Critical Flaws in Intel Processors Leave Millions of PCs Vulnerable
In past few months, several research groups have uncovered vulnerabilities in the Intel remote administration feature known as the Management Engine (ME) which could allow remote attackers to gain full control of a targeted computer.
Now, Intel has admitted that these security vulnerabilities could "potentially place impacted platforms at risk."
Intel-SA-00086 Detection Tool
-
-
-
hmscott likes this.
-
hacktrix2006 Hold My Vodka, I going to kill my GPU
Just downloaded the Tools and ran it.
Code:Based on the analysis performed by this tool: This system is vulnerable. INTEL-SA-00086 Detection Tool Application Version: 1.0.0.128 Scan date: 22/11/2017 00:48:12 Host Computer Information Name: GT72-6QD Manufacturer: Micro-Star International Co., Ltd. Model: GT72 Processor Name: Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz OS Version: Microsoft Windows 10 Pro Intel(R) ME Information Engine: Intel(R) Management Engine Version: 11.0.0.1173 SVN: 1 Copyright(C) 2017, Intel Corporation, All rights reserved.
-
-
-
Everyone is vulnerable. Even my brand new desktop. But, honestly... don't lose any sleep over it. I am definitely not going to. I don't even use antivirus software. I think the media is making a bigger deal over this than we need them to. But, I agree that Intel ME should go. We never needed it as a dependency in the first place, and I think we would be just fine if they eliminated it.
Papusan, tilleroftheearth, KY_BULLET and 1 other person like this. -
Affected Intel Products
Below is the list of the processor chipsets which include the vulnerable firmware:
- 6th, 7th and 8th Generation Intel Core processors
- Xeon E3-1200 v5 and v6 processors
- Xeon Scalable processors
- Xeon W processors
- Atom C3000 processors
- Apollo Lake Atom E3900 series
- Apollo Lake Pentiums
- Celeron N and J series processors
-
hacktrix2006 Hold My Vodka, I going to kill my GPU
Sent from my SHIELD Tablet K1 using Tapatalk -
Could one simply uninstall the ME driver or disable it in device manager or disable in the BIOS and forget about it? Ran the vulnerability tool on my m18x r1-> r2, says it is not vulnerable. another old alienware win lol
SkidrowSKT, Papusan, Ashtrix and 4 others like this. -
hacktrix2006 Hold My Vodka, I going to kill my GPU
Sent from my SHIELD Tablet K1 using TapatalkVasudev likes this. -
-
vikram0136, DreDre, KY_BULLET and 9 others like this.
-
Vasudev likes this.
-
yrekabakery Notebook Virtuoso
-
-
yrekabakery Notebook Virtuoso
-
I just want to say that, not only Intel are doing such things, I would say every single technology owner are doing the same with different ways, the hardware and software companies are all the same, serving the same master at the end.
-
Last edited: Nov 22, 2017Papusan, Ashtrix, Vasudev and 1 other person like this.
-
How to remote hijack computers using Intel's insecure chips: Just use an empty login string
Exploit to pwn systems using vPro and AMT
By Chris Williams, US editor 5 May 2017 at 19:52
https://www.theregister.co.uk/2017/05/05/intel_amt_remote_exploit/
"How bad is this bug? Pretty bad. "The exploit is trivial, a maximum of five lines of Python, and could be doable in a one-line shell command," said SSH inventor Tatu Ylonen.
"It gives full control of affected machines, including the ability to read and modify everything. It can be used to install persistent malware – possibly in the firmware – and read and modify any data. For security servers, it may allow disabling security features, creating fake credentials, or obtaining root keys.
"Disable AMT today. Mobilize whomever you need. Start from the most critical servers: Active Directory, certificate authorities, critical databases, code signing servers, firewalls, security servers, HSMs (if they have it enabled). For data centers, if you can, block ports 16992, 16993, 16994, 16995, 623, 664 in internal firewalls now.
"If you have anything connected to the Internet with AMT on, disable it now. Assume the server has already been compromised.""
"Intel has published some more info on the vulnerability here, which includes links to a tool to check if your system is at-risk, support contact details, and a list of mitigations to reduce the threat. That tool is apparently Windows-only; there's info here for Linux peeps.
There is also this third-party tool, here, for disabling AMT from Windows."
"We're told the programming blunder is present in various, but not all, Intel processor chipsets from today's Kaby Lake family back to silicon sold in 2010: it mainly affects business PCs, professional workstations and small servers, rather than devices aimed at normal folk. However, Chipzilla admitted today that "consumers and small businesses" may end up using processors with the vulnerable tech present."
Hey, why not....
Intel AMT Vulnerability Shows Intel’s Management Engine Can Be Dangerous
by Lucian Armasu May 2, 2017 at 6:45 AM - Source: Intel Security Center
http://www.tomshardware.com/news/intel-amt-vulnerability-me-dangerous,34300.html
"Intel published a security advisory about a vulnerability that affects Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT) software. The company also released detection and mitigation guides, but the firmware updates would have to come from OEMs. The vulnerability shows that Intel ME's out-of-bound functionality, such as installing software remotely on PCs, could pose serious dangers to systems, as some free software activists have already warned."
All of this has led free software activists, such as those working on Libreboot (a free software alternative to UEFI), to brand it a “backdoor.” Even without considering it a backdoor, the Libreboot founder has argued that the capabilities of Intel ME can be exploited by others once vulnerabilities in it are found"
And, now it came to be...you can click on images in this post for more info...Last edited: Dec 1, 2017 -
I find it funny that Intel people here who tout the chips and makers words are the gospel just ignore them when they do not like what is being said to them by the company. Same happened from them from the last bug too. Who cares if everyone else is at risk, they just want those over clockable chips to keep flowing into the market.
-
Mitigation guide for Intel AMT exploit https://mattermedia.com/blog/disabling-intel-amt
Source: Intel Fixes Critical Bugs in Management Engine (affecting 6th, 7th, 8th Generation Core™ CPUs) -
" UPDATE3: There is now a tool to check whether AMT is enabled and provisioned on Linux systems.
UPDATE2: It gets worse. Much worse. If your Windows laptop runs #IntelAMT, and you enable #WiFi for AMT and you connect to public WiFi AMT is accessible to anyone on that network.
UPDATE1: The vulnerability is now called “ SILENT BOB IS SILENT” and is worse than imagined – an attacker can bypass authentication and log on to Intel AMT remotely simply by sending an empty password (a NULL HTTP Digest response). Furthermore:
“The exploit is trival, max five lines of Python, could be doable in one-line shell command. It gives full control of affected machines, including the ability to read and modify everything. It can be used to install persistent malware (possibly in firmware), and read and modify any data. For security servers, it may allow disabling security features, creating fake credentials, or obtaining root keys. … IT folks, KEEP WORKING THROUGH THE WEEKEND, DISABLE AMT NOW or block access to it. This can get ugly.”"
And, don't forget, even with AMT disabled, Intel ME is still there chugging along just waiting for something to drop in and say "Hi!" Like a USB device... -
KY_BULLET, Ashtrix, electrosoft and 2 others like this.
-
I already uninstall the IME,
Anyone knows if Clevo will provide any Intel Management Engine 11.8 Firmware update.
EDIT: Or maybe we need help from @Prema to do something about it.Last edited: Nov 22, 2017 -
-
Intel® Management Engine Critical Firmware Update (Intel SA-00086)
Resources from system manufacturers
Note Links for other system manufacturers will be provided when available. If your system manufacturer is not listed, contact them for information on the availability of the necessary software update.
- Acer: Support Information
- Dell Client: Support Information
- Dell Server: Support Information
- Fujitsu: Support Information
- HP Servers: Support Information
- Intel® NUC, Intel® Compute Stick, and Intel® Compute Card: Support Information
- Lenovo: Support Information
- Panasonic: Support Information
- Clevo...????!!! Zzzz
steberg likes this. -
KY_BULLET, Ashtrix, hacktrix2006 and 2 others like this.
-
-
Falkentyne Notebook Prophet
Allow me to quote an old post over on OCN back in 2006, when the "SMM" bug regarding #Prochot or #thermtrip on Pentiums could allow evil satanic hackers to take over your PC !!!
KY_BULLET, Papusan, Dr. AMK and 1 other person like this. -
These are totally different issues, and totally different exposures to people's PC's, not comparable at all.Last edited: Nov 22, 2017Dr. AMK likes this. -
And, to be clear, UEFI is not the problem in and of itself. It's the payload of optional Nazi control freak feces that it carries (and more of which will be carried in the future) that is 100% unnecessary filth. All of the nasty excrement enthusiasts despise is made possible by UEFI, but only because it is abused by people that view themselves as having the right to play god and want us to pretend we love them.
They like to sugar-coat it, but it all boils down to the ODM/OEM being able to control what we do, and for Micro$loth to control what OS we do it with.
Last edited: Nov 22, 2017 -
I would call this TR lot of things but not an anemic piece of garbage. In fact I do not see any of the Ryzen systems as such. You guys can defend Intel here all you want but no one is buying it. Not worrying about what could happen is what security is all about. The fact you say it should be overlooked greatly tarnishes any other words of wisdom you guys intend to make.
But I guess you are right, the faster the CPU, the faster they can get the data off the system! -
Falkentyne Notebook Prophet
Suggest you jabronis patch your systems anyway.
I just patched my BGA Throttlebook.
https://www.win-raid.com/t596f39-Intel-Management-Engine-Drivers-Firmware-amp-System-Tools.htmlPapusan, Dr. AMK, Mr. Fox and 1 other person like this. -
Wouldn't that be a great Holiday Present for the Holiday of the Future...:
"AMD buys bankrupt Intel for pennies on the dollar, and AMD proceeds to bulldozer all Intel properties into the ground, turning them into Beautiful Green Parks for all to enjoy."
"10 years after...
...AMD releases x86 Intellectual Properties into the public domain, unique and individual CPU's made for pennies, driven by AI-based Silicon Printers, bring the world into the next Bright Age of Enlightenment."
Wait, what?!! Did I fall asleep? Man, that Turkey was Goooood!! Wait, what?!! Thanksgiving is tomorrow you say?Last edited: Nov 22, 2017 -
-
Android and iOS are not even real computing solutions so usually are not considered in other than the most rudimentary of tasks. BGA crap, well we know who makes that at present.
-
-
openpilot Demo from Web Summit
Super Hacker George Hotz: I Can Make Your Car Drive Itself for Under $1,000
"George Hotz, known online as GeoHot, became one of the world's most famous hackers at 17 when he was the first person to break into the iPhone and reconfigure it to be compatible with providers other than AT&T. He was also the first to jailbreak the PlayStation 3, allowing users to play with unauthorized software.
Now this 28-year-old technical wunderkind is up against Waymo, Tesla, Uber, and most of the auto industry in the race to build the first fully operational autonomous vehicle.
"I want to win self-driving cars," Hotz told Reason. Whereas Tesla and Waymo are developing complex systems with expensive LIDAR and other sensors, his company, Comma.ai, is trying to bring plug-and-play driverless technology to the masses. "We're running it on a phone," says Hotz.
He's taking an approach drastically different than his well-financed competition, and is operating with $3.1 million in seed money. Comma's dozen-member team, which works out of a residential house in San Francisco, has built technology that takes over the existing RADAR and drive-by-wire systems in modern cars, incorporates a smartphone's camera and processor, and then makes the car drive itself.
"Google is going to lose because there's no market for a $100,000 system," says Hotz. "For us, we're just going to push the software update. And then—boom—you don't have to pay attention anymore. Done."
Hotz has a history of taking on tech titans, with mixed reactions. After the iPhone jailbreak, Apple co-founder Steve Wozniak sent him a letter of congratulations. After he hacked the PS3, Sony sued him. Hotz quickly became a cause celebre of so-called hacktivist groups including Anonymous and LulzSec. They attacked Sony's network, despite Hotz's protests, igniting a firestorm of legal and media scrutiny.
Comma.ai is Hotz's attempt to take on the big players in a new way. The company makes an app called Chiffr that turns a user's phone into a dashcam and monitors its GPS and accelerometers. Now Comma is launching Panda, an open source, $88 dongle that plugs into the car, links it to the phone, and puts out fine-grain detail about every aspect of a drive. Hotz ingests all the data from Chiffr and Panda users and feeds it to his artificial intelligence system, which then learns how to drive.
According to Hotz, this approach gives him significant advantages over competitors such as Waymo. His network is entirely crowdsourced and running on some of the most popular cars in the country. He doesn't need to build another expensive, specially designed vehicle and employ a trained driver and an engineer every time he wants to add another data point. And all his data come from real-world experience.
Hotz says Waymo and others take a rule-based approach to driving that doesn't reflect the reality of how people operate cars. "The humans ain't changing to match the self-driving spec," he says. "In order to really get access to the full, diverse spectrum of what driving is, you need a huge crowdsourced database."
While Tesla's training model is more closely aligned with his, Hotz says the company will similarly be restricted to the high-end market. He got into a public spat with Tesla founder Elon Musk in 2015, after Hotz says the mogul changed the terms of a deal for him to build a better vision system for Tesla's Autopilot than the one supplied by partner company Mobileye. Musk claims Hotz bragged that he could build a better system, and then welched on the bet.
"All I said was I could build a better vision system than Mobileye, myself, in 3 months," replies Hotz. "And I kind of did that.""
https://reason.com/reasontv/2017/10/27/george-hotz-self-driving-autonomous-car
Building a Self Driving Car | EP 1 (comma neo w/ openpilot)
Building a Self Driving Car | EP 2 (comma neo w/ openpilot)
Building a Self Driving Car | EP 3 (comma neo w/ openpilot)
Comma.ai launches an $88 universal car interface called Panda
https://comma.ai/
https://twitter.com/comma_ai
https://www.youtube.com/channel/UCW_9Y89RuQQFwMwSRLcI2fg/videosLast edited: Nov 22, 2017Dr. AMK likes this. -
And, they already have "laptops" with ARM processor trash and Chromebooks are paving the path to notebook hell for everyone. Give 'em an inch, they'll take a mile. We are already seeing ample evidence that the road to hell is paved with laptops built like smartphones. No thank you.Last edited: Nov 23, 2017 -
-
A damn shame, BUT I guess I'm happy that I/we at-least got to see what freedom and choice looked like.
More on this UEFI doomsday clock they started.
Idk what to think now, People just don't care they just are happy with those thin and light laced with that crippled POS Win10 or Shiny BGA machines, Future about @Prema mods, vBIOS mods of Pre-Pascal to Ngreedia Falcon Phase 2 needing more HW and extensive knowledge to Phase 3 with UEFI Firmware check else No boot for ya, We are past the phase of Voting with Wallet, It's not like we have to stop but to keep pushing it hard where ever we can & hopefully one day the Kool-aid crowd learns what they have been robbed off, the more essential part, Liberty.Papusan, Cass-Olé, Dr. AMK and 1 other person like this. -
-
So much for that... https://www.asus.com/us/Motherboards/ROG-MAXIMUS-X-HERO-WI-FI-AC/HelpDesk_BIOS/
tilleroftheearth, Cass-Olé, Starlight5 and 2 others like this. -
-
I actually found the updated firmware and flashed my desktop ME firmware before I thought to check for a BIOS update from ASUS. So, it was already flashed/patched before I updated the BIOS. -
alexhawker, ssj92, steberg and 5 others like this.
Critical Flaws in Computers Leave Millions of PCs Vulnerable
Discussion in 'Hardware Components and Aftermarket Upgrades' started by Dr. AMK, Nov 21, 2017.