Researchers have discovered a new have to be catchable security vulnerability in all Intel-based processors over the last five years. Only the new Generation will not be affected in any way.
Almost all of their processors from Intel, the chip giant over the past five years in the market, it does not contain a severe vulnerability, which is fixable. They told the security researchers from Positive Technologies. Was not catchable gap allows attackers to smuggle Malware on the devices without having to be discovered by anti-virus systems, as reported by Reuters.
Intel-alm: generation of the chip will not be affected
The only good news is that The new processors from Intel, to the tenth Generation shall not be affected by this bug. If not, the difference seems to be a very serious condition. The safety and security, according to experts, it has become a scenario, the reality is, the system architect had the dreaded Intel, as well as the computer experts, and security professionals to the most.
A critical vulnerability has been found in accordance with the a Positive Technology, of all things, and in a Converged Security and Manageability Engine (CSME). This is the part of Hardware that is used on systems that use Intel processors by executing the Firmware on the hardware side, to hold it. The component serving as the first authentication to Intel-based systems, the experts in safety and security. From there on, it’s all in the Firmware that will be loaded on to modern platforms, and has been verified. In addition to this, the CSME is in the cryptography, the Basis for the Intel-developed Hardware, security technologies, such as DRM, and Intel Identity Protection.
Intel tries to close the attack vectors
The compromise is possible at the hardware level, to destroy, according to security experts, the chain of trust for the Intel platform as a Whole. After all, Intel already knows that, since the vulnerability (CVE-2019-0090), that is, the Positive Technology. The group was also aware of the fact that the safety gap, the memory could not be corrected by existing Hardware. In addition, Intel’s attempt to close all potential attack vectors.
On the positive side, however, is that many of the attack scenarios should assume a direct access to the systems. Intel said to Ars Technica that the exploit of the vulnerability on the same Hardware that is particular, you will need to. Are affected, according to the American media, and in any case, both of these systems for private users, as well as those of the business. They are also more vulnerable because their businesses are highly dependent on the security Chip.
What you should know: