TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Two Hidden Instructions Discovered in Intel CPUs Enable Microcode Modification

449 pointsby andrewnicolaldealmost 4 years ago

14 comments

TacticalCoderalmost 4 years ago
&gt; on the good side of things, getting an Intel CPU to enter the red state is not easy to accomplish. In fact, it should never happen unless there are vulnerabilities in the Intel Management Engine (ME), an almost undocumented subsystem present in all Intel CPUs since 2008 that Intel says is required to provide full performance.<p>&quot;unless there are vulnerabilities or backdoors in the Intel Management Engine (ME)&quot;.<p>There, fixed it for you.
评论 #27428183 未加载
评论 #27432550 未加载
评论 #27441235 未加载
评论 #27444999 未加载
userbinatoralmost 4 years ago
My initial guess was &quot;WRMSR, and the 64-bit version of WRMSR&quot;. Fortunately, this appears to be an actually new finding rather than the memorable case a few years back of someone claiming to have discovered something that was clearly documented in the datasheet.<p>The whole idea that there&#x27;s a &quot;red state&quot; and a bunch of others on a CPU, normally hidden, should immediately raise the attention of many who wonder what those extra modes can do, and more interestingly, why they&#x27;re hidden. From the (very little!) research I&#x27;ve done, it appears this is not unlike SGX where <i>only Intel</i> has the key[1] to some part of the hardware you bought from them, and based on some leaked internal documents, it&#x27;s very plausible that this is indeed a backdoor which only they can use. Ostensibly, for debugging purposes. Here&#x27;s a previous comment I made on this: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26521359" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26521359</a><p>[1] If these keys were leaked, which I very much hope will happen at some point, no doubt the &quot;security&quot; community will be heavily against it and spread plenty of FUD about how it makes everyone&#x27;s computers insecure. But IMHO it should be eagerly awaited and received with the same optimism as the other DRM key leaks (HDCP, HDDVD, etc.) --- it is a path to freedom.
评论 #27431695 未加载
Jerry2almost 4 years ago
It&#x27;s interesting that they submitted a paper for a talk at BLACK HAT USA 2021 but were rejected [0]. Looks like geopolitics (and politics) has permeated every aspect of technology.<p>[0] <a href="https:&#x2F;&#x2F;twitter.com&#x2F;h0t_max&#x2F;status&#x2F;1397441062705057793" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;h0t_max&#x2F;status&#x2F;1397441062705057793</a>
评论 #27429624 未加载
评论 #27429550 未加载
评论 #27431649 未加载
sabas123almost 4 years ago
The article is based on the same tweet as this discussion from 3 months ago: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26519693" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26519693</a><p>I also want to state how impressive their work is. These are the true undocumented instruction finders as apposed to sandsifter.
评论 #27430420 未加载
egberts1almost 4 years ago
Rejected? Not a problem. Upcoming talks on Red Pill for Intel Atom.<p><a href="https:&#x2F;&#x2F;zeronights.ru&#x2F;en&#x2F;reports-en&#x2F;chip-red-pill-how-we-achieved-to-execute-arbitrary-microcode-inside-intel-atom-cpus&#x2F;" rel="nofollow">https:&#x2F;&#x2F;zeronights.ru&#x2F;en&#x2F;reports-en&#x2F;chip-red-pill-how-we-ach...</a>
raszalmost 4 years ago
In theory this should open possibility to unlock all the market segmentation gated Intel bullshit like ECC, AVX, multiplier change overclocking, etc. Maybe even manipulating CPUID.
评论 #27428341 未加载
评论 #27434901 未加载
评论 #27429886 未加载
marcan_42almost 4 years ago
TL;DR<p>1. If you control Intel Management Engine (exploit&#x2F;backdoor&#x2F;whatever), you have full control over the system.<p>2. That full control comes with, among everything else, the ability to put the CPU in a deep debug state (&quot;Red Unlock&quot;)<p>3. In Red Unlock, you can basically play with the CPU&#x27;s internals at will using a debug cable (just a modified A-A USB3 cable on many modern systems; &quot;DCI&quot;).<p>4. It turns out that in Red Unlock state there are also undocumented instructions that let you do the same thing straight from code running on the CPU itself.<p>Notice how the security relevance stops at #1. We already know that if you control ME, you control the system. So there is no security impact to this discovery. The prerequisite is already total control.<p>Also notice how what these instructions let you do isn&#x27;t new. The same researchers already showed how to do the same thing via an external debugger (CRBUS access) last year. So this does not open any new capabilities for CPU research.<p>What it does do is make things more convenient. Now you can do this without an external debugger, &quot;only&quot; with an ME patch&#x2F;exploit and code running on the system itself, which means you could e.g. have it apply custom microcode patches on every boot (by patching your UEFI firmware to do it). Also, the USB debug thing doesn&#x27;t work on all motherboards (some are missing the required connections), while this would work.
评论 #27430400 未加载
FpUseralmost 4 years ago
&gt;&quot; Dmitry Sklyarov&quot;<p>I assume he is that famous guy from Elcomsoft who put Adobe and DOJ to shame. Good to know he is still productive.
dataflowalmost 4 years ago
&gt; it allows to craft your own persistent microcode patch without external debugger.<p>These are <i>persistent</i>? Meaning they survive reboots? Is it stored in flash memory on the CPU or something? I thought all microcode updates are re-applied on each boot.
评论 #27429757 未加载
评论 #27427765 未加载
coretxalmost 4 years ago
Clickbait. Only in debug mode.
评论 #27427823 未加载
评论 #27427423 未加载
评论 #27428612 未加载
评论 #27427461 未加载
评论 #27427543 未加载
评论 #27427666 未加载
评论 #27427287 未加载
ozfivealmost 4 years ago
This title should have been appended with &quot; in debug mode.&quot;
anonymousDanalmost 4 years ago
I wonder are there implications for Intel SGX?
timeinputalmost 4 years ago
How did they find these instructions? Did they just try things while in the red state?
intricatedetailalmost 4 years ago
Why is it legal to sell a device without providing full documentation, incl ME?
评论 #27430902 未加载
评论 #27428345 未加载
评论 #27428140 未加载