Jump to content

Intel's new CPUs are vulnerable to USB hacks

cozz

I skimmed the Youtube presentation source.

 

It seems odd that Intel left this debugging mode in place and it seems like it's more of a feature than a bug.  Someone needs physical access to your machine and be logged in at which point you're completely fucked anyways.  It's only theoretical that someone could actually do something significant with this technique.

 

The real MVP would be hooking up and trying to log in to the TAP in order to do fuse burn.  Then you could do shit like enabling additional cores changing frequencies etc.  That functionality *should* be protected by an unlock code that few people know.

Workstation:  13700k @ 5.5Ghz || Gigabyte Z790 Ultra || MSI Gaming Trio 4090 Shunt || TeamGroup DDR5-7800 @ 7000 || Corsair AX1500i@240V || whole-house loop.

LANRig/GuestGamingBox: 9900nonK || Gigabyte Z390 Master || ASUS TUF 3090 650W shunt || Corsair SF600 || CPU+GPU watercooled 280 rad pull only || whole-house loop.

Server Router (Untangle): 13600k @ Stock || ASRock Z690 ITX || All 10Gbe || 2x8GB 3200 || PicoPSU 150W 24pin + AX1200i on CPU|| whole-house loop

Server Compute/Storage: 10850K @ 5.1Ghz || Gigabyte Z490 Ultra || EVGA FTW3 3090 1000W || LSI 9280i-24 port || 4TB Samsung 860 Evo, 5x10TB Seagate Enterprise Raid 6, 4x8TB Seagate Archive Backup ||  whole-house loop.

Laptop: HP Elitebook 840 G8 (Intel 1185G7) + 3080Ti Thunderbolt Dock, Razer Blade Stealth 13" 2017 (Intel 8550U)

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, Almighty_Spoon said:

IMO you should be doing that anyway, i dont let ANYONE plug something into any of my devices unless its my own..

 

I generally don't, unless it's a friend and I need to share a file, or get a file from them. But even then, some friends.... lol

Specs: CPU - Intel i7 8700K @ 5GHz | GPU - Gigabyte GTX 970 G1 Gaming | Motherboard - ASUS Strix Z370-G WIFI AC | RAM - XPG Gammix DDR4-3000MHz 32GB (2x16GB) | Main Drive - Samsung 850 Evo 500GB M.2 | Other Drives - 7TB/3 Drives | CPU Cooler - Corsair H100i Pro | Case - Fractal Design Define C Mini TG | Power Supply - EVGA G3 850W

Link to comment
Share on other sites

Link to post
Share on other sites

7 hours ago, Bleedingyamato said:

Why do people keep banking info on their home computers?  

I don't..  

Also, you should hide your porn better.  ? lol

Quickbooks is on my computer for accounting and such, but the porn? That's on the server... Just kidding. Sort of... B|

Cor Caeruleus Reborn v6

Spoiler

CPU: Intel - Core i7-8700K

CPU Cooler: be quiet! - PURE ROCK 
Thermal Compound: Arctic Silver - 5 High-Density Polysynthetic Silver 3.5g Thermal Paste 
Motherboard: ASRock Z370 Extreme4
Memory: G.Skill TridentZ RGB 2x8GB 3200/14
Storage: Samsung - 850 EVO-Series 500GB 2.5" Solid State Drive 
Storage: Samsung - 960 EVO 500GB M.2-2280 Solid State Drive
Storage: Western Digital - Blue 2TB 3.5" 5400RPM Internal Hard Drive
Storage: Western Digital - BLACK SERIES 3TB 3.5" 7200RPM Internal Hard Drive
Video Card: EVGA - 970 SSC ACX (1080 is in RMA)
Case: Fractal Design - Define R5 w/Window (Black) ATX Mid Tower Case
Power Supply: EVGA - SuperNOVA P2 750W with CableMod blue/black Pro Series
Optical Drive: LG - WH16NS40 Blu-Ray/DVD/CD Writer 
Operating System: Microsoft - Windows 10 Pro OEM 64-bit and Linux Mint Serena
Keyboard: Logitech - G910 Orion Spectrum RGB Wired Gaming Keyboard
Mouse: Logitech - G502 Wired Optical Mouse
Headphones: Logitech - G430 7.1 Channel  Headset
Speakers: Logitech - Z506 155W 5.1ch Speakers

 

Link to comment
Share on other sites

Link to post
Share on other sites

so we'd be able to mess around the cpus code and other things?

Spoiler

My system is the Dell Inspiron 15 5559 Microsoft Signature Edition

                         The Austrailian king of LTT said that I'm awesome and a funny guy. the greatest psu list known to man DDR3 ram guide

                                                                                                               i got 477 posts in my first 30 days on LinusTechTips.com

 

Link to comment
Share on other sites

Link to post
Share on other sites

15 hours ago, RKRiley said:

If its done through usb ports, surely the hacker would have to be at the computer then? So this wouldn't be a worry for most people at home, or companies.

Other than enthusiasts, who often takes a case apart? If hacking through USB, you could probably install something internally on your yhe USB 3.0 header that would autorun when the PC boots. So those company procured PCs that never get took apart could be very vulnerable. Trade secrets and Hilary's emails galore!

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Ryujin2003 said:

Other than enthusiasts, who often takes a case apart? If hacking through USB, you could probably install something internally on your yhe USB 3.0 header that would autorun when the PC boots. So those company procured PCs that never get took apart could be very vulnerable. Trade secrets and Hilary's emails galore!

Surely the company would notice a strange random bloke walking in, fiddling around with the laptops, and then randomly leaving again.

Unless they somehow installed it before the companies/persons take delivery of the machines

PC - CPU Ryzen 5 1600 - GPU Power Color Radeon 5700XT- Motherboard Gigabyte GA-AB350 Gaming - RAM 16GB Corsair Vengeance RGB - Storage 525GB Crucial MX300 SSD + 120GB Kingston SSD   PSU Corsair CX750M - Cooling Stock - Case White NZXT S340

 

Peripherals - Mouse Logitech G502 Wireless - Keyboard Logitech G915 TKL  Headset Razer Kraken Pro V2's - Displays 2x Acer 24" GF246(1080p, 75hz, Freesync) Steering Wheel & Pedals Logitech G29 & Shifter

 

         

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, RKRiley said:

Surely the company would notice a strange random bloke walking in, fiddling around with the laptops, and then randomly leaving again.

Unless they somehow installed it before the companies/persons take delivery of the machines

Insider threat is the most dangerous. He's the guy that works there, paid off under the table to perform acts like this. The guy who upgrades from a Ford Fiesta to a Jaguar over the weekend.

And yes, I'm saying before delivery. How many places have you worked at where the cases are opened a rend looked at prior to deployment? And if the company contracts the PCs, they can't even tough the hardware. I think it would be pretty easy.

 

Or program something into peripherals. It's not unusual to plug in mice and keyboards. I'm sure that's easily done. If there is a will, there is a way.

Link to comment
Share on other sites

Link to post
Share on other sites

16 hours ago, cozz said:

Worse yet, it is completely undetectable by current security tools.

I use something called eyes.exe to detect if there is a USB stick connected. 

 

Srsly, I dont see any risk. 

 

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Found their initial paper and there are a couple things I want to point out:

1) Affects both Skylake and Kaby Lake, not just Kaby Lake. Only affects -u series processors of both.

 

2) Only works if the UEFI is set up to allow DCI debugging over USB. All vendor firmwares have this disabled by default.

 

3) The attack they detail actually involves modifying a hidden UEFI setting (requires UEFI permissions. This is why you *always* set a password on your BIOS/UEFI.) or flashing a new UEFI (requires admin permissions or physical access to flash the BIOS chip) at which point the system is severely compromised already.

 

Honestly this is more of just a proof that a hardware compromised system can't be trusted than it is showing anything really surprising.

Link to comment
Share on other sites

Link to post
Share on other sites

17 hours ago, RKRiley said:

If its done through usb ports, surely the hacker would have to be at the computer then? So this wouldn't be a worry for most people at home, or companies.

As an Admin for a company with many users that have laptops or portables with U series processors this is a HUGE issue. Where do you get the idea that it doesnt affect companies??

Someone sticks in a usb and can log any and all vpn traffic and credentials, get domain passwords or anything of that nature? Massive security concern for companies.

CPU: Amd 7800X3D | GPU: AMD 7900XTX

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, goodtofufriday said:

As an Admin for a company with many users that have laptops or portables with U series processors this is a HUGE issue. Where do you get the idea that it doesnt affect companies??

Someone sticks in a usb and can log any and all vpn traffic and credentials, get domain passwords or anything of that nature? Massive security concern for companies.

Not without flashing a custom UEFI as long as your IT guy has the UEFI protected properly (Boot guard + password) like he should anyways.

 

And if there's a custom UEFI being flashed your fucked anyways, regardless of your platform.

Link to comment
Share on other sites

Link to post
Share on other sites

15 minutes ago, Sniperfox47 said:

Found their initial paper and there are a couple things I want to point out:

1) Affects both Skylake and Kaby Lake, not just Kaby Lake. Only affects -u series processors of both.

 

2) Only works if the UEFI is set up to allow DCI debugging over USB. All vendor firmwares have this disabled by default.

 

3) The attack they detail actually involves modifying a hidden UEFI setting (requires UEFI permissions. This is why you *always* set a password on your BIOS/UEFI.) or flashing a new UEFI (requires admin permissions or physical access to flash the BIOS chip) at which point the system is severely compromised already.

 

Honestly this is more of just a proof that a hardware compromised system can't be trusted than it is showing anything really surprising.

 

1 minute ago, Sniperfox47 said:

Not without flashing a custom UEFI as long as your IT guy has the UEFI protected properly (Boot guard + password) like he should anyways.

 

And if there's a custom UEFI being flashed your fucked anyways, regardless of your platform.

-Looks at your second point-

 

-discards email blast to underlings-

CPU: Amd 7800X3D | GPU: AMD 7900XTX

Link to comment
Share on other sites

Link to post
Share on other sites

Security is hard. But now I'll have to write a script that disables USB3 ports by default. sigh

damnit Intel. Also, this is the reason I want coreboot or an open bootloader for more devices.

 

Link to comment
Share on other sites

Link to post
Share on other sites

just reading a bit more about it. This is a JTAG exploit!  This is not the first time a chip manufacturer made a security hole with this debugging tool. And with USB3 this is now super convenient.

Link to comment
Share on other sites

Link to post
Share on other sites

16 hours ago, Stefan1024 said:

Forget to disable the debug interface for the final product? Yes this can happen. If they designed it wisely they can disable ut permanently with software (burn the fuse).

I agree completely. Also, if it is true that only some mobile processors are affected this is very likely the reason this happened. The mobile processors were the first to come out right? Maybe they were more in a hurry than it seemed.

Link to comment
Share on other sites

Link to post
Share on other sites

22 hours ago, ARikozuM said:

It isn't. This is merely reinforcing the fact that you need to practice safe techs.

....

 

Practice safe techs

 

Block up them unused USB ports? 

My Rig "Valiant"  Intel® Core™ i7-5930 @3.5GHz ; Asus X99 DELUXE 3.1 ; Corsair H110i ; Corsair Dominator Platinium 64GB 3200MHz CL16 DDR4 ; 2 x 6GB ASUS NVIDIA GEFORCE GTX 980 Ti Strix ; Corsair Obsidian Series 900D ; Samsung 950 Pro NVME + Samsung 850 Pro SATA + HDD Western Digital Black - 2TB ; Corsair AX1500i Professional 80 PLUS Titanium ; x3 Samsung S27D850T 27-Inch WQHD Monitor
 
Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, mark_cameron said:

....

 

Practice safe techs

 

Block up them unused USB ports? 

Make sure that protect bit is in place before extracting...

Back it up twice?

Cor Caeruleus Reborn v6

Spoiler

CPU: Intel - Core i7-8700K

CPU Cooler: be quiet! - PURE ROCK 
Thermal Compound: Arctic Silver - 5 High-Density Polysynthetic Silver 3.5g Thermal Paste 
Motherboard: ASRock Z370 Extreme4
Memory: G.Skill TridentZ RGB 2x8GB 3200/14
Storage: Samsung - 850 EVO-Series 500GB 2.5" Solid State Drive 
Storage: Samsung - 960 EVO 500GB M.2-2280 Solid State Drive
Storage: Western Digital - Blue 2TB 3.5" 5400RPM Internal Hard Drive
Storage: Western Digital - BLACK SERIES 3TB 3.5" 7200RPM Internal Hard Drive
Video Card: EVGA - 970 SSC ACX (1080 is in RMA)
Case: Fractal Design - Define R5 w/Window (Black) ATX Mid Tower Case
Power Supply: EVGA - SuperNOVA P2 750W with CableMod blue/black Pro Series
Optical Drive: LG - WH16NS40 Blu-Ray/DVD/CD Writer 
Operating System: Microsoft - Windows 10 Pro OEM 64-bit and Linux Mint Serena
Keyboard: Logitech - G910 Orion Spectrum RGB Wired Gaming Keyboard
Mouse: Logitech - G502 Wired Optical Mouse
Headphones: Logitech - G430 7.1 Channel  Headset
Speakers: Logitech - Z506 155W 5.1ch Speakers

 

Link to comment
Share on other sites

Link to post
Share on other sites

On 1/11/2017 at 5:42 PM, wcreek said:

Perhaps a USB drive could be infected without the user knowing it. Though I'm not sure how remote the hacker can actually be or if they can rely on other means to get access without being physically present.

If I am understanding this correctly it can  not be run from a flash drive as it would need some kind of processor to access the debug stuff, but also if they can get access they could just make an outbound connection with a malicious machine for remote connection.

Link to comment
Share on other sites

Link to post
Share on other sites

flash drives have processors, so do phones, type-c chargers, monitors, keyboards, mice, random gifts from strangers that look like thinkgeek toys

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×