Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Vulnerability in Intel Chipsets Allows Hackers to Obtain Protected Data

Most Intel chipsets released in the past five years are affected by a vulnerability that can be exploited to obtain encrypted data and compromise data protection technologies, Positive Technologies revealed on Thursday.

Most Intel chipsets released in the past five years are affected by a vulnerability that can be exploited to obtain encrypted data and compromise data protection technologies, Positive Technologies revealed on Thursday.

Intel first learned about the flaw, tracked as CVE-2019-0090, from a partner, and addressed it in an advisory published in May 2019. The weakness was later independently discovered by Positive Technologies, which has now published a blog post describing its findings. The company also plans on publishing a detailed research paper in the upcoming period.

According to Positive Technologies, CVE-2019-0090 is an unfixable vulnerability that affects the Converged Security and Management Engine (CSME) boot ROM on most Intel chipsets and system on chips (SoCs), except for Ice Point chipsets.

CSME is responsible for the initial authentication of Intel-based systems by loading and verifying firmware components. It authenticates the UEFI using BootGuard, it checks the Power Management Controller, and it also provides the cryptographic basis for Intel’s data protection technologies, including digital rights management (DRM), firmware Trusted Platform Module (TPM), and Identity Protection Technology (IPT).

Another vulnerability found in Intel chips

The company’s researchers discovered that a vulnerability in the CSME boot ROM can pose a serious risk to users and organizations relying on Intel protection technology.

“An early-stage vulnerability in ROM enables control over reading of the Chipset Key and generation of all other encryption keys. One of these keys is for the Integrity Control Value Blob (ICVB). With this key, attackers can forge the code of any Intel CSME firmware module in a way that authenticity checks cannot detect. This is functionally equivalent to a breach of the private key for the Intel CSME firmware digital signature, but limited to a specific platform,” Positive Technologies explained in a blog post.

Mark Ermolov, lead specialist of OS and hardware security at Positive Technologies, told SecurityWeek that once an attacker has obtained this chipset key, they can decrypt any data encrypted using Intel Platform Trust Technology (PTT).

“Standard Windows BitLocker hard drive encryption supports Intel PTT if there isn’t a dedicated TPM chip. BitLocker is increasingly used in corporate Windows 10 machines to encrypt drives in order to prevent data theft or exposure. So any data that was encrypted using Intel PTT technology could be decrypted, such as bank account information, passwords and other log-in credentials, and any confidential files relating to intellectual property. Attackers can also write malware to run on Intel CSME with all consequences (stealing private information, completely blocking access to the computer and encrypting information, extorting money and so on),” Ermolov explained.

Advertisement. Scroll to continue reading.

This chipset key can also be abused to forge a device’s Enhanced Privacy ID (EPID) attestation. EPID is used for the remote attestation of trusted systems. It enables the identification of individual computers and it has been used to protect digital content, secure financial transactions, and to provide IoT attestation.

While Intel claims that physical access is required to obtain the key, Positive Technologies says a remote attacker may also be able to achieve this task if they have access to the targeted PC.

Once the key has been obtained, Ermolov says, “the attacker, being at any place and at any time, can pretend to be the victim’s computer and, for example, perform financial operations on his behalf. Access to the victim’s computer is no longer needed.”

Positive Technologies has found a way to recover an encrypted chipset key, but in order to decrypt it they need a hardware key, which is strongly protected and they have yet to obtain it. However, the company believes it’s only a matter of time and pointed out that the same hardware key is used for an entire chipset model. Ermolov estimates that the hardware key will be obtained by the middle of 2020.

This means that, for the time being, the EPID remote certification scheme cannot be hacked, but Ermolov says an attacker can already achieve arbitrary code execution with elevated privileges on the CSME.

Positive Technologies has compared the vulnerability to an unpatchable iOS bootrom exploit released last year.

Intel has described the vulnerability as an insufficient access control issue that impacts CSME, as well as the Trusted Execution Engine Interface (TXE) and Server Platform Services (SPS).

Positive Technologies says Intel has been trying to address the issue by blocking potential exploitation vectors. The cybersecurity firm claims Intel has only patched one vector, but its experts believe there are multiple other ways to exploit the flaw.

Intel updated its initial advisory last month to credit Positive Technologies. The tech giant has emphasized previously provided security guidance related to CVE-2019-0090, advising users to prevent physical access to their devices, installing updates as soon as they become available, and ensuring that they can detect and prevent intrusions and exploitation.

Related: CacheOut/L1DES: New Speculative Execution Attack Affecting Intel CPUs

Related: Intel MDS Vulnerabilities: What You Need to Know

Related: Millions of Devices With Intel CPUs Exposed to SWAPGS Attack

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...