[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

All new Intel CPUs are remotely exploitable

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 51
Thread images: 7

File: 1492856302475.jpg (125KB, 450x338px) Image search: [Google]
1492856302475.jpg
125KB, 450x338px
>Remote security exploit in all 2008+ Intel platforms
>Updated: Nehalem through Kaby all remotely and locally hackable

https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/

Is your CPU fucked, /g/?

Is a fix possible or will the only solution be AMD upgrade?
>>
>>60174765
my CPU was released in November 2008.... so I'm probably fine.
>>
>>60174765
AMD has the same shit with a different name.
>>
Intel is the best so it makes sense that we should support them through giving them as much information as possible so they can improve their product even more :3
>>
>>60168584
>>60174106
>>
>>60174784
>November 2008
pretty sure you're fucked.

https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
>>
>>60174843
fuck

is it patchable
>>
From another article:

>Is this a big deal anyway?

>Yes. Fixing this requires a system firmware update in order to provide new ME firmware (including an updated copy of the AMT code). Many of the affected machines are no longer receiving firmware updates from their manufacturers, and so will probably never get a fix. Anyone who ever enables AMT on one of these devices will be vulnerable. That's ignoring the fact that firmware updates are rarely flagged as security critical (they don't generally come via Windows update), so even when updates are made available, users probably won't know about them or install them.

solution is then to buy Coffee Lake, stupid goy.
>>
>claims there to be an exploit
>provides no technical information on it
>unironically uses literally multiple times
Fuck off with this shit-tier wannabe h4x0r garbage. Proof of concept or GTFO.
>>
>>60175280
Intel disclosed the vulnerability on their own site, lmao
>>
Who the hell exposes ME to the internet anyway?
Just put a router in front of your pc and only forward the ports you actually need.
>>
>>60174765
gee I wonder who would have the time and money to develop an exploit. fucking AMD jews.
>>
You will only even have this if you have something like a dell optiplex. Your asus motherboard doesn't even have support for amt.
>>
File: 1491951051004.png (63KB, 633x900px) Image search: [Google]
1491951051004.png
63KB, 633x900px
>>60175280
see the link on intel.com above?

butthurt Intel shill is butthurt. kek
>>
>>60174765
DELET THIS
>>
File: lolnoob hackerman.png (910KB, 1024x1024px) Image search: [Google]
lolnoob hackerman.png
910KB, 1024x1024px
>>60175429
>>
>2017-05-02 23:40:07:(ERROR) : ACU Configurator , Category: Error message: The Intel(R) Management Engine Interface driver is not installed or cannot be accessed. (0xc000001f)

Am... Am I safe?
>>
>>60175576

Oh wait shit nevermind I have an AMD.
>>
Gee it's almost like this is planned obsolescence. After all this vault 7 shit its like they want us to upgrade our older cpus.
>>
>new
Sure, if by new you mean everything from the last 10 years.
>>
File: kys.jpg (39KB, 601x619px) Image search: [Google]
kys.jpg
39KB, 601x619px
>>60174765
>>>/pol/
>>
>This vulnerability does not exist on Intel-based consumer PCs
>>
>>60174860
>is it patchable
Nope.
>>
File: mark-zucky.jpg (48KB, 569x398px) Image search: [Google]
mark-zucky.jpg
48KB, 569x398px
>tfw always a loyal AYYYMD acolyte
>tfw im immune from this plague

shabbos goyim BTFO
>>
>>60176341
just you wait™ AMD will probably be issuing an advisory of their own, this is almost certainly a universal issue
>>
File: 1478539242958.jpg (17KB, 348x342px) Image search: [Google]
1478539242958.jpg
17KB, 348x342px
>>60176228
How the shit is this a /pol/ thread? Are you so wrapped up in brand loyalty that anything that isn't sucking Intel's dick is /pol/, or are you just retarded?
>>
>>60176228
This is related to tech
>>
>>60176264
show us what you're quoting because you're right but no one has a reason to believe you yet
>>
>>60174765
>All 2008+ Intel platforms

No

Only processors with vPro and supported motherboards. So basically only Enterprise cucked systems.
>>
>>60177001
Rip thinkpads
>>
>>60176787

/g/ doesn't care as much as freedumbs as /pol/ does
>>
>https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
>There is an escalation of privilege vulnerability in Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small Business Technology versions firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 that can allow an unprivileged attacker to gain control of the manageability features provided by these products. This vulnerability does not exist on Intel-based consumer PCs.

THIS VULNERABILITY DOES NOT EXIST ON INTEL-BASED CONSUMER PCS
>>
>>60174765
>already patched

boring, the fact that it was in there for almost a decade and barely anyone took advantage of it makes it even more disappointing.
>>
Do you have to be connected to the Internet?
>>
>>60177667
>barely anyone took advantage of it
do you have a single satisfact to snack that up?
>>
>>60175409
Intel, NSA, CIA
>>
>>60174765
What about westmere EP?
>>
File: 1483656240027.png (14KB, 633x524px) Image search: [Google]
1483656240027.png
14KB, 633x524px
>>60177585
>There is an escalation of privilege vulnerability in [INTEL TECHNOLOGIES]
>This vulnerability does not exist on Intel-based consumer PCs.

I don't get it, am I missing something?
>>
I just checked to see how my CPU fared and I realized it's from 2006.

[spoiler]One day I should upgrade my shit but not today.[/spoiler]
>>
Confirmed, those are Mossad processors to manipulate goyim.
>>
Exactly what does this " backdoor" mean? Can they access my encrypted files?
>>
>>60174795
no exploit found for it tho.
>>
>>60181740
They can just read them directly from RAM.
>>
>>60174765

I mean, when will people realize they have no control over the software stack anymore when you have shit like ME, Trustzone etc. This exploit means nothing and neither does the the acknowledgment and "fix" from intel. As long as Intel has a locked down always on hypervisor that cannot be disabled then consumers are always at risk. At least when this shit was on the Northbridge it was easy to hack/disable and now that its on die its an order of magnitude worse.
>>
>>60181789
My encrypted files can be pulled up directly from RAM at all times? Also can anyone just make something to use this backdoor?
>>
>>60181885
The ME could act as a keylogger and record your encryption passwords if Intel wanted it to.
>>
>>60181762

No known exploit. There are cyberarms groups like NSO that have a trove of zero-day exploits that only they know about. Its a million dollar business that has huge stakes to keep that information secret for as long as possible.
>>
>>60174765
>that wall of text
>no proof
opinion discarded
>>
>>60181925
This. FBI buys 0 days from groups like this.
>>
>>60181921
well I'm not saying I trust intel but I mean it's not exploitable by any old faggot off the internet so I mean whatever.
>>
>>60174798
>>>>>>":3"
>>>>>>reddit or 9gag.
Thread posts: 51
Thread images: 7


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.