Another AMT flaw. It's important to note that this requires *physical access* to exploit. There are few threat models likely to be impacted by the issue. That said, it's a big deal for those who regularly leave laptops unsecured, particularly overseas.https://thehackernews.com/2018/01/intel-amt-vulnerability.html …
-
-
-
Replying to @0DDJ0BB @MalwareJake
This is a well documented and well developed feature originating from 2008
1 reply 0 retweets 1 like -
Replying to @0DDJ0BB @MalwareJake
Unlike a bug, a flaw is often a feature - just one with unwanted consequences.
1 reply 0 retweets 0 likes -
This is clearly a flaw.
1 reply 0 retweets 0 likes -
-
Replying to @0DDJ0BB @MalwareJake
Rich Felker Retweeted Rich Felker
Rich Felker added,
1 reply 0 retweets 0 likes -
Replying to @RichFelker @MalwareJake
This requires physical access. And its an admins fault if they dont change passwords. This isnt a flaw.
1 reply 0 retweets 0 likes -
-
Replying to @RichFelker @MalwareJake
whats your "solution" to this alleged flaw?
1 reply 0 retweets 0 likes
Disabled by default, no default password when enabled.
-
-
Replying to @RichFelker @MalwareJake
You realize this is a chip feature. Its interface is always enabled. Next youre gonna ask bios to be disabled by default. Now i think what might be good is to force admin to setup password at first boot. But its still admins responsibility
1 reply 0 retweets 0 likes -
This isnt a flaw. And the security threat model is super tight on this one. Admins should be configuring responsibly
0 replies 0 retweets 0 likes
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.