US government warns businesses about cyber bug in Intel chips
["china"]
The US government on Tuesday urged businesses to act on an Intel Corp. alert about security flaws in widely used computer chips as industry researchers scrambled to understand the impact of the newly disclosed vulnerability.
Homeland Security gave the guidance a day after Intel said it had identified security vulnerabilities in remote-management software known as “Management Engine” that shipped with eight types of processors used in business computers sold by Dell Technologies Inc., Lenovo Group Ltd., HP Inc., Hewlett Packard Enterprise Co. and other manufacturers.
Security experts said that it was not clear how difficult it would be to exploit the vulnerabilities to launch attacks, though they found the disclosure troubling because the affected chips were widely used.
The US government on Tuesday urged businesses to act on an Intel Corp. alert about security flaws in widely used computer chips. /Reuters Photo

The US government on Tuesday urged businesses to act on an Intel Corp. alert about security flaws in widely used computer chips. /Reuters Photo

“These vulnerabilities affect essentially every business computer and server with an Intel processor released in the last two years,” said Jay Little, a security engineer with cyber consulting firm Trail of Bits.
For a remote attack to succeed, a vulnerable machine would need to be configured to allow remote access, and a hacker would need to know the administrator’s username and password, Little said. Attackers could break in without those credentials if they have physical access to the computer, he said.
Intel said that it knew of no cases where hackers had exploited the vulnerability in a cyber attack.
Homeland Security advised computer users to review the warning from Intel, which includes a software tool that checks whether a computer has a vulnerable chip. It also urged them to contact computer makers to obtain software updates and advice on strategies for mitigating the threat.
Intel spokeswoman Agnes Kwan said the company had provided software patches to fix the issue to all major computer manufacturers, though it was up to them to distribute patches to computers users.
Attackers could break in without those credentials if they have physical access to the computer, said Jay Little, a security engineer with cyber consulting firm Trail of Bits. /Reuters Photo

Attackers could break in without those credentials if they have physical access to the computer, said Jay Little, a security engineer with cyber consulting firm Trail of Bits. /Reuters Photo

Dell’s support website offered patches for servers, but not a laptop or desktop computers, as of midday Tuesday. Lenovo offered to fix some servers, laptops and tablets and said more updates would be available Friday. An HP representative said the company would soon postfix on its support site.
Security experts noted that it could take time to fix vulnerable systems because installing patches on computer chips is a difficult process.
“Patching software is hard. Patching hardware is even harder,” said Ben Johnson, co-founder of cyber startup Obsidian Security.
Source(s): Reuters