Hardware

Intel laptops can be controlled in as little as 30 seconds (intel amt)

Table of contents:

Anonim

More headaches for Intel, the security problems of its processors mean that attackers can take control of Intel laptops in just 30 seconds.

Intel laptops are very vulnerable

F-Secure has found a security issue with Intel Active Management Technology (AMT) that allows hackers to seize control of Intel laptops in less than a minute. This problem makes it possible for cyber criminals to bypass BIOS and user passwords to gain full access to the computer. This is also possible by using the Trusted Platform Module (TPM) technology and Bitlocker PIN keys.

Haswell and broadwell undergo reboots from Meltdown and Specter patches

Harry Sintonen, a security consultant at F-Secure, has described these Intel laptop issues as "almost disappointingly easy to exploit" but with "incredible destructive potential. " Intel's AMT technology has been designed to facilitate remote control and maintenance in corporate environments, not the first time a vulnerability has been pointed to in this system.

This time the situation is especially serious since the vulnerability of Intel laptops can be exploited in just 30 seconds and with a single line of code. You only need to restart the system by holding down the CTRL-P keys during startup. After this it is possible to access the Intel Management Engine BIOS Extension (MEBx) with a default password.

"The attacker can now gain remote access to the system from wired and wireless networks as long as they are able to insert themselves into the same network segment with the victim. The attacker can enter your room and configure the laptop in less than a minute, and now he or she can access your desktop when using your laptop in the hotel WLAN and how the computer connects to your company's VPN, the attacker can access the company's resources."

We edit with information that the statements sent to us directly by Intel Spain:

" We are grateful to the community of security experts for calling attention to the fact that some system manufacturers have not configured their systems to protect the Intel Management Engine (MEBx) BIOS Extension. In 2015 we issued a guide to configuration best practices that was updated in November 2017, and we strongly urge OEMs to configure their systems to maximize security. At Intel, our highest priority is the safety of our customers, and we will continue to regularly update our guide to manufacturers to ensure they have the best information on how to protect their data. ” Detailed information

  • This is not a technical issue with Intel AMT technology. Intel Active Management Technology (Intel AMT) is a feature of Intel Core processors with Intel vPro1.2 technology and workstations based on select Intel Xeon processors. Intel AMT uses integrated platform capabilities and popular third-party security and management applications to enable IT or managed service providers to better discover, repair, and help protect their networked computing assets. Intel AMT also saves time with remote maintenance and wireless manageability to drive mobility in the workplace and secure drive wipe to simplify PC lifecycle transitions. Intel Management Engine BIOS Extension (MEBx) configuration is used to enable or disable Intel AMT and configure it. Intel recommends that access to MEBx be protected by the BIOS password that protects other BIOS settings. New research indicates that some system manufacturers did not require a BIOS password to access MEBx. As a result, an unauthorized person with physical access to a computer in which access to MEBx is not restricted, and in which AMT offers factory default settings, could alter their AMT settings. Intel recommended in 2015 that system manufacturers provide a system BIOS option to disable USB provisioning and set the value to "disabled" by default. This also helps ensure that access to MEBx is more controlled. In 2015 we issued a guide to configuration best practices that was updated in November 2017, and we strongly urge OEMs to configure their systems to maximize security. We regularly update our guide. to system manufacturers to make sure they have the best information. You can find more about this in AMT's best security practices.
Theinquirer font

Hardware

Editor's choice

Back to top button