SINIT Authenticated Code Module Privilege Escalation

Intel ID:  INTEL-SA-00035
Product family:  Intel® Trusted Execution Technology
Impact of vulnerability Elevation of Privilege
Severity rating Important
Original release:  Jul 01, 2013
Last revised:  Jul 01, 2013
Summary: 

Intel® Trusted Execution Technology SINIT modules for 3rd Generation Intel® i5 and i7 vPro and Intel® Xeon® E3-1200 and E3-1200V2 Series Processors are susceptible to a privilege escalation issue. This issue also affects Intel 2nd Generation vPro Core i5 and i7 (SNB) based product family that are using the backwards compatible 3rd Generation vPro Core i5 and i7 (IVB) SINIT ACM. To mitigate this issue, Intel is providing new SINIT ACMs.

Description: 

When Intel® Trusted Execution Technology measured launch environment (MLE) is invoked using affected SINIT Authenticated Code Modules (ACMs), the platform is susceptible to a kernel level attack which may compromise certain SINIT ACM functionality, including launch control policy and System Management Mode (SMM). To mitigate this issue, Intel is providing new SINIT ACMs.

If Intel®TXT is disabled you are not affected by this issue. If you are not actively running Intel®TXT disable it in the BIOS. Consult your owner’s manual for instructions on how to disable Intel TXT in BIOS.” 

Affected products: 

Client and UP Server Processors

Chipset

Vulnerable SINIT ACM version are this or earlier

Fixed SINIT ACM are this version and higher

3rd Generation Intel® Core™ i7 Mobile Extreme Edition Processor Series , 3rd Generation Intel® Core™ i7 and i5 Mobile Processor Series

(Codename: Ivy Bridge)

Intel® QM77 and QS77 Chipset

(Codename: Panther Point-M)

3rd_gen_i5_i7_SINIT_51.BIN

3rd_gen_i5_i7_SINIT_67.BIN

3rd Generation Intel® Core™ i7 and i5 Desktop Processor Series and Intel® Xeon® Processor E3-1200V2 Product Family

(Codename: Ivy Bridge)

Intel® Q77 Express and C216 Chipset

(Codename: Panther Point)

3rd_gen_i5_i7_SINIT_51.BIN

3rd_gen_i5_i7_SINIT_67.BIN

2nd Generation Intel® Core™ i7 Mobile Extreme Edition Processor Series , 2nd Generation Intel® Core™ i7, and i5 Mobile Processor Series

(Codename: Sandy Bridge)

Mobile Intel® QM67, and QS67 Chipset Express

(Codename: Cougar Point-M)

3rd_gen_i5_i7_SINIT_51.BIN

3rd_gen_i5_i7_SINIT_67.BIN

2nd Generation Intel® Core™ i7 and i5 Desktop Processor Series and Intel® Xeon® Processor E3-1200 Product Family

(Codename: Sandy Bridge)

Intel® Q67 Express, C202, C204, C206 Chipsets

(Codename: Cougar Point)

3rd_gen_i5_i7_SINIT_51.BIN

3rd_gen_i5_i7_SINIT_67.BIN

Recommendations: 

While Intel is not aware of any use of the vulnerabilities described in this advisory, Intel has made an updated SINIT Authenticated Code Module (ACM)s available to mitigate this issue by revocation of the old SINIT ACM and releasing a new SINIT ACM. It is highly recommended to apply this updated SINIT Authenticated Code Module (ACM). If you are using a Trusted Execution Technology enabled SW (MLE) that uses SINIT modules v1.1 or older, you are affected. Intel has made updated SINIT modules and revocation tools available to mitigate this issue. Updated SINIT ACM and revocation tools for revoking SINIT ACM 1.1 or older and SINIT ACM 1.2 with a fix can be downloaded from http://software.intel.com/en-us/articles/intel-trusted-execution-technology/.  Intel highly recommends applying these updates as soon as possible.

Acknowledgements: 

N/A - Found during a routine internal code review.

Revision history: 

Revision
Date
Description
1.0
01-July-2013
Initial Release


Disclaimer:

INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” IN CONNECTION WITH INTEL® PRODUCTS. YOUR USE OF THE INFORMATION IN THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. INTEL RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT.



Reporting a security issue

If you have information about a security issue or vulnerability with an Intel product, please send an e-mail to secure@intel.com. Encrypt sensitive information using our PGP public key.

For issues related to Intel managed open source projects, please visit http://www.01.org/security.

Please provide as much information as possible, including:

  • The products and versions affected
  • Detailed description of the vulnerability
  • Information on known exploits

  • A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:

  • Vulnerability handling guidelines

  • Need product support?
    The secure@intel.com e-mail address should only be used for reporting security issues.

    If you...
  • Have questions about the security features of an Intel product
  • Require technical support
  • Want product updates or patches

  • Please visit Support & Downloads.