Intel AMT security flaw lets attackers easily bypass laptop passwords

Intel is having a rough start to the year. Following the Meltdown and Spectre fiasco that is ongoing, F-Secure is piling on more bad news, saying Intel's Active Management Technology (AMT) gives attackers an easily exploitable backdoor into potentially millions of laptops.

AMT is Intel's proprietary solution to allow IT admins remote access monitoring and maintenance of corporate-grade systems. It is commonly found on business laptops, particularly those with Intel vPro processors. AMT has had its share of security issues in the past, but this new one is arguably the most concerning issue yet.

"The attack is almost deceptively simple to enact, but it has incredible destructive potential. In practice, it can give a local attacker complete control over an individual’s work laptop, despite even the most extensive security measures," said Harry Sintonen, senior security consultant at F-Secure.

It doesn't take long to exploit the vulnerability, which is part of what makes this especially concerning. In a matter of seconds, an attacker can gain access to an Intel AMT-enabled laptop, even if there's a BIOS password in place. Bitlocker passwords, TPM Pins, and login credentials are no help, either.

An attacker starts by rebooting a target's machine, and then entering the boot menu. Normally this is where an intruder would hit a brick wall if they didn't know the BIOS password. But by selecting Intel's Management Engine BIOS Extension (MEBx), the attacker can log in using the default password "admin," provided it wasn't changed by the user.

"By changing the default password, enabling remote access and setting AMT’s user opt-in to 'None', a quick-fingered cyber criminal has effectively compromised the machine. Now the attacker can gain access to the system remotely, as long as they’re able to insert themselves onto the same network segment with the victim (enabling wireless access requires a few extra steps)," SIntonen explains.

YouTube YouTube
Watch On

The threat is somewhat mitigated by requiring physical access to a target machine, though Sintonen lays out one possible scenario that isn't far-fetched. In his example, two attackers would work together against a target they wish to exploit. They would do this by approaching the potential victim in a public place, like an airport or hotel lobby, and engage in an "evil maid" scenario.

"Essentially, one attacker distracts the mark, while the other briefly gains access to his or her laptop. The attack doesn’t require a lot of time—the whole operation can take well under a minute to complete,” Sintonen says.

Sintonen offers a couple of recommendations to protect against this exploit. One is to set a strong password for AMT. The other is to disable it completely.

Paul Lilly

Paul has been playing PC games and raking his knuckles on computer hardware since the Commodore 64. He does not have any tattoos, but thinks it would be cool to get one that reads LOAD"*",8,1. In his off time, he rides motorcycles and wrestles alligators (only one of those is true).

Latest in Gaming Laptops
The Lenovo Legion LOQ gaming laptop on a blue background
Okay, so it's not technically in the Amazon Big Spring Sale, but this is the cheapest RTX 4070 gaming laptop you'll find today
A promotional image for the Compal Adapt X modular laptop, as presented by the iF Design Foundation
If you've ever wanted to upgrade a laptop with 'modular AI units' then Compal might just have the very thing you're looking for
MSI Raider gaming laptop
Become Dragonforged, achieve dominance
The Dell G16 7630 RTX 4070 gaming laptop on a teal deals background
It might be a bit of a chonk, but this 240 Hz RTX 4070 Dell gaming laptop is a seriously powerful machine for $1,300
The UHPILCL water cooled gaming laptop
This water-cooled gaming laptop packs a full-size desktop RTX 5090 and even fits in a backpack, but I sure wouldn't want it in mine
Lenovo Yoga Solar PC
Lenovo's clever solar-powered laptop can turn 20 minutes of sunlight into an hour of video playback but sun-powered mobile gaming still isn't a goer
Latest in News
An Enshrouded player in a recreation of Erebor from The Lord of the Rings
Kings under the Mountain! 33 Enshrouded players spent 10,000 hours to recreate this iconic location from The Lord of the Rings
A mech awakens.
Mecha Break developer is considering unlocking all mechs following open beta feedback
Lara Croft Unified Art
Tomb Raider developer Crystal Dynamics lays off 17 employees 'to better align our current business needs and the studio's future success'
A long bendy arm stealing money from people in a subway car
'You're a very long arm. You steal things. It's a comedy game,' explains developer of comedy game where you steal things with a very long arm
The heroes are attacked by monsters
Pillars of Eternity is getting turn-based combat to mark its 10th anniversary, and that means PC Gamer editors will soon be arguing about combat mechanics again
Image of Ronaldo from Fatal Fury: City of the Wolves trailer
It doesn't really make sense that soccer star Ronaldo is now a Fatal Fury character, but if you follow the money you can see how it happened