Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • IT Management

    New Intel Chip Bug Can Expose All Data on a Computer to Hackers

    Written by

    Wayne Rash
    Published March 30, 2019
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Depending on how you look at it, the Intel technology known as Visualization of Internal Signals Architecture, or VISA, is either a feature or a bug. It exists in the Platform Controller Hub (PCH) of Intel-based computer systems, and it’s controlled by the Intel Management Engine. The role of the VISA technology is to provide a flexible signals analysis processor that can be used in debugging of computer hardware, primarily computer system boards.

      The Intel Management Engine that controls the VISA technology is a small, low-power embedded computer that runs a modified version of the MINIX operating system. While Intel doesn’t talk about the IME, its existence has been known for a few years. The existence of the VISA technology was discovered by security researchers at Positive Technologies last year.

      Intel does have documentation regarding the VISA technology, but it’s protected by an NDA and access is tightly controlled. However, two researchers at Positive Technologies, Maxim Goryachy and Mark Ermolov, report that they’ve discovered the capabilities of the VISA technology, and they’ve found ways to enable it and use the data to discover the inner workings of a computer system that contains it.

      Announced at Black Hat Asia March 28

      The researchers announced their findings at Black Hat Asia on March 28. They said that a vulnerability they’d previously discovered (INTEL-SA-00086) that allowed them to run unsigned code in the Intel Management Engine also allowed them access to the VISA hardware.

      Normally, VISA is disabled on commercial computer systems, but the Positive Technologies team was able to use their access to the IME to enable it. Once they had access, they were able to discern details about the PCH, and from that they were able to find that data from within the computer and its peripherals was able to be read. Essentially, they had full access to everything on the computer.

      In response to the revelation, Intel announced that a 2017 update to the Management Engine made the attack impossible. However, the researchers also said that it was possible to downgrade the firmware to an earlier version and still get access to the VISA hardware and the data for which it had access.

      In response to questions, Goryachy and Ermlov told eWEEK in an email that the vulnerability only affects 6th- generation and later Intel processors, including Skylake and Kaby Lake, and they said it will be in future Intel processors. “It is a debugging technology, but it was hidden from public for internal use only,” they wrote.

      May Help Detect Speculative Execution Attacks

      They also revealed one of the basic reasons that the VISA technology exists, in addition to being used for testing in a manufacturing setting. x86 researchers will find it useful, but most important, it may provide a means of detecting speculative execution attacks, such as Meltdown and Spectre.

      “The main issue while studying the speculative execution is getting feedback from the hardware. This technology provides an exact way to observe the internal state of CPU/SoC and confirm any suppositions,” they said in their email.

      Considering that speculative execution vulnerabilities continue to be found, and that their severity has grown, being able to detect such an attack could be an important tool to fight such an event.

      Meanwhile, it’s also important to develop tools to protect against such attacks, which requires detailed knowledge of how the VISA technology works and how to reach it. Goryachy and Ermolov provided this information in their Black Hat presentation, and you can see the XML they used in the process when you look at the actual slides.

      For those of you who are (like me) seriously geeky, the presentation makes fascinating reading. My guess is that Intel’s next step is going to be finding a way to prevent downgrading the firmware that in turn will prevent at least some of the ways this vulnerability can be exploited.

      Physical Access to VISA Tech Required

      For everyone else, what you need to know is that the only way (right now at least) to gain access to the VISA technology is to have physical access to the computer involved. But once there, all an attacker is likely to need is access to a USB port. The researchers show how this can be done in their presentation.

      But other research has shown that access to the management engine may be possible through a network connection. If that turns out to be the case, then remote hacking becomes possible because physical access is no longer required.

      What this does tell you is that physical security continues to be critically important. It’s now clear that a threat actor with physical access can find a way to siphon off your data in even more ways than you previously knew. But it also means that you need to monitor your network, especially those segments that contain machines with critical data, and to find intrusions when they begin—not at some point while they’re already ongoing.

      Meanwhile, one hopes that Intel will find a way to permanently disable the features that aren’t needed when their chips and system boards leave the manufacturing line.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.