New CPU chip flaw found. Rwally?

Started by Geek-9pm, March 06, 2020, 12:37:17 PM

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Geek-9pm

The flaw is an error in the read-only memory (ROM) of Intel microprocessors, according to researchers at Positive Technologies, who disclosed it on Thursday. It could allow someone with physical access to a PC to extract its chipset key, essentially a master password that could unlock the rest of the system.
Source:
https://www.pcmag.com/news/intel-chip-flaw-could-allow-access-to-encrypted-data-cant-be-patched
Other links:
http://www.dslreports.com/shownews/Major-Security-Flaw-Found-in-Virtually-All-Intel-CPUs-140984
QuoteA serious design flaw and security vulnerability has been discovered in Intel's CPUs that will require an update at the operating system level to fix, reports The Register. All modern computers with Intel chips from the last 10 years appear to be affected, including those running Windows, Linux, and macOS.
https://www.macrumors.com/2018/01/02/intel-chip-design-flaw/
Note that it was earlier reported in January of 2018. I am not sure if it is the same story. not do I sewe why it is being pecked up again.
Do you understand this?  :-\

BC_Programmer

The new flaw is with the Intel Management Engine which is it's own "mini computer" that runs on the motherboard, and is part of the chipset. As I understand, IME can still be connected to and worked with even when there is no CPU installed.

The issue is Arbitrary Code Execution at the IME level, which is hilarious because that's exactly the sort of problem that makes IME (And AMDs PSP) so questionable.

In order to "exploit" this flaw, you need unsupervised physical access, specialized tools, and a good amount of time. Realistically, I don't think most end-users are affected- The main cases that it will affect are PCs used in more secure environments using things like the "Trusted Platform Module" to try to prevent tampering with the system and which use things like full-disk encryption in concert with that tamper protection.
I was trying to dereference Null Pointers before it was cool.

Geek-9pm

#2
Thanks BC.
This is hard to understand. One would thank that Intel would have been more remorseful in finding the rare flaws. They could  stand to lose more a a few chips. It is said that the flaw is in all of its chips. Either the CPU or the chip set.

ZD Net is still talking about this. But ZD  Net is not the vest source.
Check You Tube:
Flaw In Intel Chips Is Very Big
Use the above in a search.

What is confusing is somersetting like that was reported earlier. :-\   :-\

Recent quote:
QuoteBy Darren AllanMarch 07, 2020
...
Researchers have warned thatr Intel hardware may have another major security vulnerability, potentially putting millions of devices around the world at risk.

The security team at Bitdefender claim that "every machine" that uses an Intel processor and that runs Windows, Linux or FreeBSD is impacted by the vulnerability, which comes just months after the hugely damaging Spectre and Meltdown scares.
https://www.techradar.com/news/intel-chip-security-flaw

BC_Programmer

A lot of it is part of what I'd call the security circus. Vague on details, but hard on the generalizations. Keep people confused, but try to scare them and they'll happily purchase whatever security bull you say solves the problem.

Quote
The security team at Bitdefender claim that "every machine" that uses an Intel processor and that runs Windows, Linux or FreeBSD is impacted by the vulnerability, which comes just months after the hugely damaging Spectre and Meltdown scares.

"The security team at Bitdefender". Bitdefender's entire business is related to security software, firewalls, etc. This is analogous to a research team at Hershey saying that people need Chocolate to live. "security teams" are always uncovering things that would promote their product. They are always careful not to explain the vulnerabilities, just talk about how they are dangerous.

I was trying to dereference Null Pointers before it was cool.

patio

What you explained in your prior post for it to be manupilated is not an easy task at all...

That sums it up or should.
" Anyone who goes to a psychiatrist should have his head examined. "

Geek-9pm

The origin of the story is from:

https://www.ptsecurity.com/ww-en/

QuoteMarch 5, 2020
Positive Technologies: Unfixable vulnerability in Intel chipsets threatens users and content rightsholders
Link goes on to quote a researcher:
One of the researchers, Mark Ermolov, Lead Specialist of OS and Hardware Security at Positive Technologies, explained: "The vulnerability resembles an error recently identified in the BootROM of Apple mobile platforms, but affects only Intel systems. Both vulnerabilities allow extracting users' encrypted data. Here, attackers can obtain the key in many different ways. For example, they can extract it from a lost or stolen laptop in order to decrypt confidential data. Unscrupulous suppliers, contractors, or even employees with physical access to the computer can get hold of the key. In some cases, attackers can intercept the key remotely, provided they have gained local access to a target PC as part of a multistage attack, or if the manufacturer allows remote firmware updates of internal devices, such as Intel Integrated Sensor Hub."

Still I admit confusion. The Apple things was last year.
https://www.zubairalexander.com/blog/bootrom-vulnerability-in-apples-ios-allows-compromise-of-iphones-and-ipads/

radam

#6
If I had to do my config again tomorrow, I would go on amd ryzen. They are not completely invulnerable to flaws but at least they have not lugged around the same architecture for almost 20 years like Intel.

I took the liberty to remove your referral links...