Breaking News

SAMA introduces L70 AIO Liquid Cooler Crucial Unleashes Its Most Powerful Gaming Memory Yet: DDR5 Pro OC 6400 CL32 RICOH announces GR IV Monochrome and GR IV HDF High-end Compact Digital Cameras CORSAIR Launches the Revolutionary AIR 5400 Triple-Chamber Mid Tower to Redefine Performance ASUS TUF Gaming Unveils Call of Duty Black Ops 7 Edition AMD Radeon RX 9070 XT

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Researchers Identify Unfixable Vulnerability in Intel Chipsets

Researchers Identify Unfixable Vulnerability in Intel Chipsets

PC components Mar 6,2020 0

An error in chipset read-only memory (ROM) could allow attackers to compromise platform encryption keys and steal sensitive information.

Positive Technologies experts have discovered a vulnerability in Intel Converged Security and Management Engine (CSME), a part of a chip that controls system boot-up, power levels, firmware and cryptographic functions.

Most Intel chipsets released in the last five years contain the vulnerability in question.

By exploiting vulnerability CVE-2019-0090, a local attacker could extract the chipset key stored on the PCH microchip and obtain access to data encrypted with the key. Worse still, it is impossible to detect such a key breach. With the chipset key, attackers can decrypt data stored on a target computer and even forge its Enhanced Privacy ID (EPID) attestation, or in other words, pass off an attacker computer as the victim's computer. EPID is used in DRM, financial transactions, and attestation of IoT devices.

One of the researchers, Mark Ermolov, Lead Specialist of OS and Hardware Security at Positive Technologies, explained: "The vulnerability resembles an error recently identified in the BootROM of Apple mobile platforms, but affects only Intel systems. Both vulnerabilities allow extracting users' encrypted data. Here, attackers can obtain the key in many different ways. For example, they can extract it from a lost or stolen laptop in order to decrypt confidential data. Unscrupulous suppliers, contractors, or even employees with physical access to the computer can get hold of the key. In some cases, attackers can intercept the key remotely, provided they have gained local access to a target PC as part of a multistage attack, or if the manufacturer allows remote firmware updates of internal devices, such as Intel Integrated Sensor Hub."

The vulnerability potentially allows compromising common data protection technologies that rely on hardware keys for encryption, such as DRM, firmware TPM, and Intel Identity Protection. For example, attackers can exploit the vulnerability on their own computers to bypass content DRM and make illegal copies. In ROM, this vulnerability also allows for arbitrary code execution at the zero level of privilege of Intel CSME. No firmware updates can fix the vulnerability.

Intel has downplayed the new security vulnerability, noting it would likely require specialized hardware and physical access. “Intel was notified of a vulnerability potentially affecting the Intel Converged Security Management Engine in which an unauthorized user with specialized hardware and physical access may be able to execute arbitrary code within the Intel CSME subsystem on certain Intel products,” Intel said. The company recommends that users of Intel CSME, Intel SPS, Intel TXE, Intel DAL, and Intel AMT contact their device or motherboard manufacturer for microchip or BIOS updates to address the vulnerability. You can check the Intel website for the latest recommendations on mitigation of vulnerability CVE-2019-0090.

Since it is impossible to fully fix the vulnerability by modifying the chipset ROM, Positive Technologies experts recommend disabling Intel CSME based encryption of data storage devices or considering migration to tenth-generation or later Intel CPUs. In this context, retrospective detection of infrastructure compromise with the help of traffic analysis systems such as PT Network Attack Discovery becomes just as important.

Tags: IntelProcessorsCybersecurity
Previous Post
Quibi's Lineup at Launch on April 6
Next Post
Leica S3 Medium Format System Available For Pre-order

Related Posts

  • Intel and NVIDIA to Jointly Develop AI Infrastructure and Personal Computing Products

  • An Intel-HP Collaboration Delivers Next-Gen AI PCs

  • New Intel Xeon 6 CPUs to Maximize GPU-Accelerated AI Performance

  • Intel Unveils New GPUs for AI and Workstations at Computex 2025

  • G.SKILL Releases DDR5 Memory Support List for Intel 200S Boost

  • Intel and its partners release BIOS update for Intel 15th Gen to increase performance

  • Intel-AMD new motherboards announced

  • Intel at CES 2025

Latest News

SAMA introduces L70 AIO Liquid Cooler
Cooling Systems

SAMA introduces L70 AIO Liquid Cooler

Crucial Unleashes Its Most Powerful Gaming Memory Yet: DDR5 Pro OC 6400 CL32
PC components

Crucial Unleashes Its Most Powerful Gaming Memory Yet: DDR5 Pro OC 6400 CL32

RICOH announces GR IV Monochrome and GR IV HDF High-end Compact Digital Cameras
Cameras

RICOH announces GR IV Monochrome and GR IV HDF High-end Compact Digital Cameras

CORSAIR Launches the Revolutionary AIR 5400 Triple-Chamber Mid Tower to Redefine Performance
Cooling Systems

CORSAIR Launches the Revolutionary AIR 5400 Triple-Chamber Mid Tower to Redefine Performance

ASUS TUF Gaming Unveils Call of Duty Black Ops 7 Edition AMD Radeon RX 9070 XT
GPUs

ASUS TUF Gaming Unveils Call of Duty Black Ops 7 Edition AMD Radeon RX 9070 XT

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed