36.7 C
Delhi

A new vulnerability in Intel chips now allow attackers to take control of your system

According to recent sources, two new security vulnerabilities have been discovered in Intel’s CPUs. These vulnerabilities will essentially let the attacker take control of the device. According to security experts, the flaw is present in all present Intel processors, with a notebook and mobile chips being the most vulnerable. Oh, boy time to head to AMD boys.

Reports indicate that all Intel CPUs have two undocumented instructions that allow you to modify the microcode and gain control over the processor and eventually the device.

The instructions are kept as a fail-safe, but they work in favor of the attacker. From what we know, all Atom-based CPUs have these two instructions, with certain hints indicating that they could be supported by all modern Intel processors.

So, any hacker with the necessary info can use these instructions to hijack a system, with the results varying from a simple system crash (shutdown) to flashing the processor with a few bits of microcode that can be used to perform a certain task (Scary).

- Advertisement -TechnoSports-Ad

To add to the troubles, the system experts also believe that these instructions can also be activated remotely, however, they require a special mode of operation. These instructions are likely meant for Intel engineers for debugging purposes.

Intel has justified it by stating that the instructions help their engineers to repair and debug the system in extreme cases. But the idea of knowing that our system can be easily taken over by just using two instructions gives me Goosebumps.

However, it has been brought to notice that the instructions can only be run in “Red Unlock Mode” which itself is quite hard to enable. According to sources, in the older Intel systems (before Ice Lake), “Red Unlock Mode” can be enabled through known side-channel vulnerabilities.

- Advertisement -TechnoSports-Ad

Since the new system is quite immune to the vulnerability, it makes the hack quite hard to accomplish in the real world. And also, only someone with extensive knowledge of the process architecture and design can carry out such an attack which is why this isn’t a well-known vulnerability.

Source

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Nivedita Bangari
Nivedita Bangari
I am a software engineer by profession and technology is my love, learning and playing with new technologies is my passion.
TechnoSports-Ad

Popular

TechnoSports-Ad

Related Stories

More from author

The list of Airtel SMS packs as of April 19, 2024

Check out the list of Airtel SMS packs, including costs and validity information. We have shared a list of Airtel SMS recharge plans that...

My Jio Recharge Plans as of April 19, 2024: Top trending plans from Jio

My Jio Recharge Plans: Since its establishment in 2016, Reliance Jio has made a remarkable impact on the Indian te­lecommunications industry. The company has...

The Best Recharge Plan for Jio as of 19th April 2024

Best Recharge Plan for Jio in 2024: The Ultimate Guide In the past few months, Jio has introduced and tweaked a slew of new...

HBO Max in India: Here’s how you can watch the service using VPN (April 17)

HBO Max in India might launch soon but still, we cannot deny that we want to enjoy our favourite HBO shows as soon as...