The flaw, tracked as CVE-2021-0146 was discovered by Positive Technologies. It stems from an overprivileged debugging system that’s insufficiently protected, and can be exploited by attackers to access encrypted files.
According to Positive Technologies, the vulnerability affects the Pentium, Celeron and Atom processors of the Apollo Lake, Gemini Lake and Gemini Lake Refresh platforms, which are popularly used in mobile devices, embedded systems, and Internet of Things (IoT) devices, such as smart home appliances, medical equipment, and smart cars.
We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.
High severity vulnerability
Citing an example of a real world threat, Mark Ermolov, the cybersecurity researcher who discovered the bug, says attackers can use the vulnerability to extract the encryption key and access confidential encrypted information from a lost or stolen laptop.
“The bug can also be exploited in targeted attacks across the supply chain. For example, an employee of an Intel processor-based device supplier could, in theory, extract the Intel CSME [Converged Security and Management Engine] firmware key and deploy spyware that security software would not detect,” adds Ermolov.
Furthermore, the severity of the vulnerability can be assessed from the fact that it can also facilitate the extraction of the root encryption key used in Intel Platform Trust Technology (PTT) and Intel Enhanced Privacy ID (EPID) technologies.
Ermolov says several Amazon e-book models use Intel EPID-based protection for digital rights management (DRM), and the bug can enable attackers to break into the devices and download DRM-protected content.
The good news is that Intel has released a firmware update to mitigate this flaw, and the researchers suggest users immediately install the UEFI BIOS updates published by the manufacturers of their affected devices.
- Keep protecting your computers against all kinds of cyber-attacks with these best endpoint protection tools
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.