UPDATED 21:06 EST / MAY 07 2017

INFRA

Intel chip vulnerability found to be far worse than thought

A security vulnerability in Intel Corp. chips first disclosed last week looks far worse than initially thought, as hackers can hijack Intel processors without even needing a password.

The vulnerability, which affects all Intel chips manufactured since 2008, from those code-named Nahalem to today’s Kaby Lake, stems from a flaw in vPro firmware suite including Intel Active Management Technology from versions 6 to 11.6. The security hole allows an unprivileged attacker to gain control of the manageability features provided by the firmware suite, giving a would-be hacker the same access that a systems administrator would have, including the ability to change boot up code and access the computer’s mouse, keyboard, monitor and programs installed.

Intel argued that access to the vulnerability was fairly limited, in that a password was required to access AMT. But Tenable Network Security Inc. has discovered that the verification process for AMT accepts a blank password submission.

As Rick Falkvinge at Private Internet Access explains:

In order to get administrator privileges to the server memory, all you needed to do was to submit a blank password field instead of the expected privileged-access password hash, and you would have unlimited and unlogged read/write access to the entire server memory.

With the ability to gain access to an Intel central processing unit as simple as submitting no password, experts are warning that the worst should be presumed.

“If you have anything connected to the Internet with AMT on, disable it now. Assume the server has already been compromised,” SSH inventor Tatu Ylonen said in a blog post. “The exploit is trivial, a maximum of five lines of Python, and could be doable in a one-line shell command.”

He said the flaw gives full control of affected machines, including the ability to read and modify everything. “It can be used to install persistent malware – possibly in the firmware – and read and modify any data. For security servers, it may allow disabling security features, creating fake credentials, or obtaining root keys.”

Ylonen recommended that AMT be disabled today and that affected users “mobilize whomever you need.” More specifically, he said, “start from the most critical servers: Active Directory, certificate authorities, critical databases, code signing servers, firewalls, security servers, HSMs (if they have it enabled).” Data center operators should “block ports 16992, 16993, 16994, 16995, 623, 664 in internal firewalls” if they can.

Photo: intelfreepress/Flickr

A message from John Furrier, co-founder of SiliconANGLE:

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.
About SiliconANGLE Media
SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — SiliconANGLE Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.