• Intel Management Engine vulnerability: Microsoft says it doesn’t affect Surface

    You may have heard about the Intel Management Engine security bugs. A spate of research, publicized in the past few weeks, has left a lot of people worried about potential security holes in their processors.

    Lily Hay Newman at Wired puts it this way:

    The Management Engine is an independent subsystem that lives in a separate microprocessor on Intel chipsets; it exists to allow administrators to control devices remotely for all types of functions, from applying updates to troubleshooting. And since it has extensive access to and control over the main system processors, flaws in the ME give attackers a powerful jumping-off point. Some have even called the ME an unnecessary security hazard.

    Intel specifically undertook what spokesperson Agnes Kwan called a “proactive, extensive, rigorous evaluation of the product,” in light of findings that Russian firmware researchers Maxim Goryachy and Mark Ermolov from the vulnerability assessment firm Positive Technologies will present at Black Hat Europe next month. Their work shows an exploit that can run unsigned, unverified code on newer Intel chipsets, gaining more and more control using the ME as an unchecked launch point. The researchers also play with a sinister property of the ME: It can run even when a computer is “off” (just so long as the device is plugged in), because it is on a separate microprocessor, and essentially acts as a totally separate computer.

    Most importantly, the IME bug appears in every recent Intel chip.

    Microsoft Surface devices use Intel chips, so folks have been very concerned that their machines could be hacked using the Goryachy/Ermolov technique.

    Yesterday, Microsoft released an analysis on the Surface blog that says Surface machines are hooked up so that kind of data breach is impossible:

    1. Remote exploit of this vulnerability requires Intel Active Management Technology (AMT). Current Surface devices do not allow remote connectivity to the ME because our devices do not run AMT.

    2. Local exploit of this vulnerability requires Direct Connect Interface (DCI) access via USB, which is not provided on Surface devices.

    It looks like Surface machines are safe from this kind of breach.