Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Saturday December 30 2017, @09:32AM   Printer-friendly
from the told-you-so dept.

There has been quite a bit of discussion recently regarding the use of a Management Engine (ME), or the code that exists within a CPU but is inaccessible to the user of the computer using that CPU. To quote from the introduction of this PDF:

Intel Management Engine (Intel ME) is a proprietary technology that consists of a microcontroller integrated into the Platform Controller Hub (PCH) chip and a set of built-in peripherals. The PCH carries almost all communication between the processor and external devices. Therefore, Intel ME has access to almost all data on the computer. The ability to execute third-party code on Intel ME would allow for a complete compromise of the platform.

Several people, including some from within our own community, have expressed concern that any weaknesses in the ME code would provide another attack surface and, guess what? It has been done! This PDF explains just how some people have managed to achieve the hackers dream and our worst nightmare, and details some research on this subject. It even goes so far as to explain how to run unsigned code in the ME, albeit under a limited set of circumstances - thus giving a hacker total control over the system. However, as this is only the beginning of such research in relative terms it does not bode well for the future. Finding the flaw is the first step, learning how to exploit is the next.

The PDF is, by necessity, quite technical but will be understandable by a significant proportion of our community. The report claims that the following CPUs are susceptible to the attacks detailed in it:

  • 6th, 7th & 8th Generation Intel® CoreTM Processor Family
  • Intel® Xeon® Processor E3-1200 v5 & v6 Product Family
  • Intel® Xeon® Processor Scalable Family
  • Intel® Xeon® Processor W Family
  • Intel® Atom® C3000 Processor Family
  • Apollo Lake Intel® Atom Processor E3900 series
  • Apollo Lake Intel® PentiumTM
  • CeleronTM N and J series Processors

Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Saturday December 30 2017, @02:21PM (2 children)

    by Anonymous Coward on Saturday December 30 2017, @02:21PM (#615845)

    We need a website we can visit that will tell us if our machine(s) are compromised...
    Or maybe MalwareBytes will add ME checking into their product?

  • (Score: 0) by Anonymous Coward on Saturday December 30 2017, @02:44PM

    by Anonymous Coward on Saturday December 30 2017, @02:44PM (#615852)

    We need a website we can visit that will tell us if our machine(s) are compromised...

    For extra security the website should verify the identities of Americans by asking for the last six digits of their Social Security Number, and also use a domain that is difficult to impersonate by rearranging word order.

    Clearly the best option would be https://www.intelsecurity2017.com [washingtonpost.com].

  • (Score: 0) by Anonymous Coward on Sunday December 31 2017, @07:09AM

    by Anonymous Coward on Sunday December 31 2017, @07:09AM (#616095)

    We need a website we can visit that will tell us if our machine(s) are compromised...

    Oh, that's easy. Surf the Dark Web and/or the major news websites with JS turned on for an hour. Now you know your machine is compromised!