SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    Intel AMT Vulnerability: Hacker's Backdoor Dream
Date    Sunday May 07 2017, @11:08AM
Author    martyb
Topic   
from the Intel-likes-the-backdoor dept.
https://soylentnews.org/article.pl?sid=17/05/07/0211240

An Anonymous Coward writes:

Days after being announced, Tenable reverse engineered the Intel AMT Vulnerability. According to a blog post, the vulnerability is a backdoor dream. The AMT web interface uses HTTP Digest Authentication, which uses MD5. The problem is that partial matches of the hash are also accepted. Therefore, Tenable decided to experiment and while doing so:

[W]e reduced the response hash to one hex digit and authentication still worked. Continuing to dig, we used a NULL/empty response hash (response="" in the HTTP Authorization header).

Authentication still worked. We had discovered a complete bypass of the authentication scheme.

Long story short, for over five years, a complete and trivial bypass of AMT authentication has existed. If this wasn't an intentional backdoor, it is a monumental mistake in security and coding best practices. Regardless, the "backdoor" is now public. With Shodan showing thousands of unpatchable computers (as no patch is currently available, assuming they would ever be patched) exposed to the Internet, some poor IT sod is bound to show up to work some bad news on Monday.


Original Submission

Links

  1. "blog post" - https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability
  2. "HTTP Digest Authentication" - https://en.wikipedia.org/wiki/Digest_access_authentication
  3. "Original Submission" - https://soylentnews.org/submit.pl?op=viewsub&subid=20047

© Copyright 2025 - SoylentNews, All Rights Reserved

printed from SoylentNews, Intel AMT Vulnerability: Hacker's Backdoor Dream on 2025-04-29 10:55:39