Intel ‘unable to fix’ critical hardware-encoded CPU flaw

Critical flaw affecting recently-released chips is said to be "exactly what security specialists feared the most"

Some of the most widely-used Intel chips released over the last five years are embedded with a critical vulnerability at the hardware level, as well as within the firmware.

A flaw has been discovered in the Converged Security and Management Engine (CSME) boot ROM on most Intel chipsets and system on a chip (SoC) units available today, apart from 10th-gen CPUs with Ice Point components.

Exploitation could allow an attacker to extract the CPU’s chipset encryption key and compromise the root of trust in a system, according to research published with Positive Technologies. The vulnerability also allows an attacker to conduct arbitrary code execution with zero-level privileges within the Intel CMSE.

The vulnerability is so serious that Intel has advised affected customers to replace hardware in order to fix it.

The range of devices afflicted is very broad, according to Intel. These include CSME-ready chips with SPS firmware for servers, TXE firmware for tablets or low-power devices, DAL software for machines ranging from workstations to IoT devices, and the AMT module used for remote IT management.

Assigned CVE-2019-0090, it was actually first flagged as a highly-severe flaw in May 2019, with Intel releasing a patch to fix what was at the time thought to be a mere firmware bug. It has now emerged this patch only addressed one potential attack vector, involving the Integrated Sensors Hub (ISH), and the root vulnerability goes much deeper.

“The scenario that Intel system architects, engineers, and security specialists perhaps feared most is now a reality,” said Positive Technologies' lead specialist of OS and hardware security Mark Ermolov.

“This vulnerability jeopardizes everything Intel has done to build the root of trust and lay a solid security foundation on the company's platforms. The problem is not only that it is impossible to fix firmware errors that are hard-coded in the Mask ROM of microprocessors and chipsets - the larger worry is that, because this vulnerability allows a compromise at the hardware level, it destroys the chain of trust for the platform as a whole.”

The severity of the flaw is based on not just what it can allow an attacker to do, should they compromise a device, but in the fact that it’s so difficult to remedy. Intel understands, according to Ermolov, that it cannot fix the vulnerability in the ROM of existing hardware, meaning concerned users will have to get their CPUs physically replaced.

It’s similar to the infamous Spectre and Meltdown vulnerabilities discovered several years ago, in that one of the only successful fixes was to physically replace the hardware.

Intel CSME, previously known as the Intel Management Engine BIOS Extension (Intel MEBx), is a security feature that’s the basis for cryptography in CPUs and firmware. It’s responsible for verifying and authenticating all firmware loaded onto Intel-based machines, and is one of the first systems that starts running when a device is booted.

The hardware-encoded vulnerability can be exploited to recover the chipset encryption key as well as the generation of all other encryption keys, however, which would effectively give an attacker access to everything on a device.

"Intel was notified of a vulnerability potentially affecting the Intel Converged Security Management Engine in which an unauthorized user with specialized hardware and physical access may be able to execute arbitrary code within the Intel CSME subsystem on certain Intel products," a spokesperson told IT Pro.

"Intel released mitigations and recommends keeping systems up-to-date. Additional guidance specific to CVE-2019-0090 can be found here."

The firm also recommends that users of chips with Intel CSME, amounting to most chips released over the last five years, contact their device or motherboard manufacturer for microchip or BIOS updates to address the vulnerability.

Since it's impossible to fix the flaw by modifying the chipset ROM, Positive Technologies also recommends disabling Intel CMSE-based encryption, or consider migrating devices to 10th-gen CPUs.

The researchers are planning to release a full-length white paper exploring the flaw in the near future.

Featured Resources

2021 Thales access management index: Global edition

The challenges of trusted access in a cloud-first world

Free download

Transforming higher education for the digital era

The future is yours

Free download

Building a cloud-native, hybrid-multi cloud infrastructure

Get ready for hybrid-multi cloud databases, AI, and machine learning workloads

Free download

The next biggest shopping destination is the cloud

Know why retail businesses must move to the cloud

Free Download

Recommended

Intel no longer considering UK chip plant following Brexit
components

Intel no longer considering UK chip plant following Brexit

7 Oct 2021
Rise to the challenge
Whitepaper

Rise to the challenge

1 Oct 2021
The total economic impact of the Intel vPro® platform
Whitepaper

The total economic impact of the Intel vPro® platform

1 Oct 2021
Google Cloud confirms Intel Ice Lake processor support for N2 VMs
virtual machines

Google Cloud confirms Intel Ice Lake processor support for N2 VMs

30 Sep 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Veritas Backup Exec 21.3 review: Covers every angle
backup software

Veritas Backup Exec 21.3 review: Covers every angle

14 Oct 2021