A critical vulnerability has been discovered in all Intel processors developed over the past 5 years, making systems vulnerable to hackers. This vulnerability in processors cannot be corrected by patching.
Security researchers are not able to fix it on Intel processors. security bug Discovered. The vulnerability affects Intel's Unified Security and Management Engine (CSME), which controls system boot, power levels, firmware, and most importantly, encryption functions.
Having its own 486-based CPU, RAM, and boot ROM, CSME is the first thing to work when you start your computer. One of the first things this unit does is to protect its own memory, but there is a short moment when it is vulnerable. If hackers have local or physical access to a machine, DMA (direct memory access) can attack.
With the attack, hardware IDs can be imitated, digital content can be captured and data from encrypted hard disks can be decrypted. Because the boot code and RAM are encoded embedded in Intel's CPUs, the vulnerability cannot be patched without changing the silicon.
Microsoft Has Released The Microcode Update That Intel Processor Computers Should Install
Attackers execute malicious code and to chipset switch can access basic parts of the operating system along with the applications and do serious damage. This chipset key is not platform specific, and a single key is used for all Intel processors developed over the past 5 years.
It may sound awful, but exploiting this vulnerability requires high technological knowledge, special equipment, and local or physical access to computers. Once the hackers are inside the system, remote access able to achieve.