An unfixable flaw in Intel chips could create ‘total chaos’


Researchers have found a nasty bug in an essential component that is at the base of the entire cryptographic chain of trust in Intel systems. This vulnerability allowed to decrypt or modify everything on a machine. This flaw concerns all recent Intel chips.

Bad news for Intel chip users. Security researchers at Positive Technologies have discovered a flaw in the Boot ROM of the Converged Security and Management Engine (CSME). It’s a hardware memory component that is the basis of the entire cryptographic chain of trust for Intel computers. Executed at the very start of startup, this software – which is therefore impossible to correct – will generate the Trusted Platform Module (TPM). It’s a special memory area that allows encryption keys to be stored securely.

The CSME is also the cryptographic guarantor of the UEFI firmware (the successor to the BIOS) and of the Power Management Controller. In addition, it implements functions called “Enhanced Privacy ID”. It allows authentication of other protection systems on the computer, for example dedicated to securing content protected by copyright (DRM). In addition to financial transactions.

Intel chips: A flaw that cannot be corrected

intel 9

Gizchina News of the week


This flaw concerns all recent Intel chips, with the exception of the latest generation. It allows to modify the execution of the CSME and potentially affects the security of all these technologies which depend on it. In particular, it would allow access to a hardware encryption key used to encrypt the Chipset Key. It’s a master key that is used to generate all the other encryption keys.“However, this [hardware] key is not specific to the platform. A single key is used for a whole generation of Intel chipsets (…). We believe that extracting this key is only a matter of time. When this happens, total chaos will reign. Hardware identifiers will be falsified, protected digital content will be extracted and encrypted data from hard drives will be decrypted, “said Positive Technologies in a blog note.

Read Also:  Intel Unveils Next-Generation Core Ultra 200S Desktop Processors

As this flaw is at the hardware level, the only solution to permanently remove the risk would be to change the hardware. Contacted by Positive Technologies, Intel nevertheless seeks to play down the situation. The American giant was already aware of this flaw, which was referenced under the number CVE-2019-0090. They believe that it can only be exploited through “physical access and special equipment”. A patch had also been released in 2019 to prevent potential attacks.

But Positive Technologies thinks that the Intel patch covers only one attack vector and that there are many others. In addition, the operation would not necessarily require physical access, but could be done through “local access”. Positive Technologies plans to publish a white paper soon which should provide more technical details on the subject.

Disclaimer: We may be compensated by some of the companies whose products we talk about, but our articles and reviews are always our honest opinions. For more details, you can check out our editorial guidelines and learn about how we use affiliate links.

Source/VIA :
Previous The popular AnTuTu benchmark app has been removed from the Play Store
Next Malware threats: more than a billion Android at risk

2 Comments

  1. Tom Harper
    March 8, 2020

    What a joke of an article. You do indeed have to have physical access, serious tools and expertise, and that’s the only way to perform the “hack”. The determined lies that its worse than that remove all credibility from this publication.

    Next time just write “I hate intel”. It’ll be factual and credible.

  2. Kent Ferguson
    March 9, 2020

    Society is ruled by Clickbait and Sensationalism.
    and there is nothing we can do about it.

    AMD will become #1 and 10 years from now we will find an unfixable vulnerability in there hardware too
    but no-one got hacked 🙂

    we are trapped in a cycle..