After Spectre and Meltdown, Intel hit by this serious security flaw | HT Tech

After Spectre and Meltdown, Intel hit by this serious security flaw

This flaw allows hackers to gain access to any corporate laptop with seconds.

| Updated on: Jan 15 2018, 12:03 IST
Security flaw in Intel’s AMT lets attackers hack laptops in seconds
Security flaw in Intel’s AMT lets attackers hack laptops in seconds (Benjamin Howell/iStockphoto)

Finnish cyber security company F-Secure has claimed it has found a security flaw in Intel's Active Management Technology (AMT) which can allow a hacker to compromise a work laptop within seconds.

AMT is Intel's proprietary solution for remote access monitoring and maintenance of corporate-grade personal computers, created to allow IT departments or managed service providers to better control their device fleets.

You may be interested in

MobilesTablets Laptops
28% OFF
Samsung Galaxy S23 Ultra 5G
  • Green
  • 12 GB RAM
  • 256 GB Storage
Google Pixel 8 Pro
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage
Vivo X100 Pro 5G
  • Asteroid Black
  • 16 GB RAM
  • 512 GB Storage
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage

The company said that in July 2017 Harry Sintonen, one of F-Secure's Senior Security Consultants, discovered unsafe and misleading default behaviour within Intel's AMT.

Also read
Looking for a smartphone? To check mobile finder click here.

"AMT is no stranger to security weaknesses, with many other researchers finding multiple flaws within the system, but Sintonen's discovery surprised even him," the company said in a blog post.

"The attack is almost deceptively simple to enact, but it has incredible destructive potential. In practice, it can give a local attacker complete control over an individual's work laptop, despite even the most extensive security measures," Sintonen said.

The issue allows a local intruder to backdoor almost any corporate laptop in a matter of seconds, even if the BIOS password, TPM Pin, Bitlocker and login credentials are in place.

"In this case, however, the attacker has a workaround: AMT. By selecting Intel's Management Engine BIOS Extension (MEBx), they can log in using the default password 'admin', as this hasn't most likely been changed by the user," the company said.

By changing the default password, enabling remote access and setting AMT's user opt-in to "None", a quick-fingered cyber criminal has effectively compromised the machine. Now the attacker can gain access to the system remotely, as long as they are able to insert themselves onto the same network segment with the victim.

The successful exploitation of the security issue requires physical proximity.

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on Whatsapp channel,Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 15 Jan, 12:01 IST