From Saturday, Nov 23rd 7:00 PM CST - Sunday, Nov 24th 7:45 AM CST, ni.com will undergo system upgrades that may result in temporary service interruption.
We appreciate your patience as we improve our online experience.
From Saturday, Nov 23rd 7:00 PM CST - Sunday, Nov 24th 7:45 AM CST, ni.com will undergo system upgrades that may result in temporary service interruption.
We appreciate your patience as we improve our online experience.
An attack can exploit this vulnerability on NI controllers with affected AMT firmware in two ways:
Intel has observed the vulnerability in AMT firmware versions 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, and 11.5.
Controller | Minimum Version of Fixed Firmware | Recommendation |
cRIO-9081 | 6.2.61.3535 | Apply Patch |
cRIO-9082 | 6.2.61.3535 | Apply Patch |
cDAQ-9138 | 6.2.61.3535 | Apply Patch |
cDAQ-9139 | 6.2.61.3535 | Apply Patch |
PXI-8109 | 6.2.61.3535 | Apply Patch |
PXIe-8115 | 7.1.91.3272 | Apply Patch |
PXI-8115 | 7.1.91.3272 | Apply Patch |
PXI-8119 | 8.1.71.3608 | Apply Patch |
PXIe-8133 | 6.2.61.3535 | Apply Patch |
PXIe-8135 | 8.1.71.3608 | Apply Patch |
PXIe-8821 | 9.1.41.3024 | Apply Patch |
PXIe-8830mc | 9.1.41.3024 | Contact NI |
PXIe-8840 Quad Core | 9.1.41.3024 | Apply Patch |
PXIe-8840 | 9.1.41.3024 | Apply Patch |
IC-3172 | 10.0.55.3000 | Apply Patch |
IC-3173 | 10.0.55.3000 | Apply Patch |
Apply the recommended patches above to mitigate the vulnerability for the corresponding controller. If you chose not to apply the mitigation patch, you can reduce the security risk on controllers with vulnerable firmware by applying the two mitigations described below. Refer to the INTEL-SA-00075 Mitigation Guide for the commands to perform the following steps.