Home

Jan 22, 2017

New Intel CPUs Can Be “Hacked” Using The USB Port And A Hardware Feature


On Modern Intel CPUs, the USB 3.0 port can be used to access the hardware debugging interface JTAG via DCI. According to a research duo at Positive Security, the availability of DCI can pose as a major vulnerability allowing the attacker gain full control of the CPU without doing much. However, a security key is required to use DCI which is disabled by default.

Category:IT 

On Modern Intel CPUs, the USB 3.0 port can be used to access the hardware debugging interface JTAG via DCI. According to a research duo at Positive Security, the availability of DCI can pose as a major vulnerability allowing the attacker gain full control of the CPU without doing much. However, a security key is required to use DCI which is disabled by default.

Hardware debugging of stuff like kernel, drivers, hypervisors, etc. on Intel CPUs can be done using the JTAG (Joint Test Action Group) interface. Earlier, JTAG debugging interface could only be accessed using a unique device which had to be connected to the motherboard. 

In later versions, starting from Skylake and Kabylake processors, Intel simplified the connection process and introduced DCI (Direct Connect Interface) which allows JTAG access via the USB 3.0 port present on the machine. This is handy in the case of portable computers like laptops.

According to the Positive Security researchers, Maxim Goryachy and Mark Ermolov, the ability to access CPUs via the USB port can be dangerous. They note that the target computer could be tagged as vulnerable even if the DCI interface is just enabled, there are no software or hardware changes to be made. However, DCI is disabled by default on Intel CPUs. It can be enabled using the BIOS configuration, and a proprietary key is required to access JTAG.

The duo Goryachy and Ermolov demonstrated the vulnerability – at the Chaos Communication Congress (33C3) last year –  which can be used to gain full control of the Intel CPUs. They believe that CPU access mechanisms like this can take destructive USB devices, like Killer USB, to a whole new level.

Here is the demo video:

authorarticle: Master3395

image: 

keywords: intel, hack, usb, cpu, kabylake

Previous Article
Next Article
Discord

Page 1 of 448  >  >>

Samsung Customer Finds Simple Security Glitch That Allows Authentication Bypass in Galaxy S10 Fingerprint Reader

uploads%2Fstory%2Fthumbnail%2F92769%2F01adf382-e1fe-46e7-81da-6df212edaa0d.jpg%2F950x534.jpg

Oct 17, 2019 | Category: General | Comments

Samsung Galaxy S10 Fingerprint Reader Glitch A customer has found a security flaw with her Samsung phone.

read more…

Now you need to update iPhone and Mac - lots of bug fixes

Apple-WWDC-2019-1134548.jpg

Oct 16, 2019 | Category: Apple | Comments

iPadOS also updated.

read more…

Get to taste their own medicine after that

EGTolJ2U4AALtj1.jpeg

Oct 15, 2019 | Category: Apple | Comments

"Remember when we all laughed at Windows UAC"?

read more…

Page 1 of 448  >  >>