News

F-Secure Reveals Another Intel Security Flaw Involving AMT

While Intel is feeling the brunt of criticisms for the Meltdown and Spectre security flaws revealed recently, their problems are not over yet. Security researchers from F-Secure has discovered another flaw. This time involving Intel’s Active Management Technology (AMT) allowing attackers “access to the backdoor in less than 30 seconds”. The issue even allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation.

Intel AMT Problem

Intel’s AMT is a solution for remote access monitoring and maintenance of corporate-grade personal computers. The original intention is for allowing IT departments or managers to better control their device fleets. The technology is commonly found in corporate laptops. It has even been called out for security weaknesses in the past. However, the pure simplicity of exploiting this particular issue sets it apart from previous instances. Attackers can take advantage of the exploit in mere seconds without a single line of code.

To exploit this, all an attacker needs to do is reboot the target machine and press CTRL-P during bootup. The attacker may then log into Intel Management Engine BIOS Extension (MEBx) using the default password, “admin,” as this default on most corporate laptops. After which, the attacker may change the password to their preference, enable remote access and set AMT’s user opt-in to “None.”

The attacker now gains remote access to the system from both wireless and wired networks. As long as they’re able to insert themselves onto the same network segment with the victim. F-Secure has even released a video on YouTube explaining the issue:

Intel’s Response

Intel has sent the following response via Ars Technica about the issue:

We appreciate the security research community calling attention to the fact that some system manufacturers have not configured their systems to protect Intel Management Engine BIOS Extension (MEBx). (Intel) issued guidance on best configuration practices in 2015 and updated it in November 2017. We strongly urge OEMs to configure their systems to maximize security. Intel has no higher priority than our customers’ security. And we will continue to regularly update our guidance to system manufacturers to make sure they have the best information on how to secure their data.

Ron Perillo

Disqus Comments Loading...

Recent Posts

PS5 Black Friday 2024 Discounts Leaked

After seeing the PS5 Slim price cuts in the US for Black Friday, well-known leaker…

12 hours ago

PowerColor AMD Radeon RX 6600 Hellhound 8GB Graphics Card

The PowerColor Hellhound Radeon™ RX 6600 is built based on AMD’s latest RDNA2 architecture with…

13 hours ago

Gigabyte Intel Z790 AORUS ELITE AX (rev. 1.1) DDR5 PCIe 5.0 ATX Motherboard

With the fast-moving technology changes, GIGABYTE always follow the latest trends to provide customers with…

13 hours ago

Razer Thunderbolt 4 Dock Chroma 10 Port RGB Docking Station

Rewire the rules with the Razer Thunderbolt™ 4 Dock Chroma—a sleek, customizable hub that ushers…

13 hours ago

Seagate 520N 2TB 22×30 M.2 PCIe 4.0 NVMe SSD/Solid State Drive 

Gaming Upgrade: Ultra-small, reliable NVMe SSD elevates the performance of your Steam Deck, Microsoft Surface, laptop,…

13 hours ago

ASUS TUF Gaming GT302 ARGB Black Mid Tower Gaming Case

TUF Gaming GT302 ARGB features an optimised square-type mesh front panel, ensuring unobstructed airflow and…

13 hours ago