News

Security Researchers Find Hole in Intel's vPro

A pair of researchers are claiming to have sussed out how to circumnavigate the security protections in Intel's vPro remote management technology. Rafal Wojtczuk and Joanna Rutkowska, both of Invisible Things Lab, plan to demonstrate their findings with a proof-of-concept at the Black Hat DC conference, to be held next month in Washington.

Intel appears to be taking the claims of this vulnerability seriously, given the researchers' reputation in the field of IT security as well as the work they've already submitted to the microprocessor company; George Alfrs, an Intel spokesperson, said the company has worked with Rutkowska in the past on other security-related matters.

"This is something we are looking at," Alfrs said.

Neither Intel nor the researchers would discuss the technical details of the vulnerability. Alfrs noted that the company has seen no malicious code that exploits the vulnerability.

According to a statement released by the lab, the attack is based on design flaws within Intel's Trusted Execution Technology (TXT). TXT, part of the Intel vPro offering, is a set of extensions to the CPU and the chipset that allow protected memory and monitored booting. It also offers either local or remote verification through the Trusted Platform Module crypto-processors.

"Our research shows how an attacker can compromise the integrity of a software loaded via an Intel TXT-based loader in a generic way," the researchers wrote in a statement. They claim to have written sample code that subverts the trusted boot process (called tboot) for Linux and the Xen virtualization software.

"Our attack comprises two stages. The first stage requires an implementation flaw in a specific system software. The second stage of the attack is possible thanks to a certain design decision made in the current TXT release," they wrote.

The researchers said they submitted the details of the flaw to Intel in December. Alfrs confirmed that the lab did submit the bug report and that Intel is working with Wojtczuk and Rutkowska to understand the findings.

Since vPro-enhanced microprocessors are a relatively new offering, the technology has not been widely deployed yet, so the danger for misuse is relatively limited, the researchers said. However, one software product that uses the technology is Citrix's Xen virtualization software.

VPro is an Intel-specific implementation of the Desktop and mobile Architecture for System Hardware (DASH), a standard set of interfaces for managing desktop and laptop computers over a network. The vPro interface is a feature on the current versions of the Intel Core 2 Duo and Centrino microprocessors.

About the Author

Joab Jackson is the chief technology editor of Government Computing News (GCN.com).

comments powered by Disqus

Featured

  • Windows Community Toolkit v8.2 Adds Native AOT Support

    Microsoft shipped Windows Community Toolkit v8.2, an incremental update to the open-source collection of helper functions and other resources designed to simplify the development of Windows applications. The main new feature is support for native ahead-of-time (AOT) compilation.

  • New 'Visual Studio Hub' 1-Stop-Shop for GitHub Copilot Resources, More

    Unsurprisingly, GitHub Copilot resources are front-and-center in Microsoft's new Visual Studio Hub, a one-stop-shop for all things concerning your favorite IDE.

  • Mastering Blazor Authentication and Authorization

    At the Visual Studio Live! @ Microsoft HQ developer conference set for August, Rockford Lhotka will explain the ins and outs of authentication across Blazor Server, WebAssembly, and .NET MAUI Hybrid apps, and show how to use identity and claims to customize application behavior through fine-grained authorization.

  • Linear Support Vector Regression from Scratch Using C# with Evolutionary Training

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the linear support vector regression (linear SVR) technique, where the goal is to predict a single numeric value. A linear SVR model uses an unusual error/loss function and cannot be trained using standard simple techniques, and so evolutionary optimization training is used.

  • Low-Code Report Says AI Will Enhance, Not Replace DIY Dev Tools

    Along with replacing software developers and possibly killing humanity, advanced AI is seen by many as a death knell for the do-it-yourself, low-code/no-code tooling industry, but a new report belies that notion.

Subscribe on YouTube