update, will not be affected by this change, but still have the option to manually enable BitLocker if they wish.


 

BitLocker recovery mode

BitLocker recovery mode can occur for many reasons including hardware or software changes, below are some examples:

Authentication errors:

Boot/BIOS changes:

Hardware, software and firmware changes:

Other triggers:

If BitLocker recovery mode occurs, you'll be prompted to input a BitLocker recovery key, which is a 48-digit number.

Prompting for the recovery key will either occur during start-up, due to a security risk or hardware change:

Screenshot of the BitLocker recovery screen.

Or you may be prompted to input the recovery key for data and/or external drives, for example if you forgot the unlock password:

Screenshot of the dialog box to enter the BitLocker recovery for a data drive.


 

Where can I find a BitLocker recovery key?

When you are prompted to enter a BitLocker recovery key, take note of the first 8 digits of the recovery key ID.

Screenshot of the BitLocker recovery screen highlighting the key ID.

The recovery key ID helps identifying which recovery key to use, in case you have more than one. 

Where BitLocker automatic encryption has occurred, there are primarily two places where your recovery key might be.

Attached to your Microsoft Account

If the BitLocker recovery key is backed up to your Microsoft Account, follow these steps to retrieve it.

  1. From another device, open a web browser and go to https://aka.ms/myrecoverykey

  2. Sign in with your Microsoft account and locate the key ID:

    Screenshot of the BitLocker recovery keys for a Microsoft account.
  3. Use the related recovery key to unlock the drive.

Notes: 

  • If the device was set up, or if BitLocker was turned on, by somebody else, the recovery key might be stored in that person’s Microsoft account.

  • Starting in Windows 11, version 24H2, the BitLocker recovery screen shows a hint of the Microsoft account associated with the recovery key.

Attached to your school or work account

If your device was ever signed into an organization using a work or school account, the recovery key could be stored in that organization's account. You might be able to access it directly, or you might need to contact the IT support for that organization to access your recovery key.

  1. From another device, open a web browser and go to https://aka.ms/aadrecoverykey

  2. Sign in with your work or school account

  3. Select Devices and expand the device for which you need to retrieve the recovery key

    Screenshot of the BitLocker recovery keys for a work or school account.
  4. Select the option View BitLocker Keys

  5. Using the key ID, find the related recovery key and use it to unlock the drive.


 

What if I can't find the recovery key?

If your device is managed by an organisation, check with their IT department to retrieve the recovery key.

If you can’t find the BitLocker recovery key and are unable to undo any changes that caused it to be needed, you’ll have to reset your device.

Resetting your device will remove all of your files.

Critical: Microsoft and Converge support are unable to provide, or recreate a lost BitLocker recovery keys, users and administrators are responsible for their data.

Affected products:


Microsoft 2011 Secure Boot Certificate Expiration — Stone Branded Devices

Overview

Secure Boot is a UEFI firmware feature found in all modern computers which helps to ensure that only trusted and signed code runs at the earliest stages of system start-up (boot loader, firmware modules, option ROMs, etc.).
It relies on a chain of trust, built through certificates and keys:

The certificates in these DB / KEK variables include Microsoft’s certificates (among others).
These certificates have a lifetime which is determined by expiry dates hard coded into the certificate.
Once the certificates expire, affected systems will stop receiving updates for components like the Windows Boot Manager and Secure Boot components.
 

More detail can be found in these Microsoft articles, including exactly which certificates are being replaced and further advice on what steps you can take:

Windows Secure Boot certificate expiration and CA updates

Act now: Secure Boot certificates expire in June 2026

Secure Boot Certificate updates: Guidance for IT professionals and organizations


What is happening?

The Microsoft 2011 Secure Boot certificates are set to expire beginning in June 2026 and are being replaced by new certificates which were originally created in 2023 as part of a phased transition process controlled by Microsoft and its technology partners.

The below table details which certificates are expiring and their replacements.

Expiring Certificate Expiration Date Replacement Certificate Function / Where Stored

Microsoft Corporation KEK CA 2011

June 2026

Microsoft Corporation KEK CA 2023

Stored in KEK / Signs updates to DB and DBX

Microsoft UEFI CA 2011

June 2026

Microsoft UEFI CA 2023

Stored in DB / Signs third-party bootloaders, EFI applications

Microsoft UEFI CA 2011 (Option ROM context)

June 2026

Microsoft Option ROM UEFI CA 2023

Stored in DB / For option ROMs specifically 

Windows Production PCA 2011

October 2026

Windows UEFI CA 2023

Stored in DB / For Windows bootloader and boot components


What this means for you


Preparations and actions


How can we help?

Customers should be able to rely on secure Boot updates being distributed via Microsoft Windows Update as hardware platform owners have been collaborating with Microsoft over a number of years to share signed certificates, so following the configuration steps to enable this method of delivery should cover all or most devices.
We have also worked with our hardware partners to provide some scripts and tools which customer may find useful.

Contained in this download is a PowerShell script that will identify the model of your device/motherboard, the current BIOS version, current build of Windows, Secure Boot status, a list of the current (active) Secure Boot KEK and DB variables and a list of the default (factory) Secure Boot variables.
This information is also logged to a CSV file.
Provided as a PowerShell script, this enables customers to choose how they implement its use should they wish too.

The download package contains help documentation detailing the function and usage and is compatible with any make or model of device.

This package will apply the Secure Boot 2023 KEK and DB updates as new Secure Boot variables.
This can be used as alternative (or as part of a blended approach) to having Microsoft deliver these updates through Windows Update.
Please note this tool is only compatible with Stone devices containing Asus motherboards.

The download package contains help documentation detailing the function and command line switches.

When the tool is run from command line or Powershell, either directly by using scripts, it checks which 2023 certificates are already installed and applies any that are missing.
Customers are advised to test on a sample batch of devices to confirm operation.
 

This download contains a collection of desktop client and workstation BIOS's, along with scripts and tools to automatically detect make/model and flash devices.
It is intended to be run within a Windows operating system and provides enough flexibility to allow users with knowledge PowerShell to build upon the functionality to suit individual needs.
Please note this tool is only compatible with Stone devices containing Asus motherboards.

The download package contains help documentation detailing the function and usage.

When this package is run, it checks to ensure the model of device/motherboard is supported, selects the correct BIOS file, checks BitLocker status and temporarily suspends if active, updates the BIOS and logs to the results to CSV.
Customers are advised to test on a sample batch of devices to confirm operation.
 

This download is similar in function to the Stone Asus BIOS Updater V2.0, however it has been packaged as a Microsoft Intune application which customers are able to push out to targeted clients, where it will install and apply the firmware update.
It is intended for users who are familiar with managing devices, groups and applications in Microsoft Intune.
Please note this tool is only compatible with Stone devices containing Asus motherboards.

The download package contains help documentation detailing function and usage.
Customers are advised to test on a sample batch of devices to confirm operation.


Firmware support matrix

The below tables list product information and links to download firmware which include hardcoded Secure Boot 2023 certificates.
Updates to this information will continue to be added as they become available.

Stone Desktop

Manufacturer

Baseboard Model

ComputerSystem Name

Minimum Recommended
BIOS Version
ASUSTeK COMPUTER INC. B150M-A BOAMOT-480 4401
ASUSTeK COMPUTER INC. H110M-A/DP BOAMOT-481 4401
ASUSTeK COMPUTER INC. Q170M-C BOAMOT-482 4401
ASUSTeK COMPUTER INC. B150M-A/M.2 BOAMOT-485 4401
ASUSTeK COMPUTER INC. B250M-A BOAMOT-488 2201
ASUSTeK COMPUTER INC. Q270M-C BOAMOT-489 2201
ASUSTeK COMPUTER INC. PRIME A320M-R BOAMOT-500 6241
ASUSTeK COMPUTER INC. PRIME A520M-A BOAMOT-506 9008
ASUSTeK COMPUTER INC. PRIME A520M-A II BOAMOT-519 3634
ASUSTeK COMPUTER INC. PRIME A520M-A II BOAMOT-520 3634
ASUSTeK COMPUTER INC. PRIME A620M-A BOAMOT-521 3278
ASUSTeK COMPUTER INC. PRIME B360M-A BOAMOT-493 3204
ASUSTeK COMPUTER INC. PRIME H310M-A BOAMOT-492 3204
ASUSTeK COMPUTER INC. PRIME H310M-R R2.0 BOAMOT-499 2210
ASUSTeK COMPUTER INC. PRIME H410M-A BOAMOT-503 1802
ASUSTeK COMPUTER INC. PRIME H510M-A BOAMOT-507 2404
ASUSTeK COMPUTER INC. PRIME H610M-A BOAMOT-526 3801
ASUSTeK COMPUTER INC. PRIME H610M-A D4 BOAMOT-511 3801
ASUSTeK COMPUTER INC. PRIME H610M-A D4 BOAMOT-524 3801
ASUSTeK COMPUTER INC. PRIME H810M-A BOAMOT-528 All BIOS
ASUSTeK COMPUTER INC. PRIME Q370M-C BOAMOT-494 3204
ASUSTeK COMPUTER INC. PRO Q570M-C BOAMOT-508 9047
ASUSTeK COMPUTER INC. PRO Q670M-C BOAMOT-512 3801
ASUSTeK COMPUTER INC. PRO Q870M-C BOAMOT-529 All BIOS

Stone AIO

Manufacturer

Baseboard Model

ComputerSystem Name

Minimum Recommended
BIOS Version
ASUSTeK COMPUTER INC. H110T BOAMOT-483 / BOAMOT-490 4401
ASUSTeK COMPUTER INC. Q170T BOAMOT-484 4401
ASUSTeK COMPUTER INC. PRIME H310T BOAMOT-495 3204
ASUSTeK COMPUTER INC. PRIME H310T R2.0 BOAMOT-501 2210
ASUSTeK COMPUTER INC. PRO H410T BOAMOT-505 1801
ASUSTeK COMPUTER INC. PRO H610T BOAMOT-527 3801
ASUSTeK COMPUTER INC. PRO H610T D4 BOAMOT-513 3801

Stone Mini

Manufacturer

Baseboard Model

ComputerSystem Name

Minimum Recommended
BIOS Version
PEGATRON CORPORATION H110D4-P1 PCMSYS-100 / PCMSYS-102 0411
PEGATRON CORPORATION Q170-D4P1 PCMSYS-101 / PCMSYS-103 0207
ASRock H310D4-P1 PCMSYS-104 1.30P
ASRock Q370D4-P1 PCMSYS-105 / PCMSYS-106 1.20O
ASUSTeK COMPUTER INC. H110T BOAMOT-483 / BOAMOT-490 4401
ASUSTeK COMPUTER INC. Q170T BOAMOT-484 4401
ASUSTeK COMPUTER INC. PRIME H310T BOAMOT-495 3204
ASUSTeK COMPUTER INC. PRIME H310T R2.0 BOAMOT-501 2210
ASUSTeK COMPUTER INC. PRO H410T BOAMOT-505 1801
ASUSTeK COMPUTER INC. PRO H610T BOAMOT-527 3801
ASUSTeK COMPUTER INC. PRO H610T D4 BOAMOT-513 3801

Stone Micro / Nano

Manufacturer

Baseboard Model

ComputerSystem Name

Minimum Recommended
BIOS Version
ASUSTeK COMPUTER INC. NUC14RVKU5 ASUSPC-10007 0050
ASUSTeK COMPUTER INC. NUC14RVKU7 ASUSPC-10008 0050

Stone Notebook

Manufacturer

Baseboard Model

ComputerSystem Name

Minimum Recommended
BIOS Version
ECS SP41MD NOTCHA-346 V15
ECS SP41MD NOTCHA-347 V15
ECS SP41MD NOTCHA-358 V15
ECS SP41MD NOTCHA-359 V15

Stone Workstation

Manufacturer

Baseboard Model

ComputerSystem Name

Minimum Recommended
BIOS Version
ASUSTeK COMPUTER INC. Prime Z690-A ISRMOT-247 4301
ASUSTeK COMPUTER INC. Prime B760M-A D4 ISRMOT-272 1820
ASUSTeK COMPUTER INC. Prime Z790-P-CSM ISRMOT-273 1820
ASUSTeK COMPUTER INC. Prime B650M-A II ISRMOT-274 3278
ASUSTeK COMPUTER INC. Prime Z890-P ISRMOT-295 All BIOS
ASUSTeK COMPUTER INC. Prime X870-P WIFI ISRMOT-302 All BIOS
ASUSTeK COMPUTER INC. Prime B760M-A ISRMOT-307 1820
Micro-Star International Co., Ltd. PRO Z790-P WIFI (MS-7E06) ISRMOT-311 7E06vAI
ASUSTeK COMPUTER INC. B850M MAX GAMING WIFI ISRMOT-313 1078



Stone Branded Products
https://kb.stonegroup.co.uk/index.php?CategoryID=2