- May 7, 2002
- 10,371
- 762
- 126
This could introduce new ways to get at systems now, you can have compromised phones/flash drives/ or anything else that has a USB port on it, and use it to attack a system.
Then people wonder why sysadmins turn off USB ports.
So far, this is only for Intel U-series CPUs, but, the only good thing about this is, now, some of those closed systems have the possibility to install a different BIOS/OS on them...
Then people wonder why sysadmins turn off USB ports.
So far, this is only for Intel U-series CPUs, but, the only good thing about this is, now, some of those closed systems have the possibility to install a different BIOS/OS on them...
https://www.scmagazine.com/debuggin...seizing-control-via-usb-port/article/630480/?Researchers from Positive Technologies have revealed that some new Intel CPUs contain a debugging interface, accessible via USB 3.0 ports, that can be used to obtain full control over a system and perform attacks that are undetectable by current security tools.
An attacker could use this to bypass all security systems for the embedding of code over a certain period of time, reading all possible data and even making the machine inoperative, for instance by re-writing its BIOS.