Home

Jan 22, 2017

New Intel CPUs Can Be “Hacked” Using The USB Port And A Hardware Feature


On Modern Intel CPUs, the USB 3.0 port can be used to access the hardware debugging interface JTAG via DCI. According to a research duo at Positive Security, the availability of DCI can pose as a major vulnerability allowing the attacker gain full control of the CPU without doing much. However, a security key is required to use DCI which is disabled by default.

Category:IT 

On Modern Intel CPUs, the USB 3.0 port can be used to access the hardware debugging interface JTAG via DCI. According to a research duo at Positive Security, the availability of DCI can pose as a major vulnerability allowing the attacker gain full control of the CPU without doing much. However, a security key is required to use DCI which is disabled by default.

Hardware debugging of stuff like kernel, drivers, hypervisors, etc. on Intel CPUs can be done using the JTAG (Joint Test Action Group) interface. Earlier, JTAG debugging interface could only be accessed using a unique device which had to be connected to the motherboard. 

In later versions, starting from Skylake and Kabylake processors, Intel simplified the connection process and introduced DCI (Direct Connect Interface) which allows JTAG access via the USB 3.0 port present on the machine. This is handy in the case of portable computers like laptops.

According to the Positive Security researchers, Maxim Goryachy and Mark Ermolov, the ability to access CPUs via the USB port can be dangerous. They note that the target computer could be tagged as vulnerable even if the DCI interface is just enabled, there are no software or hardware changes to be made. However, DCI is disabled by default on Intel CPUs. It can be enabled using the BIOS configuration, and a proprietary key is required to access JTAG.

The duo Goryachy and Ermolov demonstrated the vulnerability – at the Chaos Communication Congress (33C3) last year –  which can be used to gain full control of the Intel CPUs. They believe that CPU access mechanisms like this can take destructive USB devices, like Killer USB, to a whole new level.

Here is the demo video:

authorarticle: Master3395

image: 

keywords: intel, hack, usb, cpu, kabylake

Previous Article
Next Article
Discord

Page 1 of 491  >  >>

Apple is moving parts of production out of China

apple_airpods.jpeg

Feb 20, 2020 | Category: Apple | Comments

Applies to both AirPods, iPad and Apple Watch.

read more…

Sony closes the PlayStation forum

ps_forum_closure_announcement.jpg

Feb 19, 2020 | Category: General | Comments

Only a few days left.

read more…

The Instagram boss explains why they don't have a dedicated Instagram app

instagram.png

Feb 18, 2020 | Category: IT | Comments

But it is not very credible.

read more…

Page 1 of 491  >  >>