I just saw this story on Wired discussing a new vuln called Plundervolt that compromises SGX by timing an undervolt causing a fault writing to the secure enclave to expose secrets.
https://www.wired.com/story/plundervolt-intel-chips-sgx-hack/
Unfortunately there's potentially bad news in there which should be important for us notebook users that like to undervolt to manage temps better. Intel's microcode update locks voltages to their defaults.
Not sure which Intel products are affected or which vendors they are talking about, but I do know these microcode updates are pushed through windows update.
We should keep an eye out, or perhaps there's more detailed info available out there for the manner in which the microcode update will be deployed.
-
This ZDNet article has more info, and thankfully maybe we can avoid the update or not enable the setting if we like having lower temps.
https://www.zdnet.com/article/new-plundervolt-attack-impacts-intel-cpus/
-
Well that's bad news... Thanks for posting this.
Wiki says SGX was introduced with Skylake, so Haswell is still safe (undervolted and overclocked it can keep up with even the latest chips, 10K Passmark EZ).
With locked voltages you'll never get maximum performance because Intel chips always run hot and throttle under full load (thanks in big part to laptop manufacturers and their "good enough" cooling). Another nerf to Intel.
I guess it's time to upgrade to AMD, hopefully Zen will come to mobile workstations. -
This is really bad news, is this will effect our DTR's Laptops with Desktop CPU's?
-
It affects all CPU's after and including the Skylake family, it will only affect those that have SGX turned on(off by default), but given that the current "fix" is to disable undervolting at the BIOS/micro-code level...
Thing is, its another glaring security hole, so Intel will pressure MS to bundle that micro-code into the windows micro-code DB so that Windows loads it before loading the OS, so, this will make us either live with that, or change the name of that file so that Windows wont update the micro-code during run time.
Also, will this lead to Intel flat out disabling undervolting/locking the MSR registers a lot in newer CPU's?
I would expect to see newer revisions of current models having this micro-code programmed at the factory and then nothing can be done to revert that..Ashtrix, joluke, hfm and 1 other person like this. -
Sent from my Pixel 3a XL using Tapatalkjoluke likes this. -
Starlight5 Yes, I'm a cat. What else is there to say, really?
I received a BIOS update today and applied it to both my Skylake machines. On undervolted laptop, it seems to hold according to HWInfo... SGX is off. Maybe it's just a coincidence and this particular fix was not included...
Vasudev likes this. -
Check micro-code revision with hwinfo.
Also, brand/model of the laptop?Vasudev likes this. -
I'm on B4 for Kaby Lake-H after last update from MS.
-
I'm on B4 too
-
IDK if AMD is immune to this attack or not, but if Intel and ARM are vulnerable it's likely AMD will need to respond to this attack as well.
Hopefully the CPU control tools offered by each vendor - Intel XTU, AMD Ryzen Master, ARM? - will be able to have exceptions to make tuning changes even if such tuning is locked away from user processes.Last edited: Dec 12, 2019hfm likes this. -
Starlight5 Yes, I'm a cat. What else is there to say, really?
-
Fire Tiger Notebook Deity
Is there anyway to tell if we're impacted by this or if the fix has been applied?
Starlight5 likes this. -
Plundervolt?
Man.. they really need to come up with a cooler and more 1337 name for this one, something that goes well with Spectre and Meltdown. For that trifecta of exploits.
Something like 'undercore' or 'maelstrom'hmscott likes this. -
Watch out, they know where you live thanks to the IMEAshtrix, Vasudev, hmscott and 1 other person like this. -
-
I wonder what ODM notebook manufacturers that will screw up and fully lock bios first...
http://forum.notebookreview.com/threads/the-throttlestop-guide.531329/page-1076#post-10974273 -
I'm wondering how system builders that have started undervolting by default are going to do. i.e. Apple and Razer I think.
Probably time for intel to stick one extra character on some of these model numbers so they can release a chip undervolted from the factory that's guaranteed to run at -100mV.Vasudev and tilleroftheearth like this. -
I'm happy letting the automation find the highest best optimizations for performance - while automatically tuning for stability in real-time. We shouldn't need to do that manually - it's really a waste of time - that takes time away from the real reason we have the PC - to do work and play games. Intel should have been doing that all a long.Last edited: Dec 16, 2019 -
Just waiting for someone to reverse engineer intel microcode...
hmscott likes this. -
Trying to mess with MSR this morning on my Intel laptop :
Well, ok. Time to build an AMD rig.Last edited: Dec 15, 2019 -
At most Intel ME for 65/75 series chipsets was half reversed, thats why me_cleaner exists:
https://github.com/corna/me_cleaner
And its known that Intel CPU's run a Minix OS inside them while running with at least -2 ring access(aka everything, and a couple levels above admin/sudo), if someone ever cracks it, Intel is just done, because who cracks it just has the keys to every Intel CPU on earth due to the remote access tools that Intel ME provides..hmscott likes this. -
That might attract some bad attention though. I am unfortunately not big into programming, despite doing some of that long ago. Really though, whats the most anyone has tried? I find it hard to believe someone hasnt tried doing their own OS mapping doing it piece by piece with an older laptop kind of like how people reverse engineer older hardware for fun.
-
Why a microcode update? Doesn't bit 20 of MSR 0x194 work anymore to lock voltage settings until reboot? Would overclocking into instability also produce similar results with this vulnerability?
If this is all there is to worry about after 6 years then personally that's a relief although still a nuisance. My personal concern was for something like "killervolt" ( a play on kilovolt too). Just made up that name so don't bother googling itNot undervolting the CPU but maliciously overvolting it into oblivion!
-
hmscott likes this.
-
The Attacker will want their Victim to remain oblivious and complacent.
Last edited: Dec 23, 2019 -
-
Once past intrusion and marking coup - leaving their mark on the Victim's computer or account, in the beginning the payload was the replicant and means for propagation to the next Victim's computer.
There are many means and motivations along the way to today. But data gathering was always a component as it is necessary to see what is out there and report back the findings.
Today much of this is streamlined and simplified down to the goals and no trace is left behind in operation.
Here's a brief history, there's so much more info out there, but it's a good review of early times to the current time of the article:
Nov. 10, 1983: Computer 'Virus' Is Born
IM ZETTER, 11.10.09 12:00 AM
https://www.wired.com/2009/11/1110fred-cohen-first-computer-virus/
"...Viruses have proliferated rapidly since then, and malware has become more sophisticated and more vicious. The motives of malware writers have changed as well – instead of doing annoying tricks to your computer to get attention, the majority of programs sit stealthily on your computer to steal data, siphon money from online bank accounts or turn your system into a zombie for spam-spewing botnets."
And, that article was from 10 years ago... much has happened since then.Last edited: Dec 23, 2019 -
I'm on D4 and my PC performance is bad when CPU usage is capped at 100%.Last edited by a moderator: Dec 23, 2019Starlight5, hfm, hmscott and 1 other person like this. -
-
Seems you've made up your mind on this and that's fine, it's your prerogative and I sincerely hope your right that we won't see some CPU killing malware. Best of luck with that, I myself will continue to set my voltages as I want them and lock them afterwards without any special microcode and zero performance loss. I thought some others might want to do the same or at least comment on whether the locking still works on newer processors, seems I'm wrong. Oh well, my bad.
P.S. Wishing all a Merry Xmas. -
If it becomes the default to lock the voltage after tuning, why not? It's not been done because we haven't had a need for it for decades of undervolting.
Why? Because we know from experience that overvolting causes instability and a halt to processor operation before the CPU will be damaged.
Even if the CPU voltage was raised into the "danger zone" - high enough to be deleterious in the long term, that high voltage will show up as system instability when users game or run CPU intensive activities.
It's a self alerting problem - "hey, why has my PC started crashing?" or "hey, why has my CPU temperature gone into thermal throttling?"
BTW, back in 1983 were you directly involved in exposing vulnerabilities, making defenses for them, and tracking and prosecuting intrusions? If not then maybe I've had a bit more experience in this than you have?
I also didn't say you were young - as that hardly matters. There may be far more people my age that don't know what the history of viruses are - but being young is no substitute for experience.
As time went by more and more people entered the internet and became more and more savvy, but few of them had direct experience with vulnerabilities and implementing mitigations for defenses for computer intrusions.
Most people don't deeply explore the technical side of virus's, vulnerabilities, and overclocking deep enough to know what's what.
It's taken decades for young people to be born into it so to speak after I started on vulnerabilities and mitigations. Even so they really won't know what's what any more than anyone else that doesn't directly work in the field - with enough hand's on in the defense of intrusions.
I was fortunate in that I was directly involved in defense against intrusions with mitigations in the mid-70's onward, so I have a direct hands on knowledge of what's what with what was done back then through the present.
I'm also certainly not saying overvolting can't cause problems, but more than likely it's going to cause instability long before it kills the CPU or does damage to any other support hardware.
Every CPU is different, even if the range is known the exact window of instability can be much lower than other CPU's and those canaries will crash and alert the community on what to look out for and mitigations can be implemented quickly and distributed quickly through anti-virus and anti-malware distribution.
For example Norton Updates every few hours and quicker through community updates. So scans to find the offending malware can be quickly done and the offending code quarantined. And, so do most other defenses these days.
But, just because I can't see the need for it, that doesn't mean it wouldn't be fun to explore and do, so go for it. There's a lot of unneeded work going on out there, most of it in fact, but that's a good way to learn and gain experience for the things that really matter later on down the road.
There may not be any choice coming up if Intel itself locks the voltage such that no one can change the voltage. Hopefully Intel will allow changing the voltage in the BIOS before the hand off to the OS. New CPU's will have built in firmware changes onboard, we won't be able to disable voltage locking, and that will change everything.
Happy Holiday'sLast edited: Dec 24, 2019Starlight5 and hfm like this. -
But, there are examples of people that through constantly abusing the CPU through overvolting for overclocking where the CPU eventually fails. It's not happened to me, but I have seen it reported.
I don't think that can be bottled into a payload that could do that with every CPU as it would need to be an automated fine tuning of voltage to constant and steady high voltage abuse over a long period - finding that sensitive point that would work enough to run but be too high to be safe for the CPU wouldn't be possible without a lot crashes and reboots.
It wouldn't be something that would be triggered immediately causing a CPU to fail, it would need to happen over time. Enough people would notice the performance hit from thermal throttling, or get alarms for over temp, or get crashes from instability and alert the malware community to find a mitigation and deploy it.
It's an interesting possibility, but in actual practice I don't think it's going to be an issue or cause mass CPU failures.Starlight5 and hfm like this. -
No one interested in building malware would waste their precious time with a project like this without some type of real payoff. Doing something like targeted data exfiltration or crypto-currency mining would actually have a payoff for your time spent.
There's much easier ways of destroying someone's day with malware like erasing their data or encrypting it like the ransomware that bad actors are using. Doing that would be WAY easier than trying to fry a CPU.Starlight5 and hmscott like this. -
External Researchers informed Intel of a potential vulnerability that could impact the security of Intel® Software Guard Extensions (Intel® SGX). This issue may occur when using software that enables the user to alter voltage operating points.
Affected Products:
Intel® 6th, 7th, 8th, 9th & 10th Generation Core™ Processors. Intel® Xeon® Processor E3 v5 & v6 and Intel® Xeon® Processor E-2100 & E-2200 Families.
How is this potential vulnerability mitigated?
The BIOS updates mitigate the issue by locking voltage to the default settings."
_______________________
Intel has been aware of and working on this since notified in June 2019:
"Researchers from University of Birmingham, KU Leuven and TU Graz provided Intel with a Paper and Proof of Concept (POC) in June 2019 and researchers from Technische Universität Darmstadt and University of California provided a Paper and Proof of Concept (POC) in early August 2019. Intel subsequently confirmed each submission demonstrated this individually.
Researchers from University of Maryland and Tsinghua University provided Intel with a Paper in late August 2019 describing this issue.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available."
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00289.html
And, Intel says these products are affected:
" Affected Products:
Intel® 6th, 7th, 8th, 9th & 10th Generation Core™ Processors. Intel® Xeon® Processor E3 v5 & v6 and Intel® Xeon® Processor E-2100 & E-2200 Families."
Which is pretty much all Intel CPU's we are using today and for the last decade, much like the Spectre and Meltdown, MDS etc etc etc.
Intel lists the Vulnerability Details:
" Vulnerability Details:
CVEID: CVE-2019-11157
CVSS Base Score: 7.9 High
Description: Improper conditions check in voltage settings for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege and/or information disclosure via local access."
And Intel has already released the mitigation as a firmware update sent out to vendors to include in their next BIOS update, so it's out there and live now - the firmware mitigation could be included in future BIOS updates - and included in Microsoft Updates too:
Intel® CPU Voltage Settings Modification Advisory, Disclosed December 10, 2019
https://www.intel.com/content/www/us/en/support/articles/000055804/processors.html
" General Q&A: (shortened)
What is the issue?
External Researchers informed Intel of a potential vulnerability that could impact the security of Intel® Software Guard Extensions (Intel® SGX). This issue may occur when using software that enables the user to alter voltage operating points.
How is this potential vulnerability mitigated?
The BIOS updates mitigate the issue by locking voltage to the default settings.
Is this issue linked to any specific operating system (OS) type or is the issue independent of OS types and versions?
This issue is independent of the OS type and version.
Can I still overclock?
Intel recommends you contact your system manufacturer to determine if your system supports overclocking.
My system manufacturer does not have any update available yet, what should I do?
Unfortunately, Intel cannot dictate nor control when our ecosystem partners release updated BIOS or driver files. We recommend that you request an estimate on when the update will be available."
This vulnerability is only one of 11 advisories issued by Intel in December 2019:
IPAS: SECURITY ADVISORIES FOR DECEMBER 2019
https://blogs.intel.com/technology/2019/12/ipas-security-advisories-for-december-2019/
Here's one of the sources of the discovery of the vulnerability:
Undervolting allows attacks on Intel's secure enclaves
Posted on 11 Dec 2019
https://www.birmingham.ac.uk/news/l...allows-attacks-on-intels-secure-enclaves.aspx
Sorry if I've repeated anything already posted, I'm trying to summarize after catching up, hopefully it helps someone else too.Last edited: Jan 1, 2020hfm, Vasudev, 0lok and 1 other person like this. -
-
hfm likes this.
-
MahmoudDewy Gaming Laptops Master Race!
If the microcode update was bundled in a Windows update, would that disable bios undervolts?
According to the article the issue could arise when using a SW to undervolt ... I personally undervolt in the Bios, so unless I do a bios update with the new microcode, I don't think windows can overwrite that.Vasudev likes this. -
Just a clarification, does the Plundervolt <strike>fix<strike> patch disable undervolting on a software-only basis? If I have an unlocked BIOS which allows voltage adjustments within the advanced CPU settings, will I be locked out by a windows update? I'm not going to update my BIOS, just preparing in case a windows update comes along.
If I disable Software Guard Extensions in the BIOS, will that prevent Windows Update from identifying my laptop as vulnerable?
My 7Y30 is on 0x8E btw.
View attachment 181228 -
Either way the goal is to lock out exploits depending on voltage tuning induced instability. Done in the BIOS is the more sure method, but that will take vendors time to integrate. The Windows Update to patch firmware at boot time can be distributed much quicker - but no word as to when either will hit.
What is concerning is that the plundervolt firmware voltage tuning lock down could be the start of a trend to lock out other user tuning that could lead to similar instability induced data exposure.
Some have already complained about BIOS update killing their undervolt - but so far it has all been false alarms. We should hear the real effects of the firmware patch from users soon if Intel's notice is to be taken literally.
When the BIOS update hits, IDK if Intel will lock out voltage changes as it's handing off to the OS or if it will also lock out user set BIOS voltage settings already existing - that would seem a bit harsh.
But, if Intel is trying to lock down the voltage setting to what is guaranteed stable - keeping the end user from inducing instability before Intel has a chance to lock out such changes - then I would assume Intel will want to lock out voltage tuning in the BIOS as well.
We'll have to wait for Intel's implementation of the mitigation to show up to know for sure how strict it will be.MahmoudDewy and Che0063 like this. -
MahmoudDewy Gaming Laptops Master Race!
In case a new vulnerability that would necessitate a bios update is discovered, I will have to weigh the pros/cons then.0lok likes this. -
Another user report...
Intel XTU and ThrottleStop no longer working to undervolt Xeon E-2186m after firmware update
http://forum.notebookreview.com/thr...lt-xeon-e-2186m-after-firmware-update.831546/
joluke likes this. -
If you disabled SGX in BIOS, nothing happens to undervolt values since SGX is disengaged and undervolts higher 230mV will work now w/o calc errors! If you enable SGX (Stock locked BIOS has it enabled dating back to 2012/2013 on supported hardware vPro/Non-vPro) undervolts will be locked out but for max security and A51M like white smokes if your CPU is already throttling due to Superior Cooling design(pun, intended). -
Microsoft "fixed" this with a firmware patch on the Surface Laptop 3. No undervolting possible now.
https://www.reddit.com/r/Surface/comments/ex7de6/new_surface_firmware_released_breaks_undervolting/ -
Vasudev, Papusan, hmscott and 1 other person like this. -
Microsoft is probably the worst of them all!
What a beauty from the link... “just lost about 40% sustained performance as the new firmware now forces wattage back down to 15watts and isn't respecting my TDP settings”. Yeah, this sucks pretty hard.Vasudev, jclausius, Mr. Fox and 1 other person like this.
Plundervolt Intel microcode update potentially killing undervolting for security?
Discussion in 'Hardware Components and Aftermarket Upgrades' started by hfm, Dec 10, 2019.