facebook rss twitter

Intel patches nine-year-old enterprise CPU vulnerability

by Mark Tyson on 2 May 2017, 13:11

Tags: Intel (NASDAQ:INTC)

Quick Link: HEXUS.net/qadgxs

Add to My Vault: x

Please log in to view Printer Friendly Layout

Intel has just patched a vulnerability which has been open and exploitable in all its enterprise targeted Core processors - for the last nine years. Since 2008 Intel's business-focussed PC processors have shipped with Active Management Technology (AMT), Intel Standard Manageability (ISM) and Small Business Technology (SBT) features - all useful features for remote management. However, these powerful features could be accessed by anyone with a copy of Metasploit on the same network, or from anywhere in the world if port 16992 was left accessible.

A firmware patch has been released by Intel, said to be capable of filling in the security holes left open by its enterprise remote management features. The 'critical escalation of privilege' vulnerability was present in firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 and allowed "an unprivileged attacker to gain control of the manageability features provided by these products". Intel emphasises that the remote access vulnerability does not exist on Intel-based consumer PCs.

If the above vulnerability wasn't alarming enough, Intel's slow response to fixing a security flaw in a security feature has drawn harsh criticism from SemiAccurate's Charlie Demerjian. The reporter explains that SemiAccurate has known about these vulnerabilities for over five years and has over this period communicated with dozens of Intel execs about the security issues - all apparently to no avail. Furthermore, it is suspected that the vulnerability is currently being actively exploited in the wild.

Now there's a firmware security update - but it's not a straightforward universal patch from Intel - users will have to wait for their system motherboard vendors to create a usable update. It could be that many machines with this vulnerability aren't supported by the vendors anymore and some will never receive a fix. Those who can't find a patch/fix for their system can download and study the Intel-SA-00075 Mitigation Guide which will help you make things secure while you await updates from your vendor(s).

Intel manageability
firmware

Associated
CPU Generation

Resolved
Firmware

X.X.XX.3XXX

 
 

6.0.xx.xxxx

1st Gen Core

6.2.61.3535

 

6.1.xx.xxxx

6.2.61.3535

 

6.2.xx.xxxx

6.2.61.3535

 

7.0.xx.xxxx

2nd Gen Core

7.1.91.3272

 

7.1.xx.xxxx

7.1.91.3272

 

8.0.xx.xxxx

3rd Gen Core

8.1.71.3608

 

8.1.xx.xxxx

8.1.71.3608

 

9.0.xx.xxxx

4th Gen Core

 

9.1.41.3024

 

9.1.xx.xxxx

9.1.41.3024

 

9.5.xx.xxxx

9.5.61.3012

 

10.0.xx.xxxx

5th Gen Core

10.0.55.3000

 

11.0.xx.xxxx

6th Gen Core

11.0.25.3001

 

11.5.xx.xxxx

7th Gen Core

11.6.27.3264

 

11.6.xx.xxxx

11.6.27.3264

 

 



HEXUS Forums :: 5 Comments

Login with Forum Account

Don't have an account? Register today!
“The reporter explains that SemiAccurate has known about these vulnerabilities for over five years and has over this period communicated with dozens of Intel execs about the security issues - all apparently to no avail”

So why not go public?
lon3wolf2002
“The reporter explains that SemiAccurate has known about these vulnerabilities for over five years and has over this period communicated with dozens of Intel execs about the security issues - all apparently to no avail”

So why not go public?

Due to potential collateral damage
lon3wolf2002
So why not go public?
They did, granted they didn't release the technical details of how the exploit works but they were warning back in 2012 that vPro was a security risk.
Corky34
lon3wolf2002
So why not go public?
They did, granted they didn't release the technical details of how the exploit works but they were warning back in 2012 that vPro was a security risk.

I see, odd that no one could force Intel to fix it back then.
Intel is a money grabbing chimp - it was a poor idea of hardware based security forced upon enterprises to charge more money in the 1st place.

See the investigation in 2012 here - http://semiaccurate.com/2012/05/15/intel-small-business-advantage-is-a-security-nightmare/

Currently: http://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/