Intel patches remote execution that dates back to 2008

Discussion in 'Frontpage news' started by Hilbert Hagedoorn, May 2, 2017.

  1. Hilbert Hagedoorn

    Hilbert Hagedoorn Don Vito Corleone Staff Member

    Messages:
    42,895
    Likes Received:
    10,557
    GPU:
    AMD | NVIDIA
  2. chronek

    chronek Member Guru

    Messages:
    184
    Likes Received:
    3
    GPU:
    Geforce 980 GTX 4GB gddr5
    It was not a bug, it was a feature..
     
  3. Kaarme

    Kaarme Ancient Guru

    Messages:
    2,742
    Likes Received:
    1,399
    GPU:
    Sapphire 390
    Only now, after all these generations, NSA and CIA finally allowed Intel to make it public and possibly offer solutions.
     
  4. schmidtbag

    schmidtbag Ancient Guru

    Messages:
    6,280
    Likes Received:
    2,604
    GPU:
    HIS R9 290
    Agreed - just look at the phrasing of the article. It repeatedly explains how and why these are security risks but I didn't see anywhere they mentioned what these features were intended for (in a secure manner), nor are they apologetic for the security risks. At least they provided patches.

    It's interesting to me how deliberate some of it was. For example the statement "If AMT isn't provisioned, a logged-in user can still potentially exploit the bug to gain admin-level powers." but honestly, how many system admins know about what AMT is and/or know they can do something about it? So basically what they're saying is "despite that we [should have] known about this 'bug' for nearly a decade, we never told users to provision AMT nor supplied a patch to Windows to do it for you". They basically intentionally left it alone. This of course is assuming they're lying about just recently discovering this, but I've heard people complaining about the security flaws and backdoors of the Core i series a very long time ago.
     
    Last edited: May 2, 2017

  5. SirDremor

    SirDremor Master Guru

    Messages:
    586
    Likes Received:
    0
    GPU:
    Nvidia GTX 1050
    Hurray! Now all those scared can un-wrap themselves from tinfoil!
     
  6. Cplifj

    Cplifj Member Guru

    Messages:
    151
    Likes Received:
    32
    GPU:
    Vega64 XTX
    Funny thing, but my thoughts here are...

    Odd that it covers the exact period of Obama reign.

    Could such a thing really happen by presidential order?

    The kind of thing we never hear about, since spying on everyone seems their only way to keep the power.
     
  7. schmidtbag

    schmidtbag Ancient Guru

    Messages:
    6,280
    Likes Received:
    2,604
    GPU:
    HIS R9 290
    I find this unlikely. I don't know exactly when this was implemented relative to Obama's inauguration, but whether Obama wanted/approved of this or not, the timing of the implementation would've been way too quick. The checks and balances of the government alone would have made the process take up too much time, but you also have to consider Intel's software and hardware engineers had to design and create these features. Together, I'm sure that likely would've taken at least a year to accomplish.

    However, I wouldn't be surprised if Obama was aware of this "bug", and, I don't think the ending of his presidency is related to this either. Just to clarify, I'm not being a tinfoil hat here, just speculating - I honestly couldn't care less if the CIA or NSA wants to spy on me.
     
  8. mieciu184

    mieciu184 New Member

    Messages:
    2
    Likes Received:
    0
    GPU:
    gigabyte gtx 970 4gb
    Took em 9 years to notice the bug nice :D
     
  9. Picolete

    Picolete Master Guru

    Messages:
    343
    Likes Received:
    108
    GPU:
    R9 290 Sapphire Tri-x
    "bug"
     
  10. Turanis

    Turanis Ancient Guru

    Messages:
    1,780
    Likes Received:
    489
    GPU:
    Gigabyte RX500
    At least!

    Intel Management Engine is a "good" feature.
    AMT is hardware and firmware technology for remote out-of-band management of personal computers, in order to monitor, maintain, update, upgrade, and repair them.
    https://en.wikipedia.org/wiki/Intel_Active_Management_Technology

    You try to escape from Windows 10 spy-bloat-ware,but you have IME in hardware from Nehalem to Kaby Lake. :D

    https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/

    "The short version is that every Intel platform with AMT, ISM, and SBT from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME (Management Engine) not CPU firmware. If this isn’t scary enough news, even if your machine doesn’t have SMT, ISM, or SBT provisioned, it is still vulnerable, just not over the network."

    [​IMG]
     
    Last edited: May 2, 2017

  11. Zooke

    Zooke Master Guru

    Messages:
    429
    Likes Received:
    223
    GPU:
    3090FE + EK Block
    Anyone posting suspicion of this kind of backdoor last week would have been labelled a tinfoil hat loony. Yet here we are.
     
  12. tsunami231

    tsunami231 Ancient Guru

    Messages:
    12,503
    Likes Received:
    1,022
    GPU:
    EVGA 1070Ti Black
    not really shocking is it? there puma6 chip on modems is still yet to be fixed either
     

Share This Page