Simon Clubley
2017-05-02 20:22:27 UTC
Basically, for machines built around some Intel chipsets, a remote
attacker can use the machine's remote access capabilities to gain
unauthorised access to your hardware and control it remotely.
As this uses the chipset's built-in remote management capabilites,
it operates underneath the level of the operating system.
See https://www.theregister.co.uk/2017/05/01/intel_amt_me_vulnerability/
for details and welcome to an example of the kind of things you are going
to have to watch out for now on x86-64 VMS. :-)
BTW, issues like this are _exactly_ what I was thinking of when I raised
the problem of firmware level security vulnerabilities recently.
Simon.
attacker can use the machine's remote access capabilities to gain
unauthorised access to your hardware and control it remotely.
As this uses the chipset's built-in remote management capabilites,
it operates underneath the level of the operating system.
See https://www.theregister.co.uk/2017/05/01/intel_amt_me_vulnerability/
for details and welcome to an example of the kind of things you are going
to have to watch out for now on x86-64 VMS. :-)
BTW, issues like this are _exactly_ what I was thinking of when I raised
the problem of firmware level security vulnerabilities recently.
Simon.
--
Simon Clubley, ***@remove_me.eisner.decus.org-Earth.UFP
Microsoft: Bringing you 1980s technology to a 21st century world
Simon Clubley, ***@remove_me.eisner.decus.org-Earth.UFP
Microsoft: Bringing you 1980s technology to a 21st century world