Thursday, May 19, 2022

A new vulnerability in Intel chips now allow attackers to take control of your system

- Advertisement -

According to recent sources, two new security vulnerabilities have been discovered in Intel’s CPUs. These vulnerabilities will essentially let the attacker take control of the device. According to security experts, the flaw is present in all present Intel processors, with a notebook and mobile chips being the most vulnerable. Oh, boy time to head to AMD boys.

Reports indicate that all Intel CPUs have two undocumented instructions that allow you to modify the microcode and gain control over the processor and eventually the device.

The instructions are kept as a fail-safe, but they work in favor of the attacker. From what we know, all Atom-based CPUs have these two instructions, with certain hints indicating that they could be supported by all modern Intel processors.

1280x720-9

So, any hacker with the necessary info can use these instructions to hijack a system, with the results varying from a simple system crash (shutdown) to flashing the processor with a few bits of microcode that can be used to perform a certain task (Scary).

To add to the troubles, the system experts also believe that these instructions can also be activated remotely, however, they require a special mode of operation. These instructions are likely meant for Intel engineers for debugging purposes.

Intel has justified it by stating that the instructions help their engineers to repair and debug the system in extreme cases. But the idea of knowing that our system can be easily taken over by just using two instructions gives me Goosebumps.

- Advertisement -

However, it has been brought to notice that the instructions can only be run in “Red Unlock Mode” which itself is quite hard to enable. According to sources, in the older Intel systems (before Ice Lake), “Red Unlock Mode” can be enabled through known side-channel vulnerabilities.

Since the new system is quite immune to the vulnerability, it makes the hack quite hard to accomplish in the real world. And also, only someone with extensive knowledge of the process architecture and design can carry out such an attack which is why this isn’t a well-known vulnerability.

Source

- Advertisement -
spot_img
Nivedita Bangari
Nivedita Bangari
I am a software engineer by profession and technology is my love, learning and playing with new technologies is my passion.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Articles

More To Consider

Stay Connected

13,642FansLike
62FollowersFollow
152FollowersFollow
Boat Lifestyle [CPS] IN

Hot Topics

spot_img

Latest Articles

Trending

Featured

Adblocker detected! Please consider reading this notice.

We've detected that you are using AdBlock Plus or some other adblocking software which is preventing the page from fully loading.

We don't have any banner, Flash, animation, obnoxious sound, or popup ad. We do not implement these annoying types of ads!

We need money to operate the site, and almost all of it comes from our online advertising.

Please add technosports.co.in to your ad blocking whitelist or disable your adblocking software.

×