• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

Intel Platform Vulnerability Lets Malware Erase or Block UEFI Firmware Updates

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
47,741 (7.42/day)
Location
Dublin, Ireland
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard Gigabyte B550 AORUS Elite V2
Cooling DeepCool Gammax L240 V2
Memory 2x 16GB DDR4-3200
Video Card(s) Galax RTX 4070 Ti EX
Storage Samsung 990 1TB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
A new Intel platform vulnerability emerged, chronicled by the company under CVE-2017-5703, dated April 3, which could let malware erase your motherboard UEFI BIOS, or render the EEPROM chip storing it "read-only" forever, preventing future BIOS updates, exploiting vulnerabilities in Intel's implementation of the SPI (serial peripheral interface) on its platforms. The vulnerability affects all Intel processors dating all the way back to 5th generation "Broadwell." The company quietly passed on fixes to its OEM partners to release as BIOS updates.

The vulnerability came to light in the public as Lenovo, Intel's largest OEM partner, deployed BIOS updates for its vulnerable products, while detailing it. Lenovo describes the vulnerability as "the configuration of the system firmware device (SPI flash) could allow an attacker to block BIOS/UEFI updates, or to selectively erase or corrupt portions of the firmware." It goes on to add that "this would most likely result in a visible malfunction, but could in rare circumstances result in arbitrary code execution." Intel said it discovered the vulnerability internally and hasn't noticed any exploits in the wild that take advantage of it. "Issue is root-caused, and the mitigation is known and available," the company said in a security advisory. "To Intel's knowledge, the issue has not been seen externally."



View at TechPowerUp Main Site
 
This kind of "silente updates" is non-exception to the rule.

All major companies will do this to prevent mass knowledge and a possible outbreak
 
Intel has such a great handle on security nowadays! :laugh:
 
So my 4th gen Haswell Z97 system isn't vulnerable to this latest thing? Still no BIOS to fix Spectre, though. Thanks, Intel - what's next, exploding chipsets?
 
Makes me so glad that I'm going with AMD Ryzen next week and leaving Intel behind. By going with AMD I get the added benefit of not having to take a shower after the purchase.
 
I'll crack a joke too...

Trusted Execution Platform :laugh:
 
So my 4th gen Haswell Z97 system isn't vulnerable to this latest thing? Still no BIOS to fix Spectre, though. Thanks, Intel - what's next, exploding chipsets?

You probably do have the security update for spectre/meltdown installed via windows update, you should check your patch history.
 
Makes me so glad that I'm going with AMD Ryzen next week and leaving Intel behind. By going with AMD I get the added benefit of not having to take a shower after the purchase.

AMD has it's own set of issues. Take a shower regardless.
 
You probably do have the security update for spectre/meltdown installed via windows update, you should check your patch history.
Here's a screenshot of Inspectre, the small utility to check Spectre and Meltdown vulnerability. My Haswell system has the latest Microsoft updates, but obviously no BIOS update (yet,if ever). When you scroll down in the Inspectre utility, it explains in detail why you're covered or not covered. https://www.grc.com/inspectre.htm This is a tiny (124KB) exe file that runs portable (no install), and it's the easy way to see if your system is vulnerable to either of these exploits. BTW, this is after today's (manual) update to Redstone 4, plus the first cumulative update for rs4 1803.
 

Attachments

  • 1524025453215.png
    1524025453215.png
    404.7 KB · Views: 500
Last edited:
intel is a tiring company with its incompetence in security
 
intel is a tiring company with its incompetence in security
Not just Intel, it's every company. What's tiring is that Intel has the money to do a lot better, but their stockholders would rather pocket the cash Damned capitalism!
 
Back
Top