Eight severe vulnerabilities exist within Intel’s core CPU technologies including the Intel Management Engine, Intel Server Platform Services, and the Intel Trusted Execution Engine. These vulnerabilities impact the 6th, 7th, and 8th Generation Intel Core processors, Intel Xeon E3-1200 v5 & v6 processors, Intel Xeon Scalable processors, Intel Xeon W processors, Intel Atom C3000 processors, the Apollo Lake Intel Atom E3900 processor series, Apollo Lake Intel Pentium processors, and the Celeron N and J processor series. If exploited, these vulnerabilities could allow threat actors to install rootkits on vulnerable systems, access data processed within CPUs, and cause affected systems to crash. Although firmware updates have been released to address these vulnerabilities, users of affected products cannot manually apply these updates and must wait for chipset and motherboard vendors to integrate them into their own updates before they can be applied. Intel has released a free tool for Windows and Linux users to determine if their systems are affected by these vulnerabilities, available here. The NJCCIC recommends users and administrators of affected systems review Intel’s security advisory and apply associated patches as soon as they are released by the vendors. Lenovo has already released a patch for some of their affected products, available here.