A new vulnerability in Intel chips now allow attackers to take control of your system

According to recent sources, two new security vulnerabilities have been discovered in Intel’s CPUs. These vulnerabilities will essentially let the attacker take control of the device. According to security experts, the flaw is present in all present Intel processors, with a notebook and mobile chips being the most vulnerable. Oh, boy time to head to AMD boys.

Reports indicate that all Intel CPUs have two undocumented instructions that allow you to modify the microcode and gain control over the processor and eventually the device.

The instructions are kept as a fail-safe, but they work in favor of the attacker. From what we know, all Atom-based CPUs have these two instructions, with certain hints indicating that they could be supported by all modern Intel processors.

So, any hacker with the necessary info can use these instructions to hijack a system, with the results varying from a simple system crash (shutdown) to flashing the processor with a few bits of microcode that can be used to perform a certain task (Scary).

To add to the troubles, the system experts also believe that these instructions can also be activated remotely, however, they require a special mode of operation. These instructions are likely meant for Intel engineers for debugging purposes.

Intel has justified it by stating that the instructions help their engineers to repair and debug the system in extreme cases. But the idea of knowing that our system can be easily taken over by just using two instructions gives me Goosebumps.

However, it has been brought to notice that the instructions can only be run in “Red Unlock Mode” which itself is quite hard to enable. According to sources, in the older Intel systems (before Ice Lake), “Red Unlock Mode” can be enabled through known side-channel vulnerabilities.

Since the new system is quite immune to the vulnerability, it makes the hack quite hard to accomplish in the real world. And also, only someone with extensive knowledge of the process architecture and design can carry out such an attack which is why this isn’t a well-known vulnerability.

Source

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

More like this

The Best App Lockers for Android You Should Know...

Best App Lockers for Android: The Ultimate Guide In the realm of technology, app lockers play a crucial...
SentinelOne cybersecurity

Empowering India’s Cyber Defenses: SentinelOne Cybersecurity Launches Virtual Data...

In an exciting development for India's cybersecurity landscape, SentinelOne Cybersecurity, a global leader in autonomous cybersecurity, has...

AMD Ryzen Master vulnerability allows attackers to take control...

AMD disclosed a new vulnerability, rated 7.2 which is high, in its popular Ryzen Master software utility,...

Cybersecurity: Data of about 6 lakh Indians is reportedly...

As data-harvesting malware or bots proliferate, the data of at least 6 lakh Indians has been stolen...
Cybersecure

Better ‘Cybersecure’ than Sorry

Mr Harsh Bharwani, CEO & Managing Director of Jetking Infotrain tell us about Better ‘Cybersecure’ than Sorry Cybersecurity...

LATEST NEWS

Top 10 Streamed Web Series in India as of January 2025

Top 10 Streamed Web Series in India: Wondering which shows dominated streaming platforms to kick off the new year? Based on data from JustWatch...

Top 10 Streamed Movies in India: January 2025 Blockbusters

Top 10 Streamed Movies in India: As we kick off the new year, streaming platforms continue to dominate the entertainment landscape in India. With...

Australia Face Selection Headache as Pat Cummins and Josh Hazlewood Withdraw from Champions Trophy 2025

Australia's Champions Trophy campaign has taken a major hit as key pacers Pat Cummins and Josh Hazlewood have been officially ruled out due to...

NVIDIA GeForce RTX 5060 Ti & 5060 Stick to 8-Pin PCIe

NVIDIA GeForce RTX 5060: NVIDIA's upcoming GeForce RTX 5060 Ti and RTX 5060 graphics cards are set to maintain the traditional 8-pin PCIe power...

Featured