Researchers expose potential exploit of Intel CPUs

Intel x86 architecture could be vulnerable to attack through its System Management Mode mode.

Security researchers have published information and exploit code on how a flaw in Intel CPUs could potentially be exploited for malicious purposes.

Rafal Woijczuk and Joana Rutkowska of Invisible Things Lab, published information on how Intel CPU cache poisoning on x86 architecture could be exploited to take advantage of the SMM (System Management Mode).

Advertisement - Article continues below

They said that they have found two working exploits. One dumps the content of SMRAM, a specially protected region of system memory where the SMM code lives. The other is for arbitrary code execution in SMRAM.

A quote from the paper said: "This is the third attack on SMM memory our team has found within the last 10 months, affecting Intel-based systems.

"It seems that current state of firmware security, even in the case of such reputable vendors as Intel, is quite unsatisfying."

According to the report, French researcher Loic Duflot discovered the same attack in October 2008. He reported the issue direct to Intel, which has been in the process of preparing a workaround for the issue.

Woijczuk and Rutkowska said that Intel employees identified the cache poisoning which is at the root of the problem a few years ago.

Intel informed the researchers that it had been working on a solution to prevent caching attacks on SMM memory for a while, and also engaged with OEMs/BIOS vendors to prevent the attack.

Advertisement
Advertisement - Article continues below

"According to Intel, many new systems are protected against the attack," the researchers said.

"We have found out however, that some of the Intel's recent motherboards, like the popular DQ35, are still vulnerable to the attack."

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/business-strategy/acquisition/355784/intel-scoops-up-rivet-networks-to-boost-wi-fi-offerings
Acquisition

Intel scoops up Rivet Networks to boost Wi-Fi portfolio

26 May 2020
Visit/hardware/355607/trump-administration-and-chipmakers-in-talks-about-us-based-factories
Hardware

Trump administration and chipmakers in talks about US factories

11 May 2020
Visit/software/video-conferencing/355410/zoom-50-adds-256-bit-encryption-and-ui-refresh
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020

Most Popular

Visit/operating-systems/microsoft-windows/355812/microsoft-warns-against-installing-windows-10-may-2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
Visit/security/cyber-security/355797/microsoft-bans-trend-micros-rootkit-buster-from-windows-10
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020
Visit/policy-legislation/data-protection/355835/nhs-yet-to-understand-the-risks-of-holding-test-and-trace
data protection

NHS yet to understand risks of holding Test and Trace data for 20 years

29 May 2020