LONDON – The U.S. government on Tuesday urged businesses to act on an Intel Corp. alert about security flaws in widely used computer chips, and industry researchers scrambled to understand the impact of the newly disclosed vulnerability.
The Department of Homeland Security gave the guidance a day after Intel said it had identified security vulnerabilities in remote-management software, known as Management Engine, that shipped with eight types of processors used in business computers sold by Dell Technologies, Lenovo Group, HP, Hewlett Packard Enterprise and other manufacturers.
Security experts said it was not clear how difficult it would be to exploit the vulnerabilities to launch attacks, though they found the disclosure troubling because the affected chips are widely used.
“These vulnerabilities affect essentially every business computer and server with an Intel processor released in the last two years,” said Jay Little, a security engineer with the cyberconsulting firm Trail of Bits.
For a remote attack to succeed, a vulnerable machine would need to be configured to allow remote access and a hacker would need to know the administrator’s user name and password, Little said. Attackers could break in without those credentials if they had physical access to the computer.
Intel said it knew of no cases where hackers had exploited the vulnerability.
The Department of Homeland Security advised computer users to review the warning from Intel, which includes a software tool that checks whether a computer has a vulnerable chip. It also urged them to contact computer makers to obtain software updates and advice on strategies for mitigating the threat.
Intel spokeswoman Agnes Kwan said the company had provided software patches to fix the issue to all major computer manufacturers, though it was up to them to distribute patches to computers users.
Dell’s support website offered patches for servers on Tuesday, but not yet laptop or desktop computers. Lenovo offered fixes for some servers, laptops and tablets and said more updates would be available Friday. HP posted patches to its website on Tuesday evening.
Security experts noted that it could take time to fix vulnerable systems because installing patches on computer chips is a difficult process.
“Patching software is hard. Patching hardware is even harder,” said Ben Johnson, co-founder of the cyberstartup Obsidian Security.
In a time of both misinformation and too much information, quality journalism is more crucial than ever.
By subscribing, you can help us get the story right.