Are Intel Chipsets Vulnerable?

Breach of TRUST

May 02, 2021

Breach of TRUST

The Backstory

Ever since spectre and meltdown vulnerabilities arose, intel chipsets are facing constant mocking and developed some kind of self-consciousness. People are preferring AMD processors more and more due to the better performance as well as the lack of underlying vulnerabilities that comes with intel chipsets.

In the wake of severe cyber security threats and data leakages, performance and compatibility are not the only concern while buying a processor for your build. People are becoming more and more aware about the privacy and security of their data and devices. Several social networking sites like Facebook, Twitter and google implementing more controls and updated privacy and security policies shows this trend. People have been preferring hardware encryption support with software backed protection against various attacks. So, having a couple of critical bugs like spectre and meltdown are making intel take a big hit to the market share. To make the matters worse another unfixable bug that was discovered in the intel chipsets that threatens devices that are from over 5 years period.

The Present

Positive technologies specialists found a vulnerability that can not be patched with a firmware update. It is a flaw in Intel's Converged Security and Management Engine's mask ROM which implements the Trusted Platform Module used for Encryption and authentication of UEFI BIOS firmware, Microsoft System Guard and Bit locker (Drive Encryption Program). This bug poses a big threat since it lets the attacker compromise the device at hardware level. It completely demolishes the security profile of the device. Every chipset that was made in the past 5 years are having the same implementation of that bug which leaves millions of devices vulnerable for the attackers to exploit and cause damage.

How Dangerous It Is?

Since this bug runs at the very initial process of the system boot, everything that runs afterwards can be compromised, in other words this bug destroys the intel’s root of trust. Once successfully exploited this can also lead to compromising and bypassing the EPID (Enhanced Privacy ID) which is responsible for on Chip Encryption and DRM Protections. There is a chance to extract the key used as well.

What Intel Says?

Intel's defence since exploiting this attack successfully would require local access or physical access to the affected device, specialized hardware and software tools, and a high level of skill set, making it relatively impractical in the real world. Intel simply suggests users to have their devices in close proximity to avoid any kind of potential Exploitation.

Should you be worried?

At present this bug is at its very initial phase, even for exploits to be ready it will take a little while for hackers, even when they have all the things needed to carry out a successful attack, since it requires physical access of the device to successfully exploit. In any case if it is stolen there are more methods and ways to exploit which can be easier and can have devastating effects. so it is suggested to keep your device physically secure and have the latest CSME and BIOS updates to prevent local (LAN based) attacks and your device should be fine for now. Researchers said that, only the latest Intel 10th generation processors, Ice Point chipsets and SoCs, are not affected by this issue. More exactly, this affects Intel CSME versions 11.x, Intel CSME version 12.0.35, Intel TXE versions 3.x, 4.x, and Intel Server Platform Services versions 3.x, 4.x, SPS_E3_05.00.04.027.0.

References:

PT Article

CVE-2019-0090