Forum Moderators: open

Message Too Old, No Replies

You can remotely command/control vulnerable Intel chips

         

tangor

8:17 pm on May 8, 2017 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



You can remotely commandeer and control computers that use vulnerable Intel chipsets by sending them empty authentication strings.

You read that right. When you're expected to send a password hash, you send zero bytes. Nothing. Nada. And you'll be rewarded with powerful low-level access to a vulnerable box's hardware from across the network – or across the internet if the management interface faces the public web.

Remember that the next time Intel, a $180bn international semiconductor giant, talks about how important it treats security.

[theregister.co.uk...]

Intel's response here: [newsroom.intel.com...]

The advice?

"Disable AMT today. Mobilize whomever you need. Start from the most critical servers: Active Directory, certificate authorities, critical databases, code signing servers, firewalls, security servers, HSMs (if they have it enabled). For data centers, if you can, block ports 16992, 16993, 16994, 16995, 623, 664 in internal firewalls now.

"If you have anything connected to the Internet with AMT on, disable it now. Assume the server has already been compromised."


More fun in computer land. Sigh.

keyplyr

8:48 pm on May 8, 2017 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



That assumes the perp has access to the computer/server.

tangor

8:52 pm on May 8, 2017 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



If it faces the internet, the perp has access if AMT is enabled.

robzilla

9:01 pm on May 8, 2017 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Moore said a query using the Shodan computer search engine detected fewer than 7,000 servers showing they had ports 16992 or 16993 open. Having those ports open is a requirement for the remote attack. That number of servers still represents a potentially substantial threat because tens of thousands of computers could be connected to some of those hosts.

Intel patches remote hijacking vulnerability that lurked in chips for 7 years [arstechnica.com]

keyplyr

12:07 am on May 9, 2017 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



No AMT on either of my two devices with Intel chips. Seems this exploit affects mostly office machines with business and enterprise-friendly processors.

J_RaD

3:01 am on May 9, 2017 (gmt 0)



AHHHH welcome my friends to the intel management engine, yours FREE every time you install your intel chipset driver.. no way around it folks.


No AMT on either of my two devices with Intel chips


the only way you MIGHT not have it is if you are talking mobile devices, because every single desktop board intel based, has chipset drivers and with those drivers come.. you guessed it!

keyplyr

3:08 am on May 9, 2017 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Says Active Management Technology (AMT) only available with vPro, which I don't have.

However J_RaD, I have no interest in getting into yet another debate with you about the woes of Intel, thanks.

robzilla

6:47 am on May 9, 2017 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I do have a vPro processor, with the drivers installed, but the discovery tool says I'm not vulnerable so it seems there's more to it than that.

J_RaD

5:42 pm on May 10, 2017 (gmt 0)




but the discovery tool says I'm not vulnerable

then AMT is not activated on your system yet.. LEAVE IT ALONE let it sleep.

J_RaD

5:49 pm on May 10, 2017 (gmt 0)




only available with vPro, which I don't have


7th gen (anything) and beyond its standard... lots of 1150 stuff had it built into the chipset...i watched it install on a flipping celeron when doing the chipset drivers.