Mobile and Desktop Processors
Intel® Core™ processors, Intel Atom® processors, tools, and utilities
16650 Discussions

OpenSSL vulnerability in icls driver version 1.71.99.0

MaximvL
Beginner
40,336 Views

According to Microsoft Defender, the icls driver installed on 80% of our devices uses OpenSSL version 3.0.12. This version has known vulnerabilities.

The driverversion is 1.71.99.0 which is the latest from Windows Update and also the lastest I can find on the Intel-site (https://www.intel.com/content/www/us/en/download/682431/intel-management-engine-drivers-for-windows-10-and-windows-11.html?wapkw=intel%20r%20icss%20client).

Is there  a newer version which I missed? If not, when can we expect an updated driverpackage?

0 Kudos
26 Replies
Bowserker
Beginner
3,178 Views

It's pretty crazy that Zoom is keeping up with this better than intel is. 

0 Kudos
saulov8
Beginner
2,462 Views

I recently resolved an issue on my laptop where Microsoft Defender flagged OpenSSL vulnerabilities in the following Intel Client Security (ICLS) driver files:

 

c:\windows\system32\driverstore\filerepository\iclsclient.inf_amd64_c25dbc60ad3b371a\lib\libcrypto-3-x64.dll (OpenSSL Version: 3.0.14.0)
c:\windows\system32\driverstore\filerepository\iclsclient.inf_amd64_c25dbc60ad3b371a\lib\libssl-3-x64.dll (OpenSSL Version: 3.0.14.0)

 

Here’s how I fixed it, step by step:

 

1) Confirmed the Issue:
In Device Manager, under System devices, I located Intel(R) Management Engine Interface. The installed ICLS driver version was 1.74.210.0. Checking the file properties of the flagged DLLs confirmed they were using OpenSSL 3.0.14.0, matching Defender’s alert.

 

2) Updated the Driver:
I downloaded the latest Intel Management Engine driver package (Intel_R_ME_SW_2507.7.10.0.zip) from Intel’s website. Using the ICLS driver included in this package, I updated the driver via Device Manager. Post-update, the new driver version loaded was 1.75.121.0, and the bundled OpenSSL version upgraded to 3.0.15, which patches the vulnerabilities.

 

3) Noticed Residual Files:
The update created a new folder in c:\windows\system32\driverstore\filerepository\ with the updated files but left the old folder (iclsclient.inf_amd64_c25dbc60ad3b371a) intact. Defender could still detect the vulnerable 3.0.14.0 files in the old folder.

 

4) Removed the Old Driver:
I ran pnputil /enum-drivers in an Admin Command Prompt to list all installed driver packages. This showed both the old (1.74.210.0) and new (1.75.121.0) ICLS drivers, each tied to an oemXX.inf file.
I removed the old driver with: pnputil /delete-driver oemXX.inf /uninstall (Replace oemXX.inf with the actual name from your list.)
This deleted the old folder and its vulnerable OpenSSL files. Then I rebooted to verify nothing has been broken.

 

5) Verified the Fix:
The vulnerable files were no longer flagged on Defender, confirming the issue was resolved.

 

Notes:
OpenSSL 3.0.14.0 has known vulnerabilities (e.g., CVE-2024-5535), fixed in 3.0.15.
Manually deleting DriverStore folders isn’t advised—use pnputil to avoid issues.
Check your specific oemXX.inf number in the pnputil /enum-drivers output before deleting.
This worked for me without breaking anything. Hopefully, it helps others facing the same Defender alerts!

0 Kudos
AndAuf
Beginner
2,444 Views

That's nice for you, and it is obvious that such things work. I bet it is also possible to manually change the DLLs with newer ones.

But we are talking about hundreds or thousands of devices!

0 Kudos
NiKiZe
Novice
2,010 Views

Spent a month or so on this as well, reading this post and some others over and over

 

In the end as mentioned by @saulov8 version 1.75.121.0 is (for now) a fix for some units, however newer devices uses a different ID which the new driver does not support, so still need to stay on 1.74.210.0.

However, if the parent MEI interface driver is updated, the iCLS device "goes away" and no driver is needed.
So the fix is to update MEI, and then cleanup CLS device, or update it's driver, depending on your hardware.

 

Writeup at https://gist.github.com/NiKiZe/a7946813c6bcb884c256157b66b215d2

0 Kudos
NiKiZe
Novice
1,508 Views

So iclsclient.inf_amd64_bc9b92a50d527061 1.75.121.0 is now vulnerable again CVE-2024-13176, CVE-2024-9143
Latest version at https://www.intel.com/content/www/us/en/download/682431/intel-management-engine-drivers-for-windows-10-and-windows-11.html is 2512.7.13.0 and does not contain any more recent drivers

0 Kudos
dcpoirier
Beginner
1,306 Views

This is a very good thread. I see the same issue in my environment. I am trying to get Dell to step up as anything from Intel should be updated automatically by Dell Command | Update. I am not getting the desired reaction from Dell who is accountable (we paid Dell, not Intel) and needs to act accordingly.  Thanks to all for pushing on this common and unacceptable issue.

0 Kudos
Reply