• Welcome to Tamil Brahmins forums.

    You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our Free Brahmin Community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

    If you have any problems with the registration process or your account login, please contact contact us.

Hijacking Flaw that lurked in Intel chips is worse than anyone thought

Status
Not open for further replies.

tks

Well-known member
Source : ars Technica
Date : May 6, 2017
Link:

https://arstechnica.com/security/20...-in-intel-chips-is-worse-than-anyone-thought/


Patch for severe authentication bypass bug won’t be available until next week. More of a concern for businesses for now. Sharing more for awareness.


====================================================================

A remote hijacking flaw that lurked in Intel chips for seven years was more severe than many people imagined, because it allowed hackers to remotely gain administrative control over huge fleets of computers without entering a password. This is according to technical analyses published Friday.

As Ars reported Monday, the authentication bypass vulnerability resides in a feature known as Active Management Technology. AMT, as it's usually called, allows system administrators to perform a variety of powerful tasks over a remote connection. Among the capabilities: changing the code that boots up computers, accessing the computer's mouse, keyboard, and monitor, loading and executing programs, and remotely powering on computers that are turned off. In short, AMT makes it possible to log into a computer and exercise the same control enjoyed by administrators with physical access.



AMT, which is available with many vPro processors, was set up to require a password before it could be remotely accessed over a Web browser interface. But, remarkably, that authentication mechanism can be bypassed by entering any text string—or no text at all. According to a blog post published Friday by Tenable Network Security, the cryptographic hash that the interface's digest access authentication requires to verify someone is authorized to log in can be anything at all, including no string at all.

"Authentication still worked" even when the wrong hash was entered, Tenable Director of Reverse Engineering Carlos Perez wrote. "We had discovered a complete bypass of the authentication scheme."


A separate technical analysis from Embedi, the security firm Intel credited with first disclosing the vulnerability, arrived at the same conclusion

For more click on the link provided at the top of this post
 
Status
Not open for further replies.

Follow Tamil Brahmins on Social Media

Top
  Thank you for visiting TamilBrahmins.com

You seem to have an Ad Blocker on.

We depend on advertising to keep our content free for you. Please consider whitelisting us in your ad blocker so that we can continue to provide the content you have come here to enjoy.

Alternatively, consider upgrading your account to enjoy an ad-free experience along with numerous other benefits. To upgrade your account, please visit the account upgrades page

You can also donate financially if you can. Please Click Here on how you can do that.