Breaking

Saturday, September 15, 2018

Security Flaw Can Leak Intel ME Encryption Keys

Intel has released updates for Intel ME, SPS, and TXE firmware to address encryption key-spilling flaw.


Chipmaker Intel has released firmware updates on Tuesday for a security flaw that can allow an attacker to recover, modify, or delete data stored on Intel's CPU chip-on-chip system.

The vulnerability affects the Intel Converged Security and Manageability Engine (CSME), which is a separate chip running on Intel CPUs that is used for remote management operations.

The CSME, previously known as the Management Engine BIOS Extension, includes components such as the Intel Management Engine (ME) used with mainstream Intel chipsets, the Server Platform Services (SPS) used for servers, and the Trusted Execution Engine (TXE) used as a remote management engine for tablets and embedded devices.

Intel ME, SPS, and TXE work as a separate computer on top of the main Intel CPU used by the end users. These components come with their own stripped-down OS, memory, network interface, and storage system.

Because these components are needed for out-of-band PC maintenance, they are extremely powerful, and data stored on their internal storage (known as the ME file system, or MFS) is encrypted with four cryptographic keys to ensure privacy and security.

These four cryptographic keys are the Intel Integrity Key, Non-Intel Integrity Key, Intel Confidentiality Key, and Non-Intel Confidentiality Key, each with its different role.

Researchers from Positive Technologies (PT) say they found a way to recover two of these keys --the Non-Intel Integrity Key and Non-Intel Confidentiality Key.

An attacker with access to a Non-Intel Integrity Key can add, delete, or change files on the ME/SPS/TXE's storage system. On the other hand, the Non-Intel Confidentiality Key is used to encrypt the password for the Intel Active Management Technology (AMT), the actual technology that's responsible for providing remote management features at the heart of the ME, SPS, TXE components.

This is not the first time PT researchers have gained access to these keys. Back in 2017, PT researchers used a vulnerability in a debugging interface known as JTAG to recover all four of the encryption keys used by the Intel ME, SPS, and TXE.

This time around, PT researchers say they used the same attack, but instead of aiming to recover the four encryption keys, they used it to get details used to compute the two Non-Intel keys.

Researchers say their new attack gained access to the immutable non-Intel root secret, which is one of the two values, alongside the Intel Security Version Number (SVN), used to compute the Non-Intel keys. Since the SVN is a static value, it was simple to derive the Non-Intel Integrity Key and Non-Intel Confidentiality Key knowing these two values.

Intel has released ME, SPS, and TXE firmware updates on Tuesday that address this vulnerability, tracked as CVE-2018-3655.



1 comment:

  1. I’m impressed, I must say. Really rarely do I encounter a blog that’s both educative and entertaining, and let me tell you, you have hit the nail on the head. Your idea is outstanding; the issue is something that not enough people are speaking intelligently about. I am very happy that I stumbled across this in my search for something relating to this.

    Information
    Click Here

    ReplyDelete