Intel Reels After 'Deceptively Easy' Laptop Exploit Is Revealed

Image: iStock

After more than three decades as the leader in desktop and laptop processors, Intel's reputation is in big trouble. Following on the heels of the Spectre and Meltdown vulnerabilities, F-Secure has revealed a new flaw that allows a hacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM (Trusted Platform Module) PINs.

It affects most, if not all laptops that support Intel Management Engine/Intel AMT. Here's what you need to know.

F-Secure said; “In practice, it can give an attacker complete control over an individual’s work laptop, despite even the most extensive security measures.”

The researcher who discovered the flaw last July said the vulnerability can be exploited in about a minute but initially requires physical access to the computer.

An attacker needs to boot the computer and press Ctrl-P to access the Intel Management Engine BIOS Extension using the default password, “admin,” which is unlikely to have been changed said F-Secure. From there, the system can be configured to allow the hackers remote access whenever the threat actor and compromised system are on the same wireless or wired network.

Mitigating this risk is reasonably easy. Don't leave your computer unattended in a public place and change the AMT password even if you don't expect to use the feature.


Comments

    Intel's New Year Resolution - more security testing.

    The article is very light on details, but this seems a while lot more like poor security practices from administrators than an Intel vulnerability issue?

Join the discussion!