Friday, January 22, 11:27
Home inet Researchers are extracting a secret key to encrypt Intel CPU code

Researchers are extracting a secret key to encrypt Intel CPU code

The secret key that encrypts updates on a variety of Intel processors, managed to export for the first time researchers.

Intel

The key makes it possible decryption microcode updates provided by Intel to resolve vulnerabilities and other types of errors. Having an encrypted copy of an update may allow malicious factors to reverse it and learn exactly how to exploit the security gap it fixes. The key can also allow a chip to be updated with other microcodes, although this custom version could not go through the reboot.

The key can be extracted for any chip - be it Celeron, Pentium or Atom - based on its architecture Intel Goldmont.

The quest for discovery began three years earlier, when the Goryachy and Ermolov found a critical vulnerability known as Intel SA-00086, which allowed them to execute code of their choice within the independent core of the chip, which included a subsystem known as Intel Management Engine. Intel fixed it error and a patch was released, but because the chips can always be reverted to an older firmware version and then utilized, there is no way to effectively eliminate the vulnerability.

Five months ago, the trio was able to use the vulnerability to access Red Unlock, a service feature built into an Intel chip. The company's engineers use this mode to detect microcode errors before a chip is released to the public. The researchers named their tool Chip Red Pill, because it allows researchers to experience the internal functions of a chip that is usually out of bounds. The technique works using a USB cable or a special Intel adapter that feeds data to a vulnerable CPU.

Access to a Redmlock-based Goldmont CPU allowed researchers to export a special ROM area known as MSROM. From there, they began the arduous process of reverse microcode engineering. After months of analysis, they were able to discover the update process and the RC4 key it uses. The analysis, however, did not reveal the signature key that Intel uses to cryptographically prove the authenticity of an update. This discovery has raised many questions about safety.

Theoretically it could be possible to use the Chip Red Pill in a malicious attack, through which one could hack a device. However, for such an attack to be successful, the device must be connected. Once restarted, the chip will return to its normal state. In some cases, the ability to execute arbitrary microcode within the CPU can also be useful for attacks on encryption keys, such as those used on trusted platform modules.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

A minor sued Twitter for not removing child pornography material

According to court documents, Twitter received a lawsuit as it allegedly refused to remove child pornography content from its site ....

Microsoft Edge will notify you if your password is compromised

A new built-in password generator and a possibility to monitor the credentials that have leaked to Windows and macOS systems, is released by ...

Teespring: Hacker leaked data of millions of its users!

A hacker leaked data on millions of registered Teespring users on January 17 - an online portal that allows users to create and ...

QNAP: New Dovecat crypto-miner infects NAS devices

QNAP has warned its customers about a new malware (crypto-miner) called Dovecat, which targets NAS (network-attached storage) devices ...

MyFreeCams: Two million files were stolen from the adult site

A database of the popular adult site MyFreeCams, has been leaked to a hacking forum, resulting in the data of its users to ...

FBI: Parler is called in to investigate the Capitol attack

Participants in the January 6 attack on the US Capitol are accused of their actions, as they seem to have published in Parler and ...

Mac: How to see which model you have and when it was released

When you need support for your Mac - or want to install some kind of upgrade - you usually need to know the exact ...
00:02:35

Bill Gates: Will he work with Biden on COVID-19 / climate change?

Microsoft co-founder Bill Gates said on Twitter that he is looking forward to working with the new US President, Joe Biden, and ...

What are the rumors circulating about the iPhone 13?

Apple iPhone 13 will have a redesigned Face ID system that will have a smaller notch at the top of the screen, ...

Biden: How was the political transition in the US captured on social media?

As Joe Biden was sworn in as President of the United States, this important political transition was captured on popular social media. On January 20, ...