Remotely Exploitable Vulnerabilities in Intel AMT and ISM Subsystems

Intel has fixed two critical vulnerabilities (CVE-2020-0594, CVE-2020-0595) in the implementation of Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM), which provide interfaces for monitoring and managing hardware. The issues have been assigned the highest severity level (9.8 out of 10 CVSS), as the vulnerabilities allow an unauthenticated attacker over the network to gain access to remote equipment control functions by sending specially crafted IPv6 packets. The problem only appears when AMT is enabled for IPv6 access, which is disabled by default. The vulnerabilities were fixed in firmware updates 11.8.77, 11.12.77, 11.22.77 and 12.0.64.

Recall that modern Intel chipsets are equipped with a separate Management Engine microprocessor that operates independently of the CPU and operating system. The Management Engine hosts tasks that need to be separated from the OS, such as processing protected content (DRM), implementations of TPM (Trusted Platform Module) modules, and low-level interfaces for monitoring and controlling equipment. The AMT interface allows access to power management functions, traffic monitoring, changing BIOS settings, updating firmware, cleaning disks, remote booting a new OS (USB flash drive is emulated from which you can boot), console redirection (Serial Over LAN and KVM over the network), and etc. The interfaces provided are enough to carry out attacks that are used when there is physical access to the system, for example, you can download a Live system and make changes to the main system from it.

Source: opennet.ru

Add a comment