Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Red alert! Intel patches remote execution hole that's been hidden in biz, server chips since 2008
The Register ^ | May 1, 2017 | Chris Williams

Posted on 05/01/2017 8:05:10 PM PDT by dayglored

For the past nine years, millions of Intel workstation and server chips have harbored a security flaw that can be potentially exploited to remotely control and infect systems with spyware.

Specifically, the bug is in Intel's Active Management Technology (AMT), Standard Manageability (ISM) and Small Business Technology (SBT) firmware versions 6 to 11.6. According to Chipzilla, the security hole allows "an unprivileged attacker to gain control of the manageability features provided by these products."

That means it is possible for hackers to log into a vulnerable computer's hardware – right under the nose of the operating system – and silently tamper with the machine, install virtually undetectable malware, and so on, using AMT's features. This is potentially possible across the network because AMT has direct access to the computer's network hardware.

These insecure management features have been available in various, but not all, Intel chipsets for nearly a decade, starting with the Nehalem Core i7 in 2008, all the way up to this year's Kaby Lake Core parts. Crucially, the vulnerability lies at the very heart of a machine's silicon, out of sight of the operating system, its applications and any antivirus.

The programming blunder can only be fully addressed with a firmware-level update, and it is present in millions of chips. It is effectively a backdoor into computers all over the world.

The vulnerable AMT service is part of Intel's vPro suite of processor features. If vPro is present and enabled on a system, and AMT is provisioned, unauthenticated miscreants on your network can access the computer's AMT controls and hijack them. If AMT isn't provisioned, a logged-in user can still potentially exploit the bug to gain admin-level powers. If you don't have vPro or AMT present at all, you are in the clear.

Intel reckons the vulnerability affects business and server boxes, because they tend to have vPro and AMT present and enabled, and not systems aimed at ordinary folks, which typically don't. You can follow this document to check if your system is vulnerable – and you should.

Basically, if you're using a machine with vPro and AMT features enabled, you are at risk. Modern Apple Macs, although they use Intel chips, do not ship with the AMT software, and are thus in the clear.

According to Intel today, this critical security vulnerability, labeled CVE-2017-5689, was discovered and reported in March by Maksim Malyutin at Embedi. To get Intel's patch to close the hole, you'll have to pester your machine's manufacturer for a firmware update, and in the meantime, try the mitigations here. These updates, although developed by Intel, must be cryptographically signed and distributed by the manufacturers. It is hoped they will be pushed out to customers within the next few weeks. They should be installed ASAP.

"In March 2017 a security researcher identified and reported to Intel a critical firmware vulnerability in business PCs and devices that utilize Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), or Intel Small Business Technology (SBT)," an Intel spokesperson told The Register.

"Consumer PCs are not impacted by this vulnerability. We are not aware of any exploitation of this vulnerability. We have implemented and validated a firmware update to address the problem, and we are cooperating with equipment manufacturers to make it available to end-users as soon as possible."

Specifically, according to Intel:

Apparently, Intel's Small Business Technology is not vulnerable to privilege escalation via the network. Whether you're using AMT, ISM or SBT, the fixed firmware versions to look out for are, depending on the processor family affected:

"The short version is that every Intel platform with AMT, ISM, and SBT from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole," explained semiconductor industry journo Charlie Demerjian earlier today.

"Even if your machine doesn't have SMT, ISM, or SBT provisioned, it is still vulnerable, just not over the network."

Demerjian also pointed out that it's now up to computer makers to distribute the digitally signed firmware patches for people and IT admins to install. That means if your hardware supplier is a big name like Dell, one of the HPs, or Lenovo, you'll hopefully get an update shortly. If it's a no-name white box slinger, you're likely screwed: things like security and cryptography and firmware distribution is too much hard work in this low-margin business. You may never get the patches you need, in other words.

What is AMT?

AMT is an out-of-band management tool accessed via network port 16992 to the machine's wired Ethernet interface: it lays bare complete control of a system to the network, allowing IT bods and other sysadmins to reboot, repair and tweak servers and workstations remotely. It can provide a virtual serial console, and, if the right drivers are installed, remote desktop access. God help you if this service is exposed to the public internet.

It is supposed to require a password before granting access, but the above bug means an attacker can waltz up to the hardware's control panel, unauthenticated. Even if you've firewalled off your systems' AMT access from the outer world, someone or malware within your network – say on a reception desk PC – can potentially exploit this latest vulnerability to drill deep into AMT-managed workstations and servers, and further compromise your business.

AMT is software that runs on Intel's Management Engine (ME), a technology that has been embedded in its chipsets in one way or another for over a decade, since around the time the Core 2 landed in 2006. It operates at what's called ring -2, below the operating system kernel, and below any hypervisor on the box. It is basically a second computer within your computer, and it has full access to the network, peripherals, memory, storage and processors. Amusingly, the engine is powered by an ARC CPU core, which has a 16- and 32-bit hybrid architecture and is a close relative to the Super FX chip used in Super Nintendo games such as Star Fox. Yes, the custom chip doing the 3D math in Star Fox and Stunt Race FX is an ancestor of the ARC microprocessor secretly and silently controlling your Intel x86 tin.

Details of Intel's ME have been trickling out into the open over the past few years: Igor Skochinsky gave a super talk in 2014 about it, for instance. The ARC core runs a ThreadX RTOS from SPI flash. It has direct access to the Ethernet controller. These days it is built into the Platform Controller Hub, an Intel microchip that contains various hardware controllers and is connected to the main processors on the motherboard.

The ME is a black box that Intel doesn't like to talk about too much, although it is partially documented on Chipzilla's website. It freaks out privacy and security conscious people: no one quite knows what the engine is really doing, and if it can be truly disabled, as it runs so close to the bare metal in computers.

On some Intel chip families, you can kill the ME with extreme prejudice by strategically wiping parts of the motherboard flash.

For years now, engineers and infosec types have been warning that, since all code has bugs, at least one remotely exploitable programming blunder must be present in Intel's AMT software, and the ME running it, and thus there must be a way to fully opt out of it: to buy a chipset with it not present at all, rather than just disabled or disconnected by a hardware fuse.

Finding a bug like this is like finding a hardwired, unremovable and remotely accessible administrator account, with the username and password "hackme", in Microsoft Windows or Red Hat Enterprise Linux. Except this Intel flaw is in the chipset, running out of reach of your mortal hands, and now we wait for the cure to arrive from the computer manufacturers.

Is a big deal? "Yes," said Linux kernel guru Matthew Garrett, who posted some more technical information about the vulnerability, here.

"Fixing this requires a system firmware update in order to provide new ME firmware, including an updated copy of the AMT code. Many of the affected machines are no longer receiving firmware updates from their manufacturers, and so will probably never get a fix.

"Anyone who ever enables AMT on one of these devices will be vulnerable. That's ignoring the fact that firmware updates are rarely flagged as security critical (they don't generally come via Windows update), so even when updates are made available, users probably won't know about them or install them." ®


TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: amt; intel; spyware; windowspinglist
Navigation: use the links below to view more comments.
first 1-2021-36 next last
You know about the "Active Management Technology" (AMT) that has had many folks freaking out about "Spyware In My CPU?? WHAT???"

Well, guess what, it's a remotely exploitable vulnerability.

Now who would have guessed that???

BTW, this does not affect Macs that use the Intel chips because Apple does not enable the AMT features.

1 posted on 05/01/2017 8:05:10 PM PDT by dayglored
[ Post Reply | Private Reply | View Replies]

To: Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; amigatec; AppyPappy; arnoldc1; ATOMIC_PUNK; ...
"Hidden" Second-CPU Vulnerability -- Remote Exploit! ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

2 posted on 05/01/2017 8:06:06 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
Previous FreeRepublic threads on "Active Management Technology":
3 posted on 05/01/2017 8:10:14 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: dayglored

Thank you for the update.

Looks as if i will be staying with AMD processors to build my next system.


4 posted on 05/01/2017 8:16:13 PM PDT by Calvinist_Dark_Lord ((I have come here to kick @$$ and chew bubblegum...and I'm all outta bubblegum! ~Roddy Piper))
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Does the NSA know about this? Do they use this on their TOR network exit boxen?


5 posted on 05/01/2017 8:19:12 PM PDT by Paladin2
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

If they close the back door, do they have to give any money back to the NSA? Or do they just have to install a new backdoor for Big Brother?


6 posted on 05/01/2017 8:23:29 PM PDT by PAR35
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
Ran the software and got the message “Could not start SCCM”.

Since I am running on a consumer i7 core, that is what I expected. Just nice to have it come back clean.

Wonder if this affects Xeon chips used in workstations?

7 posted on 05/01/2017 8:27:16 PM PDT by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Calvinist_Dark_Lord

I was just about to ask if AMD was affected.

I wasn’t really thinking of security or being prescient.
It’s just that the AMD machines (eMachine to be precise)
was the least expensive thing I could get on my last few purchases.

So I accidentally did the safe thing?


8 posted on 05/01/2017 8:30:16 PM PDT by shibumi (Cover it with gas and set it on fire.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Paladin2
> Does the NSA know about this? Do they use this on their TOR network exit boxen?

If the NSA doesn't know about this, and if they haven't been using it for a decade, they've been slacking.

The Intel ME and AMT are a spook's wet dream.

9 posted on 05/01/2017 8:33:54 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 5 | View Replies]

To: PAR35
> If they close the back door, do they have to give any money back to the NSA? Or do they just have to install a new backdoor for Big Brother?

Nobody said they were turning off the Management Engine. They're just fixing a bug in how its software works.

This vulnerability is just a bug. The real "back door" is the entire ME, and that's being fixed, not closed.

10 posted on 05/01/2017 8:41:30 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 6 | View Replies]

To: texas booster
> Wonder if this affects Xeon chips used in workstations?

Yes it does.

11 posted on 05/01/2017 8:41:57 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 7 | View Replies]

To: dayglored

Bkmrk Thanks!


12 posted on 05/01/2017 8:45:36 PM PDT by BurrOh (All animals are equal, but some animals are more equal than others. ~Orwell)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Calvinist_Dark_Lord
> Thank you for the update. Looks as if i will be staying with AMD processors to build my next system.

You're very welcome. AMD CPUs are in general quite good.

OTOH, if you run VMware ESX software, be aware that some AMD machines have subtle problems with VMs that happen to tickle certain features of VMware in unpleasant ways. I've had a couple of VMs that I had to migrate off an AMD-based VMware ESX head, onto an Intel-based VMware ESX head, because they were unstable on the AMD, but fine on the Intel. Don't know why, but it's repeatable, and in some cases it crashed the entire VMware ESX head, not just the particular VM. Weird. But I've heard reports that this is not an isolated case. So be alert.

13 posted on 05/01/2017 8:47:55 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 4 | View Replies]

To: dayglored

Not a flaw, as it was purposefully designed into the chips.


14 posted on 05/01/2017 8:51:17 PM PDT by semaj (Audentes fortuna juvat: Fortune favors the bold. Be Bold FRiends.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

F3GUM — will be surprised if anyone even here knows what that means.


15 posted on 05/01/2017 8:56:32 PM PDT by piytar (http://www.truthrevolt.org/videos/bill-whittle-number-one-bullet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: semaj

Yup.


16 posted on 05/01/2017 8:57:33 PM PDT by piytar (http://www.truthrevolt.org/videos/bill-whittle-number-one-bullet)
[ Post Reply | Private Reply | To 14 | View Replies]

To: piytar

Re: F3GUM

Okay you win a Kewpie doll. Now, what’s it mean? :-)


17 posted on 05/01/2017 9:01:02 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 15 | View Replies]

To: dayglored

TRS-80 backdoor


18 posted on 05/01/2017 9:07:14 PM PDT by thoughtomator
[ Post Reply | Private Reply | To 17 | View Replies]

To: dayglored

Was the DOS override access password. Worked on some earlier Windows machines, too (the earlier versions were just a shell on top of DOS).


19 posted on 05/01/2017 9:08:37 PM PDT by piytar (http://www.truthrevolt.org/videos/bill-whittle-number-one-bullet)
[ Post Reply | Private Reply | To 17 | View Replies]

To: thoughtomator

Yup.


20 posted on 05/01/2017 9:09:35 PM PDT by piytar (http://www.truthrevolt.org/videos/bill-whittle-number-one-bullet)
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-36 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson