Back in 2016, we published a good technological explainer about Intel’s Management Engine, an evolution of the decade-plus old idea of “Trusted Computing,” in which a separate, isolated system-on-a-chip lives alongside of your computer, performing cryptographic work and overseeing the functions of your computer.
Conceptually, this idea has some real utility (an example of it can be found in the introspection engine that Bunnie Huang and Ed Snowden are collaborating on), but the devil is in the details: trusted computing can also be used to take away control from the computer’s users, allowing corporations to shut out their rivals (even when it works as intended) and allowing attackers to run undetectable, unstoppable code (when the developers make mistakes). So this kind of thing requires both good intentions and perfect technical execution.
Alas, Intel has neither.
Less than a year ago, a terrible series of attacks on Active Management Technology surfaced, which Intel has been scrambling to patch. These attacks were sophisticated and involved real technical wizardry.
But this week, security researchers with F-Secure published a report on a new, dangerous defect in AMT, and this one is a total no-brainer.
Here’s how it works: when you reboot a computer, you can hold down a special key (usually F12) to enter the BIOS menu. From there, if you select Intel’s Management Engine BIOS Extension (MEBx), you can “change the password, enable remote access, and set the firmware to not give the computer’s user an ‘opt-in’ message at boot time.” Basically, you can seize control over the computer in a way that is undetectable and unstoppable for the user.
It’s not hard to mitigate this attack: just set a password for MEBx. Unfortunately, most OEMs don’t do this, so “admin” works on millions of systems. Every system F-Secure tested was vulnerable.
Now, it’s true that you need physical access to effect this attack, but the physical access you need is extremely short, and leaves no trace: starting from a computer that is switched off, you boot it with the F12 held down, enter a few keystrokes and shut it down again. Given that Trusted Computing is supposed to defend against drive-by physical attacks (because the Trusted Computing Module is tamper-evident), this represents a serious inroad against AMT.
Intel’s response amounts to “We keep telling OEMs to set a password for MEBx, but they don’t, so ¯_(ツ)_/¯.”
Late last month, Intel issued guidelines on best practices for configuring AMT to prevent these and other types of AMT-based attacks on PCs. In the “Q&A” document, Intel acknowledged the problem, but put the onus on PC manufacturers for not properly following Intel’s advice:
If the Intel MEBx default password was never changed, an unauthorized person with physical access to the system could manually provision Intel AMT via the Intel MEBx or with a USB key using the default password. If the system’s manufacturer has followed Intel’s recommendation to protect the Intel MEBx menu with the system BIOS password, this physical attack would be mitigated.
Sintonen said that all the laptop computers he had tested so far were vulnerable to the attack.
Researcher finds another security flaw in Intel management firmware [Updated] [Sean Gallagher/Ars Technica]
An indictment in the US District Court for the Northern District of Ohio’s Eastern Division alleges that Phillip R Durachinsky created a strain of MacOS “creepware” called Fruitfly, which was able to covertly operate the cameras and microphones of infected computers as well as capturing and sharing porn searches from the infected machines; the indictment […]
Vtech is the Taiwanese kids’ crapgadget vendor that breached sensitive data on 6.3 million children and their families, lied about it and covered it up, then added a dirty EULA to its products that made us promise not to sue them if they did it again.
Two days ago, an industry/academic team released a terrifying alert about a pair of CPU bugs called Spectre and Meltdown that allowed one program to steal data from another, even with the best memory-management and isolation techniques — news that meant that virtually all the mission-critical computers in the world could no longer be trusted […]
This Content is Generated from RSS Feeds, if your content is featured and you would like to be removed, please Contact Us With your website address and name of site you wish to be removed from.
You can control what content is distributed in your RSS Feed by using your Website Editor.