Supposedly, it's useful for management tasks in enterprise environments, but if I were CIO, I think I would ban VPro chips. Who wants ring -3 processes running on their network for which they have no information about?
It includes DRM (Protected Audio/Video Path), for one.
There is a driver for it in the Linux kernel source tree.
Looks like it came in maybe around v3.9-rc1?
http://elixir.free-electrons.com/linux/v3.9-rc1/source/drive...
Did any Linux users question what this was at that time?
Is this driver part of the "default" Linux kernel configs?
What if the user compiles their kernel without this driver?
Would that change what could or could not be done by someone accessing the "ME" remotely?
Tried it on i5-6260U, should be new enough to have the thing.
>Ok, I'm /inclined/ to believe that this indicates that the system doesn't implement AMT at all, but I'll try to do some more research.
Search for "vPro" systems here: https://ark.intel.com/Search/FeatureFilter?productType=proce...
Maybe the driver isn't loaded?
Going through all Xeon servers is going to be fun tomorrow.
Did you know that the baseband chip in your smartphone runs it's own linux? Or that every SIM card comes with java applications that can communicate with it? I guess not.
Considering how much hardware is required on a modern PC main board, it's really not that surprising that there are backdoors, bugs, or other mechanisms that can be exploited.
Microkernel
In many if not most cases this kernel would be an L4 implementation.
> OKL4 has been deployed on over 2 billion mobile phones (https://en.wikipedia.org/wiki/Open_Kernel_Labs)
2) AMT. These Intel processors may have a service enabled called Active Management Technology (AMT). Intel says that AMT usually comes disabled by default on "consumer" hardware (but Intel is not too specific about what this means, e.g. prebuilt only or CPUs you buy at the store?). AMT is like a remote desktop feature for the CPU. It allows someone to log in remotely and control the computer or diagnose problems, no matter what the "main" processor's state (even powered off).
3) The vulnerability. Suprise, AMT turns out to have a serious security vulnerability that allows a hacker to take control of the PC.
4) Uncertainty. It is difficult, due to Intel's vagueness, to figure out whether one's CPU even has AMT capability and whether it is turned on ("provisioned") by default. This is compounded by the fact that it is turned on or off by the motherboard BIOS settings but there are tons of motherboards from tons of manufacturers and it's not clear which ones support AMT, whether AMT might be provisioned on a motherboard that does not have any menu option regarding AMT, etc. The chances of motherboard manufacturers relasing information about this, let alone patches, for all their motherboards from the past 8 years, seems slim.
4.1) Linux. In particular, Intel has released a handy "detection guide"[1] that only applies to Windows. Macs are presumably "consumer hardware" only, so that mainly leaves Linux users out to dry.
Please correct me if I missed any details above.
AMT is software so it's part of the BIOS image, not CPU. AFAIK it only works on "vPro" chipsets (Q series) thanks to Intel's market segmentation.
> Does this mean every Intel system built since 2008 can be taken over by hackers?
No. Most Intel systems don't ship with AMT. Most Intel systems with AMT don't have it turned on.
From an FAQ by MJG, the author of the tool we are discussing: https://mjg59.dreamwidth.org/48429.htmlShocked not because I think it's a huge conspiracy to control your computer but because I honestly do believe AMT was made with the best intentions of providing a level of theft mitigation for devices. Just like "Find my Mac" from Apple that seems to get very little flack.
I'd be surprised if this meant that my pretty expensive Lenovo Thinkpad X-series lacks theft protection.
[0] https://support.lenovo.com/us/en/product_security/LEN-14963
dmesg shows: "[ 18.233688] mei_me 0000:00:16.0: Device doesn't have valid ME Interface [ 18.233700] mei_me 0000:00:16.1: Device doesn't have valid ME Interface"
So I'm guessing I'm not vulnerable. I suppose Supermicro replaced it with their own IPMI interface.
# git rev-parse HEAD
9aa755885093fc8ca8c822797a30ed98ffe2e166
# make
gcc mei-amt-check.c -o mei-amt-check
# modprobe mei-me
# ./mei-amt-check -v
Cannot open /dev/mei: No such file or directory
# l /dev/*mei*
/bin/ls: cannot access /dev/*mei*: No such file or directory
# dmesg |grep -i mei
#
A little confusing as the program is supposed to show "Intel AMT: DISABLED" 'If run on a system with no AMT'. Unable to find a Management Engine interface - run sudo modprobe mei_me and retry.
If you receive the same error, this system does not have AMT
(Sounds good) In this state, AMT is not vulnerable to CVE-2017-5689.$ ls /dev/mei0 -lh
crw------- 1 root root 246, 0 May 15 21:02 /dev/mei0
Is there a way to completely remove AMT ?
Think I'd be alright even if it were provisioned as the ethernet port on this Dell Precision laptop got fried during a lightning storm last year (i.e. from reports I've read a wired connection is needed for the exploit to work). Then again, better to know AMT isn't provisioned than to rely on third party reporting.
Has anyone else checked their VMware box accordingly?