Apple left Intel processor management and testing tools unlocked for years

Posted:
in Current Mac Hardware edited October 2018
An exploration of an Intel chipset function known as the Management Engine revealed Apple failed to lock down an undocumented feature until the last High Sierra patch, a vulnerability that could grant a skillful attacker the ability to write data to the RAM of a Mac if left unchecked.




The Intel Management Engine (ME) is a subsystem used to handle tasks during the booting process and in the background, and has been in use since 2008. The Register reports the investigation by security firm Positive Technologies looked into how the subsystem could be abused, as a "side-channel threat" to the processor.

Researchers Maxim Goryachy and Mark Ermolov, who previously were involved in the finding of a related Intel ME firmware flaw one year ago, posted on Tuesday about their latest discovery. In this case, it was about an undocumented feature of Intel ME called Manufacturing Mode, which is meant to ease the manufacturing process for device vendors.

"Intel ME Manufacturing Mode is intended for configuration and testing of the end platform during manufacturing, and as such should be disabled (closed) before sale and shipment to users," the researchers state, before noting that the mode's existence and potential risks surrounding it were not provided in Intel's publicly-available documentation.

The software used to access Manufacturing Mode is part of the Intel ME System Tools. The application is provided to device vendors like Apple to use during the production process, but it is not available to the general public. Ermolov and Goryachy both believe Intel are putting users at risk by not providing public documentation for its technology, including attacks that could result "in data theft, persistent irremovable rootkits, and even 'bricking' of hardware."

Manufacturing Mode is intended to configure platform settings via Field Programming Fuses (FPF), a form of "one-time programmable memory," before shipping. Manufacturing Mode can also specify settings for Intel ME, stored in its own internal file system on Serial Peripheral Interface (SPI) flash memory, in parameters called CVARs (Configurable NVARs, Named Variables.)

The process of setting FPFs is in two steps, with the first being defining the values, possible only under Manufacturing Mode and are saved to temporary memory. The second step, the committing of the FPF values to the Fuses, only occurs when Manufacturing Mode is closed, meaning they are able to be changed at a later date if the mode isn't disabled.

For earlier chipsets used before Apollo Lake, Intel separated out the access rights for the CPU, Gigabit Ethernet, and the Management Engine. If one was compromised, the others are not necessarily affected.

In newer chipset versions, the SPI controllers include what is known as a "Master Grant," which can override any existing access rights in an SPI descriptor, across all elements. In short, if Manufacturing Mode is unlocked, it is possible for an attacker to work around any blocked access to an SPI memory region, simply by changing the configuration.

In turn, this would allow the attacker to write their own data into the now-accessible sections.

In their research, the analysts tested notebooks from Lenovo and Apple, and found that Manufacturing Mode was still accessible in the MacBook Pro, indicating Apple had failed to disable the feature. The Yoga and ThinkPad notebooks from Lenovo did not have any Manufacturing Mode issues.

The researchers reported their findings of the vulnerability, identified as CVE-2018-4251, to Apple earlier this year. A patch was produced and included in the macOS High Sierra 10.13.5 update in June.

Apple's support page describes the patch as relating to Firmware, stating "A malicious application with root privileges may be able to modify the EFI flash memory region," and that "a device configuration issue was addressed with an updated configuration."

To end users, there is little to do other than to keep macOS up to date, and if they had not applied the patch in question, to do so soon.

The news of the vulnerability is the latest in a long line of Intel-related security issues that have plagued the company over the last year. In January, the Spectre and Meltdown fiasco involved security holes in the processors that granted access to protected kernel memory data, with fixes for the design flaws hampering performance for some users.

A second wave of Spectre-style security flaws were found in May, stemming from the same design-related issues. More recently, the Foreshadow vulnerability was found to attack Secure Guard Extensions (SGX), which allowed for an attacker to read protected user data from a supposedly secure section of the chip's onboard memory.

Comments

  • Reply 1 of 11
    bcodebcode Posts: 141member
    The good ol' "Security through Obscurity" model... That worked out so well for Microsoft.
    dysamoriajony0watto_cobra
  • Reply 2 of 11
    Rayz2016Rayz2016 Posts: 6,957member
    And that is the right and proper way to report a vulnerability. 
    Soliwatto_cobra
  • Reply 3 of 11
    MplsPMplsP Posts: 3,929member
    Rayz2016 said:
    And that is the right and proper way to report a vulnerability. 
    Agreed - Report to the company, they fix the issue in a reasonable amount of time. I’m torn whether publicizing it is a net good or bad. It gives people with other a system an opportunity to look for the vulnerability, but also lets every hacker in the world know about it. Since the average consumer can’t do anything besides download patches issued by manufacturers, it really ends up being a net negative if there isn’t a patch available.

    The article says this is the latest woe for Intel, but it seems this is all on Apple - intel provided a back door for manufacturing and development use and Apple neglected to lock it when they shipped.
    edited October 2018 baconstangphilboogiemuthuk_vanalingamjony0watto_cobra
  • Reply 4 of 11
    dysamoriadysamoria Posts: 3,430member
    So, no fix for my MacBook Pro 5,5. Yay.
  • Reply 5 of 11
    rob53rob53 Posts: 3,251member
    Apple’s fault or Intel’s for not locking it before shipping them to Apple?
    magman1979watto_cobra
  • Reply 6 of 11
    netroxnetrox Posts: 1,421member
    rob53 said:
    Apple’s fault or Intel’s for not locking it before shipping them to Apple?
    It's a responsibility of a vendor to lock it before shipping to consumers so it's Apple's fault in this case. 
    gatorguybaconstangdysamoriaphilboogiemuthuk_vanalingamjony0
  • Reply 7 of 11
    magman1979magman1979 Posts: 1,293member
    netrox said:
    rob53 said:
    Apple’s fault or Intel’s for not locking it before shipping them to Apple?
    It's a responsibility of a vendor to lock it before shipping to consumers so it's Apple's fault in this case. 
    I would not absolve Intel of wrongdoing here... As stated in the article, Intel hides this function from the public, thereby making it difficult for the security industry to evaluate for threats, and thus are putting us in a position of trusting Intel's security R&D teams to put out secure products.

    As we've seen throughout this year, we CANNOT trust Intel any longer to put out secure hardware.
    watto_cobra
  • Reply 8 of 11
    Rayz2016Rayz2016 Posts: 6,957member
    rob53 said:
    Apple’s fault or Intel’s for not locking it before shipping them to Apple?
    If every other vendor knows to lock it down then I’d say the fault lies with Apple. 
    dysamoriamuthuk_vanalingamjony0
  • Reply 9 of 11
    philboogiephilboogie Posts: 7,675member
    This problem wouldn't exist if people didn't upgrade their software.
  • Reply 10 of 11
    MacProMacPro Posts: 19,727member
    And still little if any info on what the fuck is up with Windows 10 October release.  I updated three PCs, no data loss so far but I haven't turned them on since it was reported, waiting for the patch.
  • Reply 11 of 11
    MacProMacPro Posts: 19,727member
    This problem wouldn't exist if people didn't upgrade their software.
    Yep, I'm still loving Mac OS 4.1 ;)

    MacPro aka Digitalclips


    edited October 2018
Sign In or Register to comment.