Intel's zero-day problem
Intel's zero-day problem
Posted May 4, 2017 9:37 UTC (Thu) by zdzichu (subscriber, #17118)In reply to: Intel's zero-day problem by arekm
Parent article: Intel's zero-day problem
For the record, AMD equivalent of this (Platform Security Processor) is actually an ARM core embedded in x86_64 CPU itself.
Posted May 4, 2017 16:21 UTC (Thu)
by rahvin (guest, #16953)
[Link] (1 responses)
Posted May 6, 2017 8:14 UTC (Sat)
by marcH (subscriber, #57642)
[Link]
It's not very clear what you meant here by "firmware".
Actually, if you hadn't given context then "CPU" wouldn't have been very clear either. I think you meant "SoC".
From https://en.wikipedia.org/wiki/Central_processing_unit
Specifically: (this is all from Wiki using the parent link)Intel's zero-day problem
>Until the release of Nehalem processors, the ME was usually embedded into the motherboard's northbridge, following the Memory Controller Hub (MCH) layout.[37] With the newer Intel architectures (Intel 5 Series onwards), ME is included into the Platform Controller Hub (PCH).[38][39]
The vulnerable processors are Nehalem (2008) and above, this means all vulnerable systems are the ones using the PCH, the replacement for the old north/south system after the northbridge was incorporated into the CPU. This is the largest chip on the motherboard that's not the CPU. Thank you for posting this, I was under the impression the ME was incorporated into the firmware on the CPU.
For those that are curious what the mangement engine can do:
Hardware-based AMT features on laptop and desktop PCs include:
Laptops with AMT also include wireless technologies:
Oh and the ME is active even if the PC isn't powered on.
Intel's zero-day problem
> An IC that contains a CPU may also contain memory, peripheral interfaces, and other components of a computer [like... some Management Engine?]; such integrated devices are variously called microcontrollers or systems on a chip (SoC).