Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Intel Operating Systems Privacy Security Software

Researcher Finds Another Security Flaw In Intel Management Firmware (arstechnica.com) 87

An anonymous reader quotes a report from Ars Technica: Meltdown and Spectre are not the only security problems Intel is facing these days. Today, researchers at F-Secure have revealed another weakness in Intel's management firmware that could allow an attacker with brief physical access to PCs to gain persistent remote access to the system, thanks to weak security in Intel's Active Management Technology (AMT) firmware -- remote "out of band" device management technology installed on 100 million systems over the last decade, according to Intel. [T]he latest vulnerability -- discovered in July of 2017 by F-Secure security consultant Harry Sintonen and revealed by the company today in a blog post -- is more of a feature than a bug. Notebook and desktop PCs with Intel AMT can be compromised in moments by someone with physical access to the computer -- even bypassing BIOS passwords, Trusted Platform Module personal identification numbers, and Bitlocker disk encryption passwords -- by rebooting the computer, entering its BIOS boot menu, and selecting configuration for Intel's Management Engine BIOS Extension (MEBx).

If MEBx hasn't been configured by the user or by their organization's IT department, the attacker can log into the configuration settings using Intel's default password of "admin." The attacker can then change the password, enable remote access, and set the firmware to not give the computer's user an "opt-in" message at boot time. "Now the attacker can gain access to the system remotely," F-Secure's release noted, "as long as they're able to insert themselves onto the same network segment with the victim (enabling wireless access requires a few extra steps)."

This discussion has been archived. No new comments can be posted.

Researcher Finds Another Security Flaw In Intel Management Firmware

Comments Filter:
  • by ArtemaOne ( 1300025 ) on Friday January 12, 2018 @05:15PM (#55918183)

    Totally different things. I imagine they find software and firmware vulnerabilities all the time. Hardware is difficult to patch around, and obviously comes with the noteable performance hit.

  • by ELCouz ( 1338259 ) on Friday January 12, 2018 @05:18PM (#55918203)
    I hope heads will roll...but like always...never happens! I could even imagine an increased sales for the new generation of Intel processor with the meltdown flaw fixed. smh
    • These are programming flaws. Programmers are never held accountable for anything. Every time something like this is reported folks on here make up every excuse why it's not the fault of the programmer.

      Watch.

      • How is this even a flaw?
        It's a case of default state + physical access == ownership.
        This is nothing new at all.

        • by ELCouz ( 1338259 )
          Agree this is not a flaw but talking about Intel design in general...we haven't heard any good news about AMT , Intel CPU design and the whole Intel Press Relations in denial.
          • I don't particularly see this as bad engineering even.
            The thing ships disabled by default and with a default local only pwd to enable it OR lock out other access.
            It can be disabled in the BIOS (and then the BIOS pwd activated) as well.
            The config guide even says setting the password is a non optional step in any multi user/multi access environment, or you can get a sku where it's not even available.

            no different than leaving the BIOS unlocked. I could boot a USB device that installs a rogue bootloader on the

          • Here's the good news about AMT and vPro: You can spend $30/system to have vPro on it, you can mass-configure with software Intel provides for free (but you need to buy a signed certificate specifically for AMT provisioning that matches your DHCP's DNS suffix for it to work), and then you can remotely reboot provisioned hardware from ISO images to reimage hardware from anywhere in the world, if you have granted access. It just needs to be on your network, and this includes notebooks that are wireless only.

            • by ELCouz ( 1338259 )
              I don't know why you are in defensive posting. Never talked about flaws. Just the whole AMT is a fiasco because it has no use outside work environment yet imposed on consumer products WHICH most will never update the AMT firmware because they don't know how. If you followed Intel in the past two months you will know what I'm talking about. I'm not talking about BIOS or default user/pw value there.
    • I guess using shit that incompetent admins spent extra money for and then left wide open by never configuring is now Intel's fault? This is the manual single-machine way to provision AMT / vPro. The only way this is a "flaw" is because the monkey in IT either didn't know what they were buying, or didn't bother to actually use what they were sold. By the way, once AMT / vPro are configured in any way (and if the admin of a machine is at all smart, they are doing this through a software provisioner when in

  • If you have physical access you can do anything...
    • If you have long term physical access you can do anything...

      FTFY. by the sound of this flaw, the amount of physical access needed is negligible.

      Think about all the times you step away from a live PC every day; if the amount of physical access needed is trivial (say, 2 seconds to plug in a flash drive and let a script run), a bad actor masquerading as the maintenance guy could easily compromise every machine in your office in the time it takes to get a fresh cup o' Joe.

      • by HiThere ( 15173 )

        To me it sounds more like 5 minutes to half an hour. But it also sounds as if there is no recovery.

      • Or you could just have the IT guy provision it when he does all the other crap to the machine before it's deployed, and it's no longer a concern. Also, in addition to being immune to this "flaw", you get the remote administration and monitoring advantages of AMT! How about that!

    • by Lunix Nutcase ( 1092239 ) on Friday January 12, 2018 @05:39PM (#55918307)

      Not if the system wasn’t left open with a weak password default.

    • by AHuxley ( 892839 )
      Recall the TAO CPU logo slide from the https://leaksource.wordpress.c... [wordpress.com] and the role of Tailored Access Operations.
    • by green1 ( 322787 )

      Do you require a password to log in locally? If so, why? after all, if someone has physical access they can do anything anyway, so why bother?

    • by DeBaas ( 470886 )

      If you have physical access you can do anything...

      In this case if you have physical access you can enable remote access and hide it. Anyone that handled the system before it arrived at your site and was placed in the rack could have done that.
      Obviously it can be remedied by disabling it yourself, but I'm pretty sure not many companies are already doing that.

  • by El Cubano ( 631386 ) on Friday January 12, 2018 @05:33PM (#55918277)

    If MEBx hasn't been configured by the user or by their organization's IT department, the attacker can log into the configuration settings using Intel's default password of "admin." The attacker can then change the password

    So, the "flaw" is that the user forgot to set the lock? I am stunned that this is considered a vulnerability/flaw. I mean, when I buy a new gun safe or document safe for my home or office, it comes from the factory with a default combination. I have to set it to one of my choosing. If I choose to not change the default combination, then that is on me.

    Now, you might argue that it should be more like keyless entry for an automobile: the manufacturer sets a code a and provides you a device (key fob) for entry. However, if Intel did that, they would be accused of making their products difficult to use or crippling them (because people would certainly lose their AMT key fobs and Intel would either be unable to recover them, or would charge a fee for the service) or taking advantage of the user (because they would certainly lose the key fob). Plus, that would make it an absolute nightmare for central IT, the target audience for this particular feature.

    The point is that if you are buying machines that have this capability, then you are buying mid-range to high-end business/professional stuff. AMT is not available on entry-level and most consumer gear. Besides, the people who don't bother setting the MEBx password on their systems (assuming they don't have central management through IT) are probably the same sort of people who buy a wireless AP, turn it on and leave the password set to the default and the admin function accessible over the wireless interface.

    Intel has problems, but this one is definitely way down on the list.

    • by CanHasDIY ( 1672858 ) on Friday January 12, 2018 @05:45PM (#55918341) Homepage Journal

      I've worked in the IT field for 15 years - in academia, for financial institutions, for Fortune 500 companies, and at small, locally owned businesses.

      You would balk if you saw how many of the "top companies in America" don't give 2 shits about security, outside of whatever the latest CNN scare story is. I personally find it amazing how some of these corporations will spend tens of thousands of dollars on fancy security equipment.... that they never bother to actually configure.

      You can show your C-levels the lock and hand them the key, but you can't make them set the latch.

      • Equifax

      • You would balk if you saw how many of the "top companies in America" don't give 2 shits about security, outside of whatever the latest CNN scare story is. I personally find it amazing how some of these corporations will spend tens of thousands of dollars on fancy security equipment.... that they never bother to actually configure.

        You can show your C-levels the lock and hand them the key, but you can't make them set the latch.

        Absolutely! Except there is going to come a point in time where a concerted effort by a small nation-state sponsored groups will be able to completely destroy corporate giants overnight. When they see empires around them begin to fall they will either start caring or become a casualty of cyberwarfare.

    • by InvalidsYnc ( 1984088 ) on Friday January 12, 2018 @06:06PM (#55918447)

      I think the main point is that people don't realize that they have a "lock" that they need to change the combination on. Perhaps with additional education people can "check their sh*t" and see if it needs to be changed. Then the bad actor can just look under their keyboard for the PW, but at least it won't be "admin" anymore.

    • by eddeye ( 85134 ) on Friday January 12, 2018 @06:28PM (#55918591)

      So, the "flaw" is that the user forgot to set the lock? I am stunned that this is considered a vulnerability/flaw. I mean, when I buy a new gun safe or document safe for my home or office, it comes from the factory with a default combination. I have to set it to one of my choosing. If I choose to not change the default combination, then that is on me.

      Bad analogy. The difference here is once the attacker turns on remote monitoring, it occurs silently. There's no indication that it's happened and no way to recover. If you forget the combination to your safe, then 1) it's obvious and 2) you can still retrieve the contents in other ways.

      This is not just a case of "stupid user". It's a poor design on Intel's part. Intel handed them a loaded shotgun with a hair trigger pointed directly at their foot.

    • Apparently it's now a "flaw" with Kwikset, Schlage, Yale locks if I don't turn the lever on the inside to the 'lock' position. These lock manufacturers must do something about this immediately!

    • I mean, when I buy a new gun safe or document safe for my home or office, it comes from the factory with a default combination. I have to set it to one of my choosing.

      And what about when you buy a new electric frying pan? Do you remember to change the default factory passcode for one of your own? Or do you not even realize that your new frying pan has a passcode that needs to be set?

      The latter is the situation with a huge number of PC buyers.

    • So, the "flaw" is that the user forgot to set the lock?

      No, the flaw is that there is an extra subsystem living within the CPU which is enabled by default, whether you want it or not, listening on all your network ports and waiting for someone to come along with the default password and take over the system.

      If the system had to be enabled manually by someone with physical access (and the BIOS password, if one is set) then it would be reasonable to expect the administrator to change the access codes. The same applies if the remote management capability were the p

  • Shouldn't AMD benefit from this long term?
  • Millions of devices ship with default passwords. It is an issue only if it is not possible to change it, and the need to change is not clearly explained when it was shipped. Ideally it should not be the same password for all devices but something unique to each chip, given to the manufacturer as part of shipped chips.
  • by Anonymous Coward

    Over the last few months, we've come to know that:

    1) For years Intel has put a backdoor in hundreds of millions of CPUs, called "Management Engine"

    2) That the aforementioned backdoor, besides being evil in itself, is also full of bugs

    3) That their CPUs, because of some mentally diseased architectural features, somehow allow javascripts from a browser to read kernel memory, something that would have been inconceivable until a decade ago

    4) ... and finally that Intel doesn't even want to refund customers for a

    • by HiThere ( 15173 )

      You are conflating intentional evil with unexpected problems. Both happened, but in separate incidents. E.g., the bugs in the management engine were unintentional.

      Point 3 is unfair. You are describing Spectre, not Meltdown, and nobody expected Spectre. Intel (and others) had reason to expect Meltdown.

      Point 4 is also unfair, but much less so. There's no way that Intel could replace the chips that are causing problems. Some of them come from discontinued lines of manufacturing, and many of them can't b

  • by sheramil ( 921315 ) on Friday January 12, 2018 @06:30PM (#55918611)

    can be compromised in moments by someone with physical access to the computer -- even bypassing BIOS passwords, Trusted Platform Module personal identification numbers, and Bitlocker disk encryption passwords -- by rebooting the computer, entering its BIOS boot menu...

    How do you bypass the BIOS password if you can't get to the BIOS boot menu, because you don't have the BIOS password? I don't think "brief physical access" covers "opening the case and pulling the CMOS battery".

    • How do you bypass the BIOS password if you can't get to the BIOS boot menu, because you don't have the BIOS password?

      That is what is expressly addressed by this "vulnerability". You don't need to enter a BIOS menu to access MEBx, and if you have remote administration enabled in AMT you don't even need to be at the computer. Yet from there you can specifically change BIOS settings.

  • by Anonymous Coward

    Stop it's ability to send info. outward via router port filtering ports 16992-16995 + 623-625 Intel AMT/ME uses in a modem/router external to OS/PC.

    Intel ME/AMT operates from your motherboard but has NO CONTROL OF YOUR MODEM/ROUTER!

    (This stops it cold talking in/out permanently OR being able to remotely 'patch' it to use other ports by Intel OR malicious actors/malware makers etc.!)

    Additionally, once you disable the AMT engine's software interface (ez via software like the unistaller for it & DisableAMT

  • by Anonymous Coward

    Russia invests enormous resources into making their own Elbrus chips which are based off of MIPS architecture. They are certainly lagging a few generations from the fastest process technology, but that's what you got to do if you don't want to have NSA backdoors in weapons systems: https://en.wikipedia.org/wiki/Elbrus_(computer)

  • Rule 1 of security. Physical access trumps everything else. So you can't claim finding a defect that can be exploited physically is a breach. For that matter, someone could start plugging things into the motherboard. This just a lot of stupid hoopla. Everyone in OpenSource knows the REASON Open Source works is to bypass security through obscurity. Open Source DOES NOT and WILL NEVER (and neither will any security system) foil physical access 100% of the time. As for this - I've never even seen this option i
  • I find it hard to get worried about an exploit which requires physical access to the machine because if a hacker has that it pretty much means it doesn't matter what you've done and whether or not an exploit exists they're going to be able to get access to your data. Once a hacker has physical access to your machine it is pretty much game over.

If all else fails, lower your standards.

Working...