https://www.hardocp.com/news/2017/05/07/fix_those_pesky_hacking_holes_in_intel_amtLast week Intel let us all know that its Intel® Active Management Technology, Intel® Small Business Technology, and Intel® Standard Manageability products have an "elevation of privilege" issue that basically allows a "hacker" to enter a blank password into the AMT's web browser interface. This is obviously an issue, however Intel has stated that it is not a problem with consumer based PCs. So all you admins take notice!

There is an escalation of privilege vulnerability in Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small Business Technology versions firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 that can allow an unprivileged attacker to gain control of the manageability features provided by these products. This vulnerability does not exist on Intel-based consumer PCs with consumer firmware, Intel servers utilizing Intel® Server Platform Services (Intel® SPS), or Intel® Xeon® Processor E3 and Intel® Xeon® Processor E5 workstations utilizing Intel® SPS firmware.
Head over and check out Intel's Detection Guide as well as an identification tool.
https://downloadcenter.intel.com/download/26755Get it here:
http://www.win-raid.com/t596f39-Intel-Management-Engine-Drivers-Firmware-amp-System-Tools.htmlSTEPS:
here is GIF how to do flashing for your Z170 Mobo ( run as admin Command prompt)
http://i.imgur.com/L5jP8d8.gifvOR
Read here:
http://www.win-raid.com/t596f39-Inte...tem-Tools.html