• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Major Intel NUC Security Vulnerability Uncovered

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
46,354 (7.68/day)
Location
Hyderabad, India
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard ASUS ROG Strix B450-E Gaming
Cooling DeepCool Gammax L240 V2
Memory 2x 8GB G.Skill Sniper X
Video Card(s) Palit GeForce RTX 2080 SUPER GameRock
Storage Western Digital Black NVMe 512GB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
A major security vulnerability got uncovered, affecting Intel NUC (next-unit of computing) compact system boards featuring 5th and 6th generation Core processors. It involves a BIOS-level security hole, with which an attacker with local administrative privileges can make their malware access the "system management mode," a special BIOS-level user-state, and take full control of the platform.

Intel has since released corrective BIOS updates for its 6th generation "Swift Canyon," 6th generation "Grass Canyon" and "Pinnacle Canyon" boards; and 5th generation "Rock Canyon" boards. Even the performance-oriented "Skull Canyon" NUC, which features Intel's powerful onboard graphics core, isn't spared from this vulnerability. The latest BIOS update can be installed on affected platforms using the Intel Driver Update Utility.



View at TechPowerUp Main Site
 
Joined
Feb 18, 2006
Messages
5,147 (0.78/day)
Location
AZ
System Name Thought I'd be done with this by now
Processor i7 11700k 8/16
Motherboard MSI Z590 Pro Wifi
Cooling Be Quiet Dark Rock Pro 4, 9x aigo AR12
Memory 32GB GSkill TridentZ Neo DDR4-4000 CL18-22-22-42
Video Card(s) MSI Ventus 2x Geforce RTX 3070
Storage 1TB MX300 M.2 OS + Games, + cloud mostly
Display(s) Samsung 40" 4k (TV)
Case Lian Li PC-011 Dynamic EVO Black
Audio Device(s) onboard HD -> Yamaha 5.1
Power Supply EVGA 850 GQ
Mouse Logitech wireless
Keyboard same
VR HMD nah
Software Windows 10
Benchmark Scores no one cares anymore lols
attacker with local administrative privileges

the world has turned to massive scare tactics on even the dumbest of things.

"This is a vulnerability for your home where someone with the keys and security system codes can wreck your stuff..."

 
Joined
Feb 14, 2012
Messages
2,321 (0.52/day)
System Name msdos
Processor 8086
Motherboard mainboard
Cooling passive
Memory 640KB + 384KB extended
Video Card(s) EGA
Storage 5.25"
Display(s) 80x25
Case plastic
Audio Device(s) modchip
Power Supply 45 watts
Mouse serial
Keyboard yes
Software disk commander
Benchmark Scores still running
Ironically smm is supposed to enhance security. The x86 security model is so complex now, when combined with virtualization, it has to be riddled with undiscovered/unannounced corner cases.
 
Joined
Dec 28, 2012
Messages
3,475 (0.84/day)
System Name Skunkworks
Processor 5800x3d
Motherboard x570 unify
Cooling Noctua NH-U12A
Memory 32GB 3600 mhz
Video Card(s) asrock 6800xt challenger D
Storage Sabarent rocket 4.0 2TB, MX 500 2TB
Display(s) Asus 1440p144 27"
Case Old arse cooler master 932
Power Supply Corsair 1200w platinum
Mouse *squeak*
Keyboard Some old office thing
Software openSUSE tumbleweed/Mint 21.2
the world has turned to massive scare tactics on even the dumbest of things.

"This is a vulnerability for your home where someone with the keys and security system codes can wreck your stuff..."

Local administrator privileges can be acquired via malware. You dont need to PHYSICALLY touch the machine to do so.
 
Joined
Nov 4, 2005
Messages
11,681 (1.73/day)
System Name Compy 386
Processor 7800X3D
Motherboard Asus
Cooling Air for now.....
Memory 64 GB DDR5 6400Mhz
Video Card(s) 7900XTX 310 Merc
Storage Samsung 990 2TB, 2 SP 2TB SSDs and over 10TB spinning
Display(s) 56" Samsung 4K HDR
Audio Device(s) ATI HDMI
Mouse Logitech MX518
Keyboard Razer
Software A lot.
Benchmark Scores Its fast. Enough.
Joined
Apr 1, 2014
Messages
502 (0.14/day)
System Name Personal Rig
Processor Intel i5 3570K
Motherboard Asus P8Z77-V
Cooling Noctua NH-U12P Push/Pull
Memory 8GB 1600Mhz Vengeance
Video Card(s) Intel HD4000
Storage Seagate 1TB & 180GB Intel 330
Display(s) AOC I2360P
Case Enermax Vostok
Audio Device(s) Onboard realtek
Power Supply Corsair TX650
Mouse Microsoft OEM 2.0
Keyboard Logitech Internet Pro White
Software Legal ;)
Benchmark Scores Very big
sometimes i think intel employs brainless monkeys instead of real coders for their software department.

tell me one piece of software from intel, thats actually any good ?
 

tabascosauz

Moderator
Supporter
Staff member
Joined
Jun 24, 2015
Messages
7,519 (2.33/day)
Location
Western Canada
System Name ab┃ob
Processor 7800X3D┃5800X3D
Motherboard B650E PG-ITX┃X570 Impact
Cooling PA120+T30┃AXP120x67
Memory 64GB 6000CL30┃32GB 3600CL14
Video Card(s) RTX 4070 Ti Eagle┃RTX A2000
Storage 8TB of SSDs┃1TB SN550
Display(s) 43" QN90B / 32" M32Q / 27" S2721DGF
Case Caselabs S3┃Lazer3D HT5
Power Supply Corsair HX1000┃HDPlex
sometimes i think intel employs brainless monkeys instead of real coders for their software department.

tell me one piece of software from intel, thats actually any good ?

No need for such hyperbolic language. We get your point. Intel SSD Toolbox is a fine piece of software for quick firmware updates and convenient checking of SMART attributes for Intel SSDs.
 
Joined
Sep 15, 2011
Messages
6,465 (1.41/day)
Processor Intel® Core™ i7-13700K
Motherboard Gigabyte Z790 Aorus Elite AX
Cooling Noctua NH-D15
Memory 32GB(2x16) DDR5@6600MHz G-Skill Trident Z5
Video Card(s) ZOTAC GAMING GeForce RTX 3080 AMP Holo
Storage 2TB SK Platinum P41 SSD + 4TB SanDisk Ultra SSD + 500GB Samsung 840 EVO SSD
Display(s) Acer Predator X34 3440x1440@100Hz G-Sync
Case NZXT PHANTOM410-BK
Audio Device(s) Creative X-Fi Titanium PCIe
Power Supply Corsair 850W
Mouse Logitech Hero G502 SE
Software Windows 11 Pro - 64bit
Benchmark Scores 30FPS in NFS:Rivals
Both Intel and AMD cpu's are basicly not recommended for fully secured systems. Even that flaw in Intel's NUC is nothing compared to the microcode intel and amd puts into their cpu's: https://libreboot.org/faq/#intel
Unfortunately there are no alternatives, unless going with ARM CPUs that also have their share of vulnerabilities...
 
Joined
Jan 11, 2005
Messages
1,491 (0.21/day)
Location
66 feet from the ground
System Name 2nd AMD puppy
Processor FX-8350 vishera
Motherboard Gigabyte GA-970A-UD3
Cooling Cooler Master Hyper TX2
Memory 16 Gb DDR3:8GB Kingston HyperX Beast + 8Gb G.Skill Sniper(by courtesy of tabascosauz &TPU)
Video Card(s) Sapphire RX 580 Nitro+;1450/2000 Mhz
Storage SSD :840 pro 128 Gb;Iridium pro 240Gb ; HDD 2xWD-1Tb
Display(s) Benq XL2730Z 144 Hz freesync
Case NZXT 820 PHANTOM
Audio Device(s) Audigy SE with Logitech Z-5500
Power Supply Riotoro Enigma G2 850W
Mouse Razer copperhead / Gamdias zeus (by courtesy of sneekypeet & TPU)
Keyboard MS Sidewinder x4
Software win10 64bit ltsc
Benchmark Scores irrelevant for me
technically all hardware connected to a pc is secure if not tampered at production stage and hidden code is inserted in firmware (remember hdd with NSA code?)

there is no such thing as secure system once is connected to internet in my opinion
 
Joined
Aug 20, 2007
Messages
20,759 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64
the world has turned to massive scare tactics on even the dumbest of things.

"This is a vulnerability for your home where someone with the keys and security system codes can wreck your stuff..."


It's a little more complex than that...

Theoretically, with access to the firmware, one could install firmware residing malware that a reinstall would not fix.

It's more like an attacker with keys to your home can claim legal ownership of your home...
 
Joined
Dec 30, 2010
Messages
2,087 (0.43/day)
It was funny to read that Russia switched from all US type of X86 hardware to Arm or related hardware, above documents prove this already that extra security adds extra chances of malware.

World is sickening and the amount of backdoors a PC, router or any device has these days.
 

Solaris17

Super Dainty Moderator
Staff member
Joined
Aug 16, 2005
Messages
25,862 (3.79/day)
Location
Alabama
System Name Rocinante
Processor I9 14900KS
Motherboard EVGA z690 Dark KINGPIN (modded BIOS)
Cooling EK-AIO Elite 360 D-RGB
Memory 64GB Gskill Trident Z5 DDR5 6000 @6400
Video Card(s) MSI SUPRIM Liquid X 4090
Storage 1x 500GB 980 Pro | 1x 1TB 980 Pro | 1x 8TB Corsair MP400
Display(s) Odyssey OLED G9 G95SC
Case Lian Li o11 Evo Dynamic White
Audio Device(s) Moondrop S8's on Schiit Hel 2e
Power Supply Bequiet! Power Pro 12 1500w
Mouse Lamzu Atlantis mini (White)
Keyboard Monsgeek M3 Lavender, Akko Crystal Blues
VR HMD Quest 3
Software Windows 11
Benchmark Scores I dont have time for that.
Joined
Feb 18, 2006
Messages
5,147 (0.78/day)
Location
AZ
System Name Thought I'd be done with this by now
Processor i7 11700k 8/16
Motherboard MSI Z590 Pro Wifi
Cooling Be Quiet Dark Rock Pro 4, 9x aigo AR12
Memory 32GB GSkill TridentZ Neo DDR4-4000 CL18-22-22-42
Video Card(s) MSI Ventus 2x Geforce RTX 3070
Storage 1TB MX300 M.2 OS + Games, + cloud mostly
Display(s) Samsung 40" 4k (TV)
Case Lian Li PC-011 Dynamic EVO Black
Audio Device(s) onboard HD -> Yamaha 5.1
Power Supply EVGA 850 GQ
Mouse Logitech wireless
Keyboard same
VR HMD nah
Software Windows 10
Benchmark Scores no one cares anymore lols
It's a little more complex than that...

Theoretically, with access to the firmware, one could install firmware residing malware that a reinstall would not fix.

It's more like an attacker with keys to your home can claim legal ownership of your home...
no.

more like they can squat in your home until you have the police remove them. Which isn't hard. Nor is rolling back a bios to remove the threat and then loading a new one that isn't vulnerable to it.

at any rate Nuc's are desktop level. Ie no one would bother with this exploit. If they have local admin access they have everything they want already and this exploit is useless to them.

At a server level then sure a bios level back door would be most useful, especially in bigger organizations.
 
Joined
Dec 30, 2010
Messages
2,087 (0.43/day)
It's a shame anyways the hardware you buy these days can never be trusted. Everything includes microcode, that holds a potential backdoor, to any of your personal computer, server, NAS or whatever device you are having. Even your PS3/PS4 that updates every night (loads a new firmware) cannot be held safe.
 
Joined
Aug 20, 2007
Messages
20,759 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64
Which isn't hard. Nor is rolling back a bios to remove the threat and then loading a new one that isn't vulnerable to it.

Any firmware residing malware could block this.
 
Joined
Feb 18, 2006
Messages
5,147 (0.78/day)
Location
AZ
System Name Thought I'd be done with this by now
Processor i7 11700k 8/16
Motherboard MSI Z590 Pro Wifi
Cooling Be Quiet Dark Rock Pro 4, 9x aigo AR12
Memory 32GB GSkill TridentZ Neo DDR4-4000 CL18-22-22-42
Video Card(s) MSI Ventus 2x Geforce RTX 3070
Storage 1TB MX300 M.2 OS + Games, + cloud mostly
Display(s) Samsung 40" 4k (TV)
Case Lian Li PC-011 Dynamic EVO Black
Audio Device(s) onboard HD -> Yamaha 5.1
Power Supply EVGA 850 GQ
Mouse Logitech wireless
Keyboard same
VR HMD nah
Software Windows 10
Benchmark Scores no one cares anymore lols
Any firmware residing malware could block this.
which also can be removed but lets take a tally

1 the hacker uses an exploit to gain full local admin privileges
2 instead of taking what they wanted that exists at this level, they want to compromise this system further by using the bios exploit in the OP
3 to prevent the bios exploit from being removed they then turn to firmware which they load onto something that runs first.
4 they take the spoils from step 1 and wait for IT
5 IT/hired tech/advanced user finds local admin exploit removes and reboots
6 local admin exploit re-appears due to bios exploit
7 IT/hired tech/advanced user searches google on another device, finds article and attempts to load new bios
8 new bios load fails or reverts exploit due to firmware
9 IT/hired tech/advanced user searches google on another device, finds another article and removes firmware while the unit is offline and then uploads new exploit proof bios then loads up OS and removes local admin exploit.

So that's a pita for the hacker who only really wanted the info from step 1, a big pita for the user and techs to remove the thing, and a massive obvious trail of "change all your account info stat!" that the hacker seriously didn't want to happen because that completely undoes all his hard work...

or he could use local admin exploit, gain info, and then wipe his exploit and the trail of it ever happening. That way all the account info remains unchanged and he can now use it himself or sell it. This of course can be fully automated ad would be happening simultaneously to thousands of people on the net who will be using many different devices rather than just these specific models Intel NUCs...

you starting to get the picture? The local admin exploit wasn't platform specific, yet somehow they're supposed to go several extra steps in on one model of pre-builts? One that isn't exactly the no 1 seller.
 
Joined
Aug 20, 2007
Messages
20,759 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64
I won't disagree it's blown out of proportion. My point is it's not a non-issue to a determined, very specific and targeted attack and that's all really. I wouldn't lose much sleep over it but it highlights a strange disconnect between features that are supposed to aid security and their actual impact.
 
Top