Notebookcheck

Eureka! The Intel Management Engine can finally be disabled, thanks to the NSA

Deep digging into the Intel ME firmware has finally enabled security researchers to disable its functioning. (Source: Positive Technologies)
Deep digging into the Intel ME firmware has finally enabled security researchers to disable its functioning. (Source: Positive Technologies)
Researchers have found a way to disable a much hated component of Intel CPUs — the Intel Management Engine, thanks in part to the NSA's High Assurance Platform (HPA) program.

Working For Notebookcheck

Are you a loyal reader of notebookcheck? Are you a techie who knows how to write? Then join our Team!

Especially wanted: 
English-Swedish-Translator - 
Details here
Review Editor - 
Details here
News Editor - Details here

 

 

 

 

 

 

Researchers from security firm, Positive Technologies have just stumbled upon something truly phenomenal. They have found a method to disable the much hated Intel Management Engine (ME) in a way that still allows the computer to boot up. This discovery could potentially secure many businesses and state institutions from being compromised by highly sophisticated malware.

What is the Intel ME anyways?

The Intel ME is an embedded processor that is part of every Intel Platform Controller Hub (PCH) and runs its own full fledged OS. Think of it as an extra computer within your computer that runs its own firmware. You cannot choose not to have the ME — it comes part of every Intel x86 CPU and chipset and runs independent of the main CPU and the OS. It can also run in the suspend (S3) power state. Therefore, the activities of the ME cannot be audited. The ME implements something called Intel Active Management Technology (AMT) that is capable of accessing any memory address unbeknownst to the main CPU. Since it runs a complete OS in itself, it can run its own TCP/IP server completely bypassing any installed firewall. The ME was originally intended as a way to allow sysadmins to remotely administer and maintain computers. 

What makes it a security concern?

The ME firmware is encrypted with an RSA 2048 algorithm. Despite that, experts have found ways of exploiting the ME firmware and take partial control of the ME and thereby, the computer. As mentioned earlier, the activities of the ME are not audited as it is invisible to the OS. Therefore, any attacker employing a rootkit exploit on the ME firmware can potentially take control of the remote computer and wreak havoc without being detected. As such, the ME has garnered a reputation for being a backdoor and a potentially powerful rootkit mechanism, earning a Ring -3 vulnerability for itself. Researchers have been trying to disable the ME but due to Intel's secrecy of the code and storing it in a non-standard compressed format that needs a hardware decompressor, most of the efforts have been unsuccessful. Any attempt to tamper with the ME firmware has resulted in PCs either refusing to boot up or shutting down immediately after boot as the ME code directly affects the initiation of the main CPU. Currently available methods only serve to slim down the ME firmware but do not completely disable it. As documented by Microsoft, there is an espionage group that exploits the TCP/IP server of the AMT to remotely execute malicious code. A recent vulnerability, CVE-2017-5689, has also been disclosed necessitating the need to address the ME loophole at the earliest.

How could they disable it?

Security research firm, Positive Technologies has finally been able to fully disable the ME. They discovered a hidden bit in the firmware code, which when set to '1' disables the ME after booting up the main CPU. The bit is called 'reserve_hap' and is described in the code as 'High Assurance Platform (HAP) enable'. The HAP is a program by the NSA that lays out a series of rules that vendors should invariably stick to, in order to be approved for secure computing applications. The researchers believe that NSA's rules could have compelled Intel to include the switch as a way to ensure security compliance in institutions dealing with highly sensitive data. 

What is Intel's take on this development?

Intel has been denying (obviously!) allegations that the ME could be a highly latent backdoor. The company has responded to Positive Technologies' breakthrough by saying,

"In response to requests from customers with specialized requirements we sometimes explore the modification or disabling of certain features. In this case, the modifications were made at the request of equipment manufacturers in support of their customer’s evaluation of the US government’s “High Assurance Platform” program.  These modifications underwent a limited validation cycle and are not an officially supported configuration."

What is Positive Technologies' take?

The security researchers who have figured out how to disable the HAP bit do warn that the hack is not fully tested and can potentially brick a lot of systems if not performed under the guidance of a Serial Peripheral Interface (SPI) programmer. The research firm also notes that there are still some more mysteries to be solved with respect to how the HAP bit sets the Boot Guard policies in the firmware.

What can end users do?

The Intel Management Engine allows admins to remotely control PCs on the network and it houses a full OS in its firmware. Vulnerabilities in the firmware code have been doing the rounds ever since the first Core 2 chips were launched in 2006. Updates to the ME firmware are not released via conventional OS update mechanisms and the user is left to the mercy of Intel and its motherboard partners to provide the requisite firmware updates. Although all modern PCs running Intel's chips are a theoretical risk of being compromised, exercising due diligence can still win half the battle. The other half is dependent on how Intel addresses the issue going forward.

Source(s)

Read all 3 comments / answer
static version load dynamic
Loading Comments
Comment this article
Please share our article, every link counts!
> Notebook / Laptop Reviews and News > News > News Archive > Newsarchive 2017 08 > Eureka! The Intel Management Engine can finally be disabled, thanks to the NSA
Vaidyanathan Subramaniam, 2017-08-30 (Update: 2017-09- 1)
Vaidyanathan Subramaniam
Vaidyanathan Subramaniam - News Editor
I am a cell and molecular biologist and computers have been an integral part of my life ever since I laid my hands on my first PC which was based on an Intel Celeron 266 MHz processor, 16 MB RAM and a modest 2 GB hard disk. Since then, I’ve seen my passion for technology evolve with the times. From traditional floppy based storage and running DOS commands for every other task, to the connected cloud and shared social experiences we take for granted today, I consider myself fortunate to have witnessed a sea change in the technology landscape. I honestly feel that the best is yet to come, when things like AI and cloud computing mature further. When I am not out finding the next big cure for cancer, I read and write about a lot of technology related stuff or go about ripping and re-assembling PCs and laptops.