Hardware vulnerability leaves business PCs running Intel hardware open to hackers

Hardware vulnerability leaves business PCs running Intel hardware open to hackers

A major hardware vulnerability in Intel’s Active Management Technology (AMT) may place thousands of business and personal users at risk, Intel revealed on Friday.

Details of how to exploit this hardware vulnerability are now public but Intel is releasing a fix starting today to plug the said issue.

The Active Management Technology (AMT) hardware works independent of any operating system and is employed to allow system administrators re-image machines over remote connections. The hardware is installed in business computers not only running AMT but also other Intel hardware like Standard Manageability (ISM) and Small Business Technology (SBT).

‘Not just a logo change’- Intel Security is McAfee, again

Speaking with IBTimes UK, Cris Thomas, Strategist for Tenable Network Security, said that AMT obtains certain privileges to operate and is thus access-protected by a password. The vulnerability in question is that a hacker can access the hardware without having to type in a password. Even if a hacker didn’t type in anything, the default admin account would still allow him to gain access to the hardware, which could indeed put thousands of Intel machines open for misuse.

Intel is releasing a firmware update today to address the issue but the worrying part is that the bug has been around for almost ten years without being detected. Intel hasn’t commented on how many systems have already been compromised because of the said vulnerability, but has offered a roadmap to ensure no more systems are affected.

Intel patches flaw in driver update utility that left users open to attacks

If you own a business PC running AMT, ISM or SBT and haven’t received the firmware update, you can download a discovery tool from Intel’s website which will analyse your system for hardware vulnerability. While some consumer PCs running the said hardware may also be affected, those running Intel’s Server Platform Services are not affected by this vulnerability. You can also refer to Intel’s mitigation guide to ensure your PC stays protected until the firmware arrives.

Being among the largest suppliers of PC hardware around the world, Intel has had its share of hiccups. Last year, the company fixed a vulnerability in Intel Driver Update Utility to help mitigate the use of a non-SSL URL when requesting updates from the firm. The vulnerability was disclosed to Intel by Core Security, which said the flaw “could result in integrity corruption of the transferred data, information leak and consequently code execution.”

Less than half of security pros use shared threat intelligence, report shows

A reason why the hardware vulnerability in AMT could continue for so long could be because of the poor utilisation of shared cyber threat intelligence. Last year, a McAfee Labs survey stated that just 42 per cent of security workers used shared cyber threat intelligence despite 97 per cent of those who shared saying they enable them to provide better protection for their organisations and stay more secure.

Malware behaviour (72 per cent), URL reputations (58 per cent), external IP address reputations (54 per cent), certificate reputations (43 per cent) and file reputations (37 per cent) were the types of information security professionals were most likely to share. But 54 per cent of those who do not share such intelligence said corporate policy was holding them back, while 24 per cent said they were interested but need more information.

Copyright Lyonsdown Limited 2021

Top Articles

RockYou2021 data leak: 8.4 billion passwords compromised

A report shows that 100GB of data which includes 8.4 billion passwords have been recently leaked on the internet, people are being encouraged to secure their accounts.

Hackers Breach Electronic Arts & Steal Game Code

Electronic Arts, one of the world's biggest video game publishers including games such as FIFA, Madden, Sims and Medal of Honor, are the latest company to be hacked.

JBS Foods paid £7.7m in ransom to REvil ransomware gang

JBS Foods, the world’s largest processor of beef and poultry products, has admitted to paying a ransom of $11 million to cyber criminals, a week after it announced that operations…

Related Articles

[s2Member-Login login_redirect=”https://www.teiss.co.uk” /]