A flaw in its driver update utility tool, which checked Intel's servers over an unencrypted connection, could have allowed an attacker to install malware on affected machines through a man-in-the-middle attack.
An updated tool, version 2.4, now talks to Intel's server over a secure SSL connection.
http://www.zdnet.com/article/major-security-flaw-patched-in-intel-driver-software/