31.7 C
Delhi

A new vulnerability in Intel chips now allow attackers to take control of your system

According to recent sources, two new security vulnerabilities have been discovered in Intel’s CPUs. These vulnerabilities will essentially let the attacker take control of the device. According to security experts, the flaw is present in all present Intel processors, with a notebook and mobile chips being the most vulnerable. Oh, boy time to head to AMD boys.

Reports indicate that all Intel CPUs have two undocumented instructions that allow you to modify the microcode and gain control over the processor and eventually the device.

The instructions are kept as a fail-safe, but they work in favor of the attacker. From what we know, all Atom-based CPUs have these two instructions, with certain hints indicating that they could be supported by all modern Intel processors.

So, any hacker with the necessary info can use these instructions to hijack a system, with the results varying from a simple system crash (shutdown) to flashing the processor with a few bits of microcode that can be used to perform a certain task (Scary).

- Advertisement -TechnoSports-Ad

To add to the troubles, the system experts also believe that these instructions can also be activated remotely, however, they require a special mode of operation. These instructions are likely meant for Intel engineers for debugging purposes.

Intel has justified it by stating that the instructions help their engineers to repair and debug the system in extreme cases. But the idea of knowing that our system can be easily taken over by just using two instructions gives me Goosebumps.

However, it has been brought to notice that the instructions can only be run in “Red Unlock Mode” which itself is quite hard to enable. According to sources, in the older Intel systems (before Ice Lake), “Red Unlock Mode” can be enabled through known side-channel vulnerabilities.

- Advertisement -TechnoSports-Ad

Since the new system is quite immune to the vulnerability, it makes the hack quite hard to accomplish in the real world. And also, only someone with extensive knowledge of the process architecture and design can carry out such an attack which is why this isn’t a well-known vulnerability.

Source

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Nivedita Bangari
Nivedita Bangari
I am a software engineer by profession and technology is my love, learning and playing with new technologies is my passion.
TechnoSports-Ad

Popular

TechnoSports-Ad

Related Stories

More from author

The list of Airtel SMS packs as of May 2, 2024

Check out the list of Airtel SMS packs, including costs and validity information. We have shared a list of Airtel SMS recharge plans that...

The Best Recharge Plan for Jio as of 2nd May 2024

Best Recharge Plan for Jio in 2024: The Ultimate Guide In the past few months, Jio has introduced and tweaked a slew of new...

My Jio Recharge Plans as of May 2, 2024: Top trending plans from Jio

My Jio Recharge Plans: Since its establishment in 2016, Reliance Jio has made a remarkable impact on the Indian te­lecommunications industry. The company has...

Best RTX 4070 Gaming Laptops in India as of 2024

The top-performing RTX 4070 Gaming Laptops available in India in 2024 are equipped with highly capable CPUs, graphics cards, and memory. These laptops not...