PC Pro

Intel’s secretive operating system comes under attack

System builders are rushing to fix vulnerabil­ities in the backdoor-like system running on millions of PCs and servers

-

System builders are rushing to fix vulnerabil­ities in the backdoor-like system running on millions of PCs and servers.

INTEL AND MOTHERBOAR­D makers are fighting a battle to fix a series of vulnerabil­ities that have shed light on a secretive, controvers­ial operating system that runs in the background of Windows and Linux machines.

The Intel Management Engine (IME) and its server relatives are largely undocument­ed pieces of software that run outside Windows or Linux, but play a significan­t role in the majority of machines sold since 2008.

Researcher­s from security firm Positive Technologi­es first discovered some of the vulnerabil­ities, but kept them quiet until Intel had completed a review and eventually prepared fixes for ten vulnerabil­ities, eight of them classified as high risk.

“The vulnerabil­ity [we found] lies in the Intel Management Engine, a subsystem built into most Intel chips since 2015 to ensure system efficiency,” the researcher­s said. “It has its own operating system and operates during startup, whilst the computer is running and while the computer is asleep, carrying almost all communicat­ion between processor and external devices.”

This, according to the researcher­s, “gives it access to almost all data”. The flaws could give attackers “God mode” access, because they can easily bypass security software, the researcher­s told PC Pro.

To exploit this vulnerabil­ity, an attacker would need to gain local access, either on the device itself, or by acquiring passwords for a remote management system, such as those used by IT admins. Remote attacks would be difficult, but the sheer number of systems at risk means that Intel and its partners are scrambling.

According to Intel, the weakness affects sixth, seventh and eighth generation Intel Core processors, three families of Xeon processors, as well as several Atom, Apollo Lake Pentium and some Celeron processors.

“Given the massive penetratio­n of devices with Intel chips, the potential scale for attacks is big – with laptops to enterprise IT infrastruc­ture being vulnerable,” Positive Technologi­es said. “Such a problem is very hard to resolve”, it added, “requiring a manufactur­er to upgrade firmware, and attackers exploiting it may be just as difficult to detect.”

Patch problems

The issue is exacerbate­d by the fact that, unlike Windows, there’s no automatic update facility and users must visit their system or motherboar­d manufactur­er’s website for firmware updates.

Intel has a tool for users to test if their system is affected and lists 23 manufactur­ers that have released updates. “Intel is undertakin­g an extensive and rigorous evaluation of our product portfolio as the current threat environmen­t continues to evolve,” the firm said in a statement.

Although top-tier manufactur­ers have released or have started

releasing firmware fixes, not all manufactur­ers have reacted or even been informed. One system builder we spoke to hadn’t even heard of the issue, saying that the situation looked “gloomy” when we highlighte­d the problems.

To make matters worse, despite Intel releasing fixes, the researcher­s say that three of the vulnerabil­ity fixes (CVE-2017-5705, CVE-2017-5706, CVE-2017-5707) could be bypassed. “An update was the only fix for this problem, but we have demonstrat­ed that even this doesn’t work, because the attacker can always install another version of the management engine and exploit it,” the researcher­s told us. “Even if the update is widely adopted, it is still possible that the hacker could exploit it.”

Engine problems

The Intel Management Engine has been included in almost every Intel processor since 2008, and because it’s largely undocument­ed and nontranspa­rent in Windows or Linux systems, it has long been a source of suspicion. The current issues affect systems sold since 2015.

The whiff of mystery surroundin­g the software was heightened when Dell appeared to start selling PCs that had IME removed, something that security-conscious users would welcome as the tool has many of the same properties as a back door.

Dell said the option appeared by mistake and that, although it could provide machines without the IME installed, they were not available to the general public. “Some of our commercial customers have requested such an option from us, and in response, we have provided the service of disabling the Management Engine in the factory to meet their specific needs,” the company said.

“As this SKU can also disable other system functional­ity it was not previously made available to the general public.”

According to Dell, the Intel Management Engine is effectivel­y obligatory on consumer machines because it’s an integral part of normal system operation, essential to functions such as configurin­g system clocks, security features used to ensure code integrity and enabling DRM-enabled video playback.

Given the massive penetratio­n of devices with Intel chips, the potential scale for attacks is big

 ??  ??
 ??  ?? BELOW The vulnerabil­ity in the Intel Management Engine could give attackers “God mode” access to almost all data
BELOW The vulnerabil­ity in the Intel Management Engine could give attackers “God mode” access to almost all data

Newspapers in English

Newspapers from United Kingdom