This vulnerability has been hidden inside Intel processors for 18 years

TECHi's Author Chastity Mansfield
Opposing Author Pcworld Read Source Article
Last Updated Originally published August 7, 2015 · 3:20 AM EDT
Pcworld View all Pcworld Two Takes by TECHi Read the original story Published August 7, 2015 Updated January 30, 2024
TECHi's Take
Chastity Mansfield
Chastity Mansfield
  • Words 69
  • Estimated Read 1 min

The scariest software vulnerabilities are the ones that have been around for years without us knowing, which is what makes this 18-year-old vulnerability that was recently discovered in the x86 processor architecture so frightening. First disclosed by Christopher Domas, a Battelle Memorial Institute security researcher, at the Black Hat security conference yesterday, this vulnerability could enable hackers to install a rootkit in the processor’s System Management Mode (SMM).

Pcworld

Pcworld

  • Words 165
  • Estimated Read 1 min
Read Article

A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability stems from a feature first added to the x86 architecture in 1997. It was disclosed Thursday at the Black Hat security conference by Christopher Domas, a security researcher with the Battelle Memorial Institute. By leveraging the flaw, attackers could install a rootkit in the processor’s System Management Mode (SMM), a protected region of code that underpins all the firmware security features in modern computers. Once installed, the rootkit could be used for destructive attacks like wiping the UEFI (Unified Extensible Firmware Interface) the modern BIOS or even to re-infect the OS after a clean install. Protection features like Secure Boot wouldn’t help, because they, too rely on the SMM to be secure. The attack essentially breaks the hardware roots of trust, Domas said.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Pcworld

Chome extensions won’t be able to secretly spy on you anymore
Chome extensions won’t be able to secretly spy on you anymore

There's not a single web browser out there that comes with all the features you could ever want, which is…

Sony’s virtual reality headset might support PCs in the future
Sony’s virtual reality headset might support PCs in the future

For obvious reasons, Sony's games and gaming-related products are almost always exclusive to the PlayStation, but that might not be the…

Microsoft has finally started rolling out Windows 10 Mobile
Microsoft has finally started rolling out Windows 10 Mobile

Whatever hype Microsoft managed to generate over Windows 10 Mobile after first announcing it has long since died off, and now…

Dropbox has more than half a billion registered users
Dropbox has more than half a billion registered users

Cloud storage and file synchronization have become an essential part of many people's lives, and Dropbox was one of the…