A group of security vulnerability researchers, after many months of work, were able to figure out the update process and secret key used to decrypt Intel microcode updates for the Goldmont architecture product lines.
This is an important finding as it peels back yet another layer of the onion that protects the core CPU from malicious manipulations. It allows outsiders to pull back the veil that has obfuscated patch contents, crafted to close vulnerabilities in Intel CPU’s, so they may understand what is exploitable in the processor. This is a leap forward for hardware hackers. It is the next step that assists in dismantling the traditional defense structures that have protected the update process of Intel core CPUs.
The discovered key itself does not represent a direct system hacking threat at the moment, but it will provide researchers a much greater level of access and visibility to the inner workings of the CPU and may likely facilitate the discovery of many other vulnerabilities.
The extracted RC4 secret key employs a symmetric cipher that has known weaknesses dating back to 2001 and has not been considered secure for most usages since 2015. This key handless both the encryption and decryption of data. From all accounts, it appears the signing key, which verifies the legitimacy of a patch, was not compromised. Therefore, it would be difficult to remotely push a maliciously crafted microcode update to systems, as the devices should disregard it because it lacks the necessary authentication.
However, given the access to the key and onboard debug service mode, there may be a possibility that an attacker with direct physical access to the system might be able to run locally modified instructions on a targeted system. There would be limitations but the access and control would potentially be unprecedented. Overall, the greater threat is how this capability will enable the next steps of vulnerability research which could open up much greater avenues of attack.
Dan Goodin, Security Editor at Ars Technica, reached out to Intel for their position, which he published in his outstanding article. The official response from Intel reads like it was written by lawyers and engineers, but absent cybersecurity mindsets. It talks only about the current exposure and not the long-term likely ramifications.
“The issue described does not represent security exposure to customers, and we do not rely on obfuscation of information behind red unlock as a security measure. In addition to the INTEL-SA-00086 mitigation, OEMs following Intel’s manufacturing guidance have mitigated the OEM specific unlock capabilities required for this research. The private key used to authenticate microcode does not reside in the silicon, and an attacker cannot load an unauthenticated patch on a remote system.”
Intel should be worried. The flood of vulnerabilities and exploits in recent months against their products has shown systemic problems. The focus and research against hardware is only increasing and Intel is a prime target. The exposure of the microcode key will help accelerate the discovery of more secrets that pose a risk to the security of Intel’s products.
If you like these updates, click the Like button and be sure to subscribe to the Cybersecurity Insights channel for more rants, news, and perspectives.