Researcher Finds Another Security Flaw In Intel Management Firmware (arstechnica.com) 87
An anonymous reader quotes a report from Ars Technica: Meltdown and Spectre are not the only security problems Intel is facing these days. Today, researchers at F-Secure have revealed another weakness in Intel's management firmware that could allow an attacker with brief physical access to PCs to gain persistent remote access to the system, thanks to weak security in Intel's Active Management Technology (AMT) firmware -- remote "out of band" device management technology installed on 100 million systems over the last decade, according to Intel. [T]he latest vulnerability -- discovered in July of 2017 by F-Secure security consultant Harry Sintonen and revealed by the company today in a blog post -- is more of a feature than a bug. Notebook and desktop PCs with Intel AMT can be compromised in moments by someone with physical access to the computer -- even bypassing BIOS passwords, Trusted Platform Module personal identification numbers, and Bitlocker disk encryption passwords -- by rebooting the computer, entering its BIOS boot menu, and selecting configuration for Intel's Management Engine BIOS Extension (MEBx).
If MEBx hasn't been configured by the user or by their organization's IT department, the attacker can log into the configuration settings using Intel's default password of "admin." The attacker can then change the password, enable remote access, and set the firmware to not give the computer's user an "opt-in" message at boot time. "Now the attacker can gain access to the system remotely," F-Secure's release noted, "as long as they're able to insert themselves onto the same network segment with the victim (enabling wireless access requires a few extra steps)."
If MEBx hasn't been configured by the user or by their organization's IT department, the attacker can log into the configuration settings using Intel's default password of "admin." The attacker can then change the password, enable remote access, and set the firmware to not give the computer's user an "opt-in" message at boot time. "Now the attacker can gain access to the system remotely," F-Secure's release noted, "as long as they're able to insert themselves onto the same network segment with the victim (enabling wireless access requires a few extra steps)."
Firmware vs hardware (Score:4, Insightful)
Totally different things. I imagine they find software and firmware vulnerabilities all the time. Hardware is difficult to patch around, and obviously comes with the noteable performance hit.
Obligatory: Intel CPU Backdoor Report (Jan 1 2018) (Score:4, Interesting)
Change log:
2018/01/01 - Added 14 Useful Links. Disable Intel ME 11 via undocumented NSA "High Assurance Platform" mode with me_cleaner, Blackhat Dec 2017 Intel ME presentation, Intel ME CVEs (CVSS Scored 7.2-10.0)
Intel CPU Backdoor Report
The goal of this report is to make the existence of Intel CPU backdoors a common knowledge and provide information on backdoor removal.
What we know about Intel CPU backdoors so far:
TL;DR version
Your Intel CPU and Chipset is running a backdoor as we speak.
The backdoor hardware is inside the CPU/Bridge and the backdoor firmware (Intel Management Engine) is in the chipset flash memory.
30C3 Intel ME live hack:
[Video] 30C3: Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware [youtube.com]
@21:43, keystrokes leaked from Intel ME above the OS, wireshark failed to detect packets.
[Quotes] Vortrag [events.ccc.de]:
"the ME provides a perfect environment for undetectable sensitive data leakage on behalf of the attacker".
"We can permanently monitor the keyboard buffer on both operating system targets."
Backdoor removal:
The backdoor firmware can be removed by following this guide [github.io] using the me_cleaner [github.com] script.
Removal requires a Raspberry Pi (with GPIO pins) and a SOIC clip.
2017 Dec Update:
Intel ME on recent CPUs may be disabled by enabling the undocumented NSA HAP mode [ptsecurity.com], use me_cleaner [github.com]me_cleaner with -S option to set the HAP bit, see me_cleaner: HAP AltMeDisable bit [github.com].
Decoding Intel backdoors:
The situation is out of control and the Libreboot/Coreboot community is looking for BIOS/Firmware experts to help with the Intel ME decoding effort.
If you are skilled in these areas, download Intel ME firmwares from this collection [win-raid.com] and have a go at them, beware Intel is using a lot of counter measures to prevent their backdoors from being decoded (explained below).
Useful links (Added 2018 Jan 1):
Disabling Intel ME 11 via undocumented HAP mode (NSA High Assurance Platform mode) [ptsecurity.com]
me_cleaner: Set HAP AltMeDisable bit with -S option [github.com]
Blackhat 2017: How To Hack A Turned Off Computer Or Running Unsigned Code In Intel Management Engine [blackhat.com]
EFF: Intel's Management Engine is a security hazard, and users need a way to disable it [eff.org]
Sakaki's EFI Install Guide/Disabling the Intel Management Engine [gentoo.org]
Intel ME bug storm: Hardware vendors race to identify and provide updates for dangerous Intel flaws. [zdnet.com]
CVE-2017-5689 [cvedetails.com]: An unprivileged network attacke
Seems like nothing good come from Intel nowadays.. (Score:3)
Re: (Score:3)
These are programming flaws. Programmers are never held accountable for anything. Every time something like this is reported folks on here make up every excuse why it's not the fault of the programmer.
Watch.
Re: (Score:2)
How is this even a flaw?
It's a case of default state + physical access == ownership.
This is nothing new at all.
Re: (Score:2)
Re: (Score:2)
I don't particularly see this as bad engineering even.
The thing ships disabled by default and with a default local only pwd to enable it OR lock out other access.
It can be disabled in the BIOS (and then the BIOS pwd activated) as well.
The config guide even says setting the password is a non optional step in any multi user/multi access environment, or you can get a sku where it's not even available.
no different than leaving the BIOS unlocked. I could boot a USB device that installs a rogue bootloader on the
Re: (Score:2)
Here's the good news about AMT and vPro: You can spend $30/system to have vPro on it, you can mass-configure with software Intel provides for free (but you need to buy a signed certificate specifically for AMT provisioning that matches your DHCP's DNS suffix for it to work), and then you can remotely reboot provisioned hardware from ISO images to reimage hardware from anywhere in the world, if you have granted access. It just needs to be on your network, and this includes notebooks that are wireless only.
Re: (Score:2)
Re: (Score:2)
I guess using shit that incompetent admins spent extra money for and then left wide open by never configuring is now Intel's fault? This is the manual single-machine way to provision AMT / vPro. The only way this is a "flaw" is because the monkey in IT either didn't know what they were buying, or didn't bother to actually use what they were sold. By the way, once AMT / vPro are configured in any way (and if the admin of a machine is at all smart, they are doing this through a software provisioner when in
move on...requires physical access (Score:2)
Re: (Score:3)
If you have long term physical access you can do anything...
FTFY. by the sound of this flaw, the amount of physical access needed is negligible.
Think about all the times you step away from a live PC every day; if the amount of physical access needed is trivial (say, 2 seconds to plug in a flash drive and let a script run), a bad actor masquerading as the maintenance guy could easily compromise every machine in your office in the time it takes to get a fresh cup o' Joe.
Re: (Score:2)
To me it sounds more like 5 minutes to half an hour. But it also sounds as if there is no recovery.
Re: (Score:2)
So what you are saying, is that if you set up a PC for security, you shouldn't half ass it?
To be immune from this "flaw":
1. actually provision AMT if it's present on your PC (note: AMT != Intel ME, which is in all chipsets of the last 10 years or so)
2. put a BIOS password to protect from AMT local reset.
This takes about 30 seconds, and it can actually be done en masse if you are doing AMT properly.
Re: (Score:2)
Or you could just have the IT guy provision it when he does all the other crap to the machine before it's deployed, and it's no longer a concern. Also, in addition to being immune to this "flaw", you get the remote administration and monitoring advantages of AMT! How about that!
Re:move on...requires physical access (Score:4, Informative)
Not if the system wasn’t left open with a weak password default.
Re: (Score:2)
Re: (Score:3)
Do you require a password to log in locally? If so, why? after all, if someone has physical access they can do anything anyway, so why bother?
Re: (Score:2)
If you have physical access you can do anything...
In this case if you have physical access you can enable remote access and hide it. Anyone that handled the system before it arrived at your site and was placed in the rack could have done that.
Obviously it can be remedied by disabling it yourself, but I'm pretty sure not many companies are already doing that.
Re: (Score:2)
The assertion was that AMD has other flaws. Your response doesn't even address that. This is independent of Meltdown (Intel only) and Spectre (all speculative execution chips).
OTOH, there haven't been any recent announcements of new AMD flaws that don't also apply to Intel.
Re: (Score:2)
Did you even use the link he provided? Did you read anything past "AMD has their own" before clicking reply?
He linked to an article about AMD's own in-hardware sideband management solution that is essentially the same fucking thing as Intel ME / AMT.
Who's the fucking shill now? Fanboyism + incompetence + ignorance = Slashdot hilarity.
Re: (Score:2)
And by "nobody" you mean "all Fortune 500 companies, and hundreds of millions of home users"
So, the flaw is the user forgot to set the lock? (Score:5, Insightful)
If MEBx hasn't been configured by the user or by their organization's IT department, the attacker can log into the configuration settings using Intel's default password of "admin." The attacker can then change the password
So, the "flaw" is that the user forgot to set the lock? I am stunned that this is considered a vulnerability/flaw. I mean, when I buy a new gun safe or document safe for my home or office, it comes from the factory with a default combination. I have to set it to one of my choosing. If I choose to not change the default combination, then that is on me.
Now, you might argue that it should be more like keyless entry for an automobile: the manufacturer sets a code a and provides you a device (key fob) for entry. However, if Intel did that, they would be accused of making their products difficult to use or crippling them (because people would certainly lose their AMT key fobs and Intel would either be unable to recover them, or would charge a fee for the service) or taking advantage of the user (because they would certainly lose the key fob). Plus, that would make it an absolute nightmare for central IT, the target audience for this particular feature.
The point is that if you are buying machines that have this capability, then you are buying mid-range to high-end business/professional stuff. AMT is not available on entry-level and most consumer gear. Besides, the people who don't bother setting the MEBx password on their systems (assuming they don't have central management through IT) are probably the same sort of people who buy a wireless AP, turn it on and leave the password set to the default and the admin function accessible over the wireless interface.
Intel has problems, but this one is definitely way down on the list.
Re:So, the flaw is the user forgot to set the lock (Score:5, Interesting)
I've worked in the IT field for 15 years - in academia, for financial institutions, for Fortune 500 companies, and at small, locally owned businesses.
You would balk if you saw how many of the "top companies in America" don't give 2 shits about security, outside of whatever the latest CNN scare story is. I personally find it amazing how some of these corporations will spend tens of thousands of dollars on fancy security equipment.... that they never bother to actually configure.
You can show your C-levels the lock and hand them the key, but you can't make them set the latch.
Re: (Score:2)
Equifax
Re: (Score:2)
You would balk if you saw how many of the "top companies in America" don't give 2 shits about security, outside of whatever the latest CNN scare story is. I personally find it amazing how some of these corporations will spend tens of thousands of dollars on fancy security equipment.... that they never bother to actually configure.
You can show your C-levels the lock and hand them the key, but you can't make them set the latch.
Absolutely! Except there is going to come a point in time where a concerted effort by a small nation-state sponsored groups will be able to completely destroy corporate giants overnight. When they see empires around them begin to fall they will either start caring or become a casualty of cyberwarfare.
Re:So, the flaw is the user forgot to set the lock (Score:4, Interesting)
I think the main point is that people don't realize that they have a "lock" that they need to change the combination on. Perhaps with additional education people can "check their sh*t" and see if it needs to be changed. Then the bad actor can just look under their keyboard for the PW, but at least it won't be "admin" anymore.
Re:So, the flaw is the user forgot to set the lock (Score:4, Insightful)
Bad analogy. The difference here is once the attacker turns on remote monitoring, it occurs silently. There's no indication that it's happened and no way to recover. If you forget the combination to your safe, then 1) it's obvious and 2) you can still retrieve the contents in other ways.
This is not just a case of "stupid user". It's a poor design on Intel's part. Intel handed them a loaded shotgun with a hair trigger pointed directly at their foot.
Re: (Score:2)
Now why would you go and destroy the crux of his incredibly flawed and untrue statement with things like facts and experience?
What kind of argumentative strategy is that?!
Deadbolts and doorknobs have a security flaw! (Score:2)
Apparently it's now a "flaw" with Kwikset, Schlage, Yale locks if I don't turn the lever on the inside to the 'lock' position. These lock manufacturers must do something about this immediately!
Re: (Score:2)
I mean, when I buy a new gun safe or document safe for my home or office, it comes from the factory with a default combination. I have to set it to one of my choosing.
And what about when you buy a new electric frying pan? Do you remember to change the default factory passcode for one of your own? Or do you not even realize that your new frying pan has a passcode that needs to be set?
The latter is the situation with a huge number of PC buyers.
Re: (Score:2)
So, the "flaw" is that the user forgot to set the lock?
No, the flaw is that there is an extra subsystem living within the CPU which is enabled by default, whether you want it or not, listening on all your network ports and waiting for someone to come along with the default password and take over the system.
If the system had to be enabled manually by someone with physical access (and the BIOS password, if one is set) then it would be reasonable to expect the administrator to change the access codes. The same applies if the remote management capability were the p
AMD (Score:2)
Re: (Score:3)
Why? Their own equivalent is equally as shit. [slashdot.org]
Re:AMD (Score:4, Insightful)
Getting to the point where I'm going to have to dig out my old VIA-powered Wal-Mart PC [slashdot.org] to do my banking and such on to ensure security from hackers dropping javascript into my browser.
At the very least, the slow speed means I'll realize pretty quickly when someone is trying to use it to mine cryptocurrencies.
Basically a default password (Score:2)
Why does Intel suck so much? (Score:1)
Over the last few months, we've come to know that:
1) For years Intel has put a backdoor in hundreds of millions of CPUs, called "Management Engine"
2) That the aforementioned backdoor, besides being evil in itself, is also full of bugs
3) That their CPUs, because of some mentally diseased architectural features, somehow allow javascripts from a browser to read kernel memory, something that would have been inconceivable until a decade ago
4) ... and finally that Intel doesn't even want to refund customers for a
Re: (Score:2)
You are conflating intentional evil with unexpected problems. Both happened, but in separate incidents. E.g., the bugs in the management engine were unintentional.
Point 3 is unfair. You are describing Spectre, not Meltdown, and nobody expected Spectre. Intel (and others) had reason to expect Meltdown.
Point 4 is also unfair, but much less so. There's no way that Intel could replace the chips that are causing problems. Some of them come from discontinued lines of manufacturing, and many of them can't b
"by only -" (Score:3)
can be compromised in moments by someone with physical access to the computer -- even bypassing BIOS passwords, Trusted Platform Module personal identification numbers, and Bitlocker disk encryption passwords -- by rebooting the computer, entering its BIOS boot menu...
How do you bypass the BIOS password if you can't get to the BIOS boot menu, because you don't have the BIOS password? I don't think "brief physical access" covers "opening the case and pulling the CMOS battery".
Re: (Score:2)
How do you bypass the BIOS password if you can't get to the BIOS boot menu, because you don't have the BIOS password?
That is what is expressly addressed by this "vulnerability". You don't need to enter a BIOS menu to access MEBx, and if you have remote administration enabled in AMT you don't even need to be at the computer. Yet from there you can specifically change BIOS settings.
EZ way to cripple Intel AMT/ME (Score:2, Interesting)
Stop it's ability to send info. outward via router port filtering ports 16992-16995 + 623-625 Intel AMT/ME uses in a modem/router external to OS/PC.
Intel ME/AMT operates from your motherboard but has NO CONTROL OF YOUR MODEM/ROUTER!
(This stops it cold talking in/out permanently OR being able to remotely 'patch' it to use other ports by Intel OR malicious actors/malware makers etc.!)
Additionally, once you disable the AMT engine's software interface (ez via software like the unistaller for it & DisableAMT
Re: (Score:2)
I still wish you made a Linux version, or had capability with WINE
Re: (Score:2)
I've tried it in WINE, IIRC it doesn't make it through deduplication.
Not to sound like an ass, or trivialize your work, but it does seem like a fairly simple task from a programming standpoint IE one that WINE should be able to do (download and merge lists, save to a file) even though you may have to save it in the WINE drive, and install the file manually in Linux.
Cheers
This is why Russia makes their own chips (Score:1)
Russia invests enormous resources into making their own Elbrus chips which are based off of MIPS architecture. They are certainly lagging a few generations from the fastest process technology, but that's what you got to do if you don't want to have NSA backdoors in weapons systems: https://en.wikipedia.org/wiki/Elbrus_(computer)
Physical access isn't a software or hardwar breach (Score:2)
Find it hard to get worried. (Score:2)