Dell, which last week was scrambling to work out which of its systems are affected by the Intel AMT vulnerability, is scrambling to catch up with peers HP Inc, Lenovo and Fujitsu.
In a note published on Friday, the company said it would publish firmware fixes for most vulnerable kit.
As readers should already know, Intel introduced the bug in 2010, and it turned out that an attacker need only offer an empty login string to Chipzilla's VPro AMT remote management firmware to access vulnerable systems.
The company emphasises that “only those purchased with Intel AMT, SBT, or ISM capability are vulnerable”. Fixes will appear at Dell's support page, it said.
Systems without a scheduled fix release date include:
|Client System||Firmware Version|
|OptiPlex 9010 AIO||126.96.36.19908|
|Latitude E6440 ATG||188.8.131.5224|
|Latitude E6420 XFR||184.108.40.20672|
|Latitude E6410 ATG||220.127.116.1135|
|Precision T7600||18.104.22.16872 (WS)|
|Precision T5600||22.214.171.12472 (WS)|
|Precision T5600XL||126.96.36.19972 (WS)|
|Precision T3600||188.8.131.5272 (WS)|
|Precision T3600XL||184.108.40.20672 (WS)|