Report: Every Post-2008 Intel Processor is Remotely Exploitable

/ 1 year ago

Report: Every Post-2008 Intel Processor is Remotely Exploitable

A year ago, we reported that a management technology present in all x86 CPUs left them open to remote rootkit attacks. Now, it seems that the same issue – despite Intel being aware of it – is also present in the company’s 7th-generation Kaby Lake processors, according to SemiAccurate.

The issue is caused by Intel’s Management Engine (ME) – present within every Intel processor released since 2008 – which is designed to allow administrators to remotely access and control a PC’s operating system, hard drive, and boot state, even when the target computer is turned off (though still powered and networked).

“[E]very Intel platform with AMT, ISM, and SBT from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME (Management Engine) not CPU firmware,” reports SemiAccurate’s Charlie Demerjian. “If this isn’t scary enough news, even if your machine doesn’t have SMT, ISM, or SBT provisioned, it is still vulnerable, just not over the network. For the moment. From what SemiAccurate gathers, there is literally no Intel box made in the last 9+ years that isn’t at risk. This is somewhere between nightmarish and apocalyptic.”

“The problem is quite simple, the ME controls the network ports and has DMA access to the system,” Demerjian explains. “It can arbitrarily read and write to any memory or storage on the system, can bypass disk encryption once it is unlocked (and possibly if it has not, SemiAccurate hasn’t been able to 100% verify this capability yet), read and write to the screen, and do all of this completely unlogged. Due to the network access abilities, it can also send whatever it finds out to wherever it wants, encrypted or not.”

Thankfully, though, it seems that Intel is now fixing the vulnerability, nine years later. According to Demerjian, Intel started to roll out firmware fixes on 25th April, with more expected to come, though it is unknown – and probably unlikely – whether older Intel processors with ME will be patched, or even if OEMs will be inclined to push these updates. If you have concerns over Intel’s ME, more information is available over at SemiAccurate.

Topics: , , ,


By supporting eTeknix, you help us grow. And continue to bring you the latest news, reviews, and competitions. Follow us on Facebook and Twitter to keep up with the latest technology. Share your favourite articles, chat with the team and more. Also check out eTeknix YouTube, where you'll find our latest video reviews, event coverage and features in 4K!
eTeknix FacebookeTeknix TwittereTeknix Instagram

Check out our Latest Video


One Response to “Report: Every Post-2008 Intel Processor is Remotely Exploitable”
  1. Picto says:

    All those that said Intel was a front company for the CIA, don’t they look silly now… Oh, err, uhmm. 🙂

Speak Your Mind

Tell us what you're thinking...
and oh, if you want a pic to show with your comment, go get a gravatar!

Optimized with PageSpeed Ninja