by marksamman on 11/20/17, 7:11 PM with 185 comments
by aeleos on 11/20/17, 8:05 PM
I wonder if this will at all dissuade either Intel or AMD into continuing to make these super privileged processors whose functions are completely hidden. The cynic in me thinks that this will change absolutely nothing.
There is a great website called The Bad Thing [1] that has compiled the known information about Intel ME.
I just ran the detection tool on my laptop and I am running a vulnerable version of Intel ME, but I can't even do anything about it until my system manufacturer provides a patch for it. I feel like this is going to be one of those situations that ends up leaving millions of devices unpatched and vulnerable a few years down the road.
[0]: https://www.blackhat.com/eu-17/briefings/schedule/#how-to-ha... [1]: https://www.cs.cmu.edu/~davide/bad_thing.html
by jlgaddis on 11/20/17, 8:52 PM
> "Potential Impact: An attacker could load and execute arbitrary code outside the visibility of the user, operating system, and hypervisor/virtualization platform; resulting in exfiltration of secrets, subtle manipulation of system operation, or denial of service."
[0]: https://support.lenovo.com/us/en/product_security/len-17297
by lifty on 11/20/17, 9:41 PM
[0]: https://www.theregister.co.uk/2017/05/01/intel_amt_me_vulner...
by tpearson-raptor on 11/21/17, 3:42 AM
Plus, purchasing machines like that one not only sends a clear signal that we want backdoor-free computing, but also allows the further development of more libre computing options. Wouldn't you rather have Linux and BSD as first-class citizens on new hardware, instead of always needing to play catch-up from behind?
by computator on 11/21/17, 1:39 AM
Several HN users here (beefhash, jlgaddis, joe_the_user) have raised the possibility that applying the patch might make it impossible to get rid of the Intel ME entirely.
If you don't apply the patch, someone may come up with a nice new exploit (using the security bugs) to completely remove the Intel ME.
If you do apply the patch, it might close off possible exploits and you'll be left with an Intel ME that's impossible to remove.
by wonderous on 11/20/17, 9:27 PM
“Critical: A vulnerability, which if exploited, would allow remote execution of malicious code without user action.”
“Important: A vulnerability, which if exploited, would directly impact the confidentiality, integrity or availability of user’s data or processing resources.“
by joe_the_user on 11/20/17, 7:43 PM
"Asking for a friend"
by beefhash on 11/20/17, 7:39 PM
I'm not familiar enough with the Intel ME to tell, but could this possibly be exploited with the arbitrary code execution in the ME being used to set the HAP bit without requiring hardware intervention?
by jlgaddis on 11/20/17, 9:04 PM
$ sudo ./intel_sa00086.py
...
*** Risk Assessment ***
Detection Error: This system may be vulnerable, please install the Intel(R) MEI/TXEI driver (available from your system manufacturer).
...
Thanks, Intel!If you have a Lenovo machine, check Lenovo's security advisory [0] to see if it is affected. Intel has the wrong URL in their link.
Edit: FWIW, the (Linux) tool creates a .log (and .xml) file in the current directory that was slightly more helpful:
$ tail -n 4 SA-00086-cluefire-2017-11-20-21-09-36.log
HECI error: No device with MKHI found[2]
Can't find SPS version in the tool output
Status: HECI_NOT_INSTALLED
Tool Stopped
This workstation doesn't have an "HECI" [1], apparently. It does have SPS, but "spsInfoLinux64" throws an error too: Error 9460: Unknown or unsupported hardware platform
This box has 2 x E5-2620 v4 CPUs so it is reportedly "not affected" but I thought I'd double-check anyways. Oh well, I won't miss out on all the excitement -- I'll still get to have some fun updating my other machines and all of $work's servers in the datacenters. :/[0]: https://support.lenovo.com/us/en/product_security/len-17297
[1]: https://en.wikipedia.org/wiki/Host_Embedded_Controller_Inter...
by hoodoof on 11/20/17, 8:39 PM
by xwvvvvwx on 11/20/17, 8:28 PM
Most annoying thing is that there isn’t even a real alternative. If I understand it right then AMD chips have pretty much the same thing?
by stablemap on 11/20/17, 10:59 PM
by revelation on 11/20/17, 10:22 PM
The tool rightly points out that my desktop consumer system is vulnerable (from the list, no Intel CPU manufactured in the last 5 years isn't), then suggests I contact the manufacturer for an update. Here is what the tool says my system manufacturer is:
Manufacturer: To Be Filled By O.E.M.
Model: To Be Filled By O.E.M.
I will get right on that and bug "To Be Filled By O.E.M." for an update! It's an ASRock motherboard, by the way. But with this approach they are not going to patch even 5% of personal computers out there..by Sephr on 11/20/17, 9:14 PM
If Intel actually cared about your security they would document that. It says so right in the security advisory that the external researchers are the reason for the security review, and not due to customer concerns.
by 0culus on 11/20/17, 11:54 PM
by eecc on 11/20/17, 8:13 PM
by k2enemy on 11/20/17, 8:41 PM
by cjsuk on 11/20/17, 7:42 PM
by fernly on 11/21/17, 3:20 AM
The Intel dudes could have added "from future import print_function" and made it version-independent.
by teolandon on 11/20/17, 8:05 PM
by En_gr_Student on 11/20/17, 8:46 PM
I'm just waiting for the ransomware that lives on AME, and is burned to the various dies instead of on hard-drives. Isn't that what this open door means?
by fencepost on 11/20/17, 9:08 PM
I almost wish it covered 3rd-5th generation, just to help me push some folks to upgrade.
by xwvvvvwx on 11/20/17, 10:56 PM
It’s still not really clear to me why it needs to exist at all.
Serious question.
by mysterypie on 11/20/17, 10:49 PM
Based on the analysis performed by this tool: Detection Error: This system may be vulnerable, please install the Intel(R) MEI/TXEI driver (available from your system manufacturer).
Does that mean that the Intel ME is disabled, so I don't have to worry about it? I certainly don't want to install anything that might enable the Intel ME if it's already disabled!
What a quandary. This reminds me of all the information I was asked to give to get a detailed credit report. If I didn't give it, they weren't going to give me the report. If I gave it, they would add to my credit file even if they never had it before.
by nly on 11/21/17, 11:25 AM
by pwdisswordfish2 on 11/20/17, 8:24 PM
by avocad on 11/21/17, 5:02 PM
https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thomp...
Basically you have to trust the compiler because it compiles all code on your system, including itself. Not entirely the same, and I think the Intel trick is more nefarious.
by blinkingled on 11/21/17, 3:41 AM
by dboreham on 11/20/17, 8:54 PM
by dboreham on 11/20/17, 8:47 PM
by jacquesm on 11/21/17, 1:25 PM
by geth on 11/24/17, 4:14 PM
by unixhero on 11/21/17, 2:32 AM
Who knows what benefits this defect can give you down the line. Maybe it will be possible to take over the entire Management Engine. That would be neat.
by locusm on 11/21/17, 1:18 AM
by polskibus on 11/20/17, 8:24 PM
by partycoder on 11/20/17, 9:42 PM
They will of course not let go because it's a backdoor. It's an overprivileged computer within your computer.
by trisimix on 11/20/17, 11:36 PM
by vellipylly on 11/21/17, 8:07 AM
by _pmf_ on 11/21/17, 8:15 AM
by revmoo on 11/20/17, 7:53 PM