Intel chip appears a remote hijacking vulnerability, it has been dormant for 7 years. On Friday, a science and technology analyst published an article saying that the vulnerability is much more serious than imagined, hackers can use loopholes to get a lot of computer control, no need to enter a password. On Monday, it was reported that the vulnerability to bypass the validation of the Intel Technology (Active Management, AMT).
The AMT function allows the system administrator to perform a variety of tasks connected by distance, these tasks include: change the startup code, computer access computer mouse and keyboard and display, loading and executing program, through remote mode will shut down the computer open. In short, AMT allows the user to log on to the computer and control it as an administrator controls the computer through physical contact.
Many vPro processors support AMT technology, if you want to use it through the browser interface remote must enter the password authentication mechanism, however, Intel to enter any text string (or even text are not) can bypass.
Embedi is a security company, Intel believes it is the first to find loopholes in the company, Embedi technical analysts have come to the same conclusion. Embedi will be sent to the results of the analysis in the form of e-mail, not published on the internet.
There's a worse place. In general, no access to authentication is not possible to log on to PC, because AMT must directly access the computer's network hardware. When AMT is enabled, all network packets will be redirected to the Intel Engine Management (Intel), and then managed by the engine to AMT. These packets completely bypass the operating system. According to Embedi's argument, from the beginning of 2010, Intel part of the chip on the existence of the vulnerability, not all chips have.
Intel said on Friday that it expects the PC maker to release a patch in the next week. The new patch will be upgraded in the form of Intel firmware, that is to say, each piece of the chip is to update the firmware vulnerabilities. At the same time, Intel encourages customers to download and run the inspection tool to diagnose whether there are loopholes in the computer. If the tool gives a positive result, indicating that the system is safe for the time being, the patch can be truly secure. Fujitsu, HP, Lenovo and other companies also issued a warning for special models.