TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

'Unfixable' security flaw in Intel boot ROM

171 pointsby LysPJabout 5 years ago

13 comments

stoicShellabout 5 years ago
The useful gist:<p>&gt; <i>&quot;To fully compromise EPID, hackers would need to extract the hardware key used to encrypt the Chipset Key, which resides in Secure Key Storage (SKS),&quot; explained Positive&#x27;s Mark Ermolov.</i><p>&gt; <i>&quot;However, this key is not platform-specific. A single key is used for an entire generation of Intel chipsets. And since the ROM vulnerability allows seizing control of code execution before the hardware key generation mechanism in the SKS is locked, and the ROM vulnerability cannot be fixed, we believe that extracting this key is only a matter of time.</i><p>&gt; <i>&quot;When this happens, utter chaos will reign. Hardware IDs will be forged, digital content will be extracted, and data from encrypted hard disks will be decrypted.&quot;</i><p>And this formidable response as usual:<p>&gt; <i>Intel says folks should install the firmware-level mitigations, &quot;maintain physical possession of their platform,&quot; and &quot;adopt best security practices by installing updates as soon as they become available and being continually vigilant to detect and prevent intrusions and exploitations.&quot;</i><p>When will it stop? How deep run the flaws in Intel&#x27;s platform? Is AMD equally exposed?
评论 #22559915 未加载
评论 #22558056 未加载
评论 #22560086 未加载
评论 #22560297 未加载
评论 #22560052 未加载
评论 #22559846 未加载
mindslightabout 5 years ago
&gt; <i>This is used for things like providing anti-piracy DRM protections, and Internet-of-Things attestation</i><p>&quot;Internet-of-Things attestation&quot; ?? A poor attempt to stick a refreshing buzzword in front of a fundamentally unwanted user-betraying open-society-undermining technology.<p>Remote attestation does away with the basic foundation of <i>protocols</i> for mediating between mutually-untrusting parties, making it so users must trust the remote party. Imagine if websites attempting to enforce (browser fingerprinting, no image save, anti-adblock, etc) could successfully implement their hostile restrictions!<p>This break is great news for everybody that wants their computer to remain under <i>their own control</i>, rather than an increasingly locked down Big Tech WebTV.
评论 #22560097 未加载
评论 #22560668 未加载
评论 #22564841 未加载
6510about 5 years ago
Perhaps it sounds dumb but when I buy something I want to own it. It doesn&#x27;t seem all that legally complicated? After I buy a thing it should stop doing things for previous owners.
eatonphilabout 5 years ago
The labs team at work wrote a bit [0] about why this is over-hyped (more context in the full post):<p>&gt; Arbitrary code execution is bad! But exploiting this vulnerability requires local access at a minimum, compounded by the attacker needing to exploit a relevant device to gain a foothold on the system. This list of valid footholds is quite limited. For instance, an attacker would need to perform code execution in the ISH or other Platform Controller Hub (PCH) devices — exploiting PCIe devices (like GPUs or RAID controllers) wouldn’t suffice. Additionally, per the original blog post, other methods of exploitation require physical access. Either way, this is limited to incredibly motivated and well-resourced attackers (like a nation-state with a high-value target identified).<p>[0] <a href="https:&#x2F;&#x2F;capsule8.com&#x2F;blog&#x2F;ramming-down-hype-via-intel-csme&#x2F;" rel="nofollow">https:&#x2F;&#x2F;capsule8.com&#x2F;blog&#x2F;ramming-down-hype-via-intel-csme&#x2F;</a>
评论 #22561470 未加载
评论 #22563978 未加载
annoyingnoobabout 5 years ago
So ugly, I can&#x27;t just replace all of our hardware. Remaining forever vigilant is tiring. CPUs are so broken that security is just a facade.
评论 #22558235 未加载
评论 #22559117 未加载
afrcncabout 5 years ago
Duplicate: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22495251" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22495251</a>
amlutoabout 5 years ago
“utter chaos” seems overstated. I’ve never heard of anyone protecting DRM with the TPM on any consumer platform.
评论 #22559181 未加载
评论 #22558350 未加载
评论 #22559775 未加载
hannulaabout 5 years ago
So it seems that the flaw can’t plausibly be exploited by a remote or adjacent attacker or software. So what’s the impact here? Warez scene wreaking havoc with lossless WEB-DLs?
评论 #22562044 未加载
评论 #22561205 未加载
LargoLasskhyfvabout 5 years ago
Seems like something like these start to make sense again if you can live with the limitations:<p><a href="https:&#x2F;&#x2F;www.biostar.com.tw&#x2F;app&#x2F;en&#x2F;mb&#x2F;result.php?model[]=973&amp;model[]=950&amp;" rel="nofollow">https:&#x2F;&#x2F;www.biostar.com.tw&#x2F;app&#x2F;en&#x2F;mb&#x2F;result.php?model[]=973&amp;...</a> should be under 100$
pabs3about 5 years ago
This reminds me of the recent iPhone bootrom vulnerability, which lead to Android on the iPhone:<p><a href="https:&#x2F;&#x2F;checkra.in&#x2F;" rel="nofollow">https:&#x2F;&#x2F;checkra.in&#x2F;</a> <a href="https:&#x2F;&#x2F;projectsandcastle.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;projectsandcastle.org&#x2F;</a>
pontifierabout 5 years ago
Does anyone still trust their computers, or trust that secrets will remain secret?<p>I certainly don&#x27;t.
dependenttypesabout 5 years ago
This is great. It might be able to be used by programs like me cleaner.
tedunangstabout 5 years ago
How many can there be? (Stories about the same issue, I mean.)