A critical vulnerability in the Intel chips discovered nearly a decade ago allows hackers to gain full control of Windows computers that are affected without the need for a password.
The vulnerability disclosed by Intel and classified as critical last week lies in the feature Active Management Intel (also known as AMT), which allows administrators to perform remote maintenance on computers.
AMT also allows the administrator to remotely control their keyboard and mouse computer, even if the computer is turned off.
AMT is also accessible through the browser even when the remote computer is in sleep mode. It is protected by a password defined by the administrator.
Embedi researchers, who found the error, explained one white paper who posted on Friday that the flaw exists because the default “admin” account for the web interface can log in without the codeof user access.
Intel has so far not mentioned how many systems are affected.
However, a search on Shodan, the search engine for open ports and databases, shows that more than 8.500 devices are vulnerable at this time, with 3.000 only in the US. But there could be thousands of other devices at risk on internal networks.
In a statement, Intel said it is working with its partners to address the issue and "expects those responsible to take the updates available from the beginning of the week on May 8".
Intel also published one tracking tool to determine if your systems are affected.