Article 5RZHK New secret-spilling hole in Intel CPUs sends company patching (again)

New secret-spilling hole in Intel CPUs sends company patching (again)

by
Dan Goodin
from Ars Technica - All content on (#5RZHK)
Intel-Pentium-Silver-and-Celeron-chip-80

Enlarge (credit: Intel)

Intel is fixing a vulnerability that unauthorized people with physical access can exploit to install malicious firmware on the chip to defeat a variety of measures, including protections provided by Bitlocker, trusted platform modules, anti-copying restrictions, and others.

The vulnerability-present in Pentium, Celeron, and Atom CPUs on the Apollo Lake, Gemini Lake, and Gemini Lake Refresh platforms-allows skilled hackers with possession of an affected chip to run it in debug and testing modes used by firmware developers. Intel and other chipmakers go to great lengths to prevent such access by unauthorized people.

Once in developer mode, an attacker can extract the key used to encrypt data stored in the TPM enclave and, in the event TPM is being used to store a Bitlocker key, defeat that latter protection as well. An adversary could also bypass code-signing restrictions that prevent unauthorized firmware from running in the Intel Management Engine, a subsystem inside vulnerable CPUs, and from there permanently backdoor the chip.

Read 14 remaining paragraphs | Comments

index?i=axPqArNji4E:hsbg7_B2w_8:V_sGLiPB index?i=axPqArNji4E:hsbg7_B2w_8:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments