#1
The China Cyber ​​Security Association (CSAC) has accused ( https://www.theregister.com/2024/10/16/c..._security/ ) Intel of having backdoors in its processors built in at the direction of the US National Security Agency (NSA). According to the CSAC, such vulnerabilities in Intel processors pose a serious threat to China's national security, especially to critical information infrastructure. The Cyber ​​Security Association calls on Chinese security authorities to conduct a thorough investigation of Intel products to protect national interests and consumer rights.

It is alleged ( https://mp.weixin.qq.com/s/rgRmOfoPr7x1TZhyb-1ifg ) that Intel processors since 2008 have had a Management Engine (ME) technology built in, which is part of the widely publicized AMT (Active Management Technology) and allows administrators to remotely execute various commands on a computer. If the function is activated and there is Internet, then access to the computer can be obtained remotely, regardless of whether an operating system is installed on it or not.

Hardware security expert Damien Zammit claims that ME is a backdoor that allows full access to memory, bypass the operating system firewall, send and receive network packets without the user's knowledge. The most unpleasant thing is that the user cannot disable Active Management Technology.

In addition, Chinese experts note the contribution of Russian security researchers in 2017 - Mark Ermolov and Maxim Goryachy from Positive Technologies, who discovered a hidden "switch" ( https://threatpost.com/intel-confirms-it...ch/127739/ ). Kill Switch was presumably created by the US National Security Agency (NSA) and is located in the HAP (High Assurance Platform) bit in the PCHSTERP0 field - this is what the Chinese write.

There is no mention of this in the official documentation. The presence of the Kill Switch suggests that the NSA can disable ME on devices in the US, while ME continues to function in the rest of the world, leaving other systems potentially vulnerable.