A number of Intel processoirs released over the last couple of years have been found by independent researchers, and confirmed by Intel, to have vulnerabilities that put aystems at risk of an elevated privilege attack.
Intel's analysis of their Management Engine, Trusted Execution Engine and other systems has identified issues affecting a number of processor families released since 2015.
- 6th, 7th & 8th Generation Intel Core Processor Family
- Intel Xeon Processor E3-1200 v5 & v6 Product Family
- Intel Xeon Processor Scalable Family
- Intel Xeon Processor W Family
- Intel Atom C3000 Processor Family
- Apollo Lake Intel Atom Processor E3900 series
- Apollo Lake Intel Pentium
- Celeron N and J series Processors
Intel says that if the vulnerabilities are exploited it could be possible for an attacker to impersonate various Intel applications, thereby impacting local security feature attestation validity, load and execute arbitrary code outside the visibility of the user and operating system, and cause a system crash or system instability.
It's worth reading the full support article to identify any potentially affected systems you may have and what steps you can take to remediate the issues.