Out-of-band Management Technology

From Kicksecure
Jump to navigation Jump to search

Such as Intel ME / AMT and AMD PSP. Choosing Suitable Hardware.


A commonly decried hardware feature on modern platforms is the Intel Management Engine (ME) and Active Management Technology (AMT)archive.org.

Intel ME is a non-freedom, complete operating system which runs inside CPU alongside. This can be a security-risk. Completely disabling it is extremely difficult, risks bricking the hardware and can only be done on select hardware.


Out-of-band management has been around since 1998, when it was dubbed the Intelligent Platform Management Interface (IPMI) framework. [1] It consists of a proprietary firmware running on the Baseboard Management Controller (BMC), [2] which is a dedicated micro-controller in enterprise NICs to allow complete remote control over a machine despite its power state. [3]

Modern Intel ME is firmware running on a dedicated micro-controller in all machines, while Intel AMT is the remote access feature introduced as part of the vPro platform. Most Intel hardware produced in the last ten years supports ME and AMT "features". [4] This includes desktops, servers, ultrabooks, tablets, and laptops with the Intel Core vPro processor family (Intel Core i3, i5, i7, and Intel Xeon processor E3-1200 product family). [5] Other popular hardware manufacturers also have an analogous feature to ME. For instance, AMD's "Secure Processor" (formerly "Platform Security Processor") is based in turn on ARM TrustZone technology. [6]


If the Intel ME is shipped with an AMT module which is both enabled and provisioned, then potentially any vulnerabilities might allow attackers to bypass password authentication for the module.

The Electronic Frontier Foundation (EFF) states: [7]

The ME is a largely undocumented master controller for your CPU: it works with system firmware during boot and has direct access to system memory, the screen, keyboard, and network.

Attackers who bypass password authentication can: [7]

  • Interact with the screen or console in a fashion identical to a user.
  • Boot arbitrary operating systems or install new operating systems.
  • Steal disk encryption passwords.

If a system is vulnerable, the effect of this Intel technology is administrators (or hackers) can remotely monitor, maintain, update, upgrade, and repair (or sabotage) computers, even while they are sleeping. This activity is distinct from software-based (in-band) management, since hardware-based management uses TCP/IP stack communication channels (bypassing any firewalls present) and the presence of an OS or locally installed management agent is not required. [8]

Exploitation Risk[edit]

Unfortunately, Intel ME and AMT have created serious security risks, because faults in the design potentially allow remote attackers to access the user's computer secretly and have full control and awareness. [9] On 1 May 2017, these fears were realized when Intel confirmed and patched a remote Elevation of Privilege bug (CVE-2017-5689)archive.org in the ME technology.

Not every machine is susceptible to this attack, even though every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a potentially remotely exploitable security hole. In many cases, AMT is enabled but not provisioned by default for the 1st to 7th generation processors. Nevertheless, if a system is vulnerable (unpatched) the risks include: [9]

  • An unprivileged network attacker gaining system privileges to provisioned Intel management engines.
  • An unprivileged local attacker could provision manageability features to gain unprivileged network or local system privileges.

The safest course of action is for users to disable the AMT module if possible in BIOS and to make sure that LMS is not installed. Failing that, the Intel firmware image should be updated to remove the security vulnerability. [7] It should also be noted it is impossible to completely disable ME and have a functional system: [10]

The disappointing fact is that on modern computers, it is impossible to completely disable ME. This is primarily due to the fact that this technology is responsible for initialization, power management, and launch of the main processor. Another complication lies in the fact that some data is hard-coded inside the PCH chip functioning as the southbridge on modern motherboards. The main method used by enthusiasts trying to disable ME is to remove everything "redundant" from the image while maintaining the computer's operability. But this is not so easy, because if built-in PCH code does not find ME modules in the flash memory or detects that they are damaged, the system will not start.

Privacy and Security Concerns[edit]

The concerns posed by Intel (and partially AMD) firmware are comparable to any other proprietary firmware blob running on a user's system or all its peripherals. Almost every component in a modern computer has firmware running on auxiliary processors of varying architectures, all of which have privileged machine access. The inner workings of firmware binaries can still be investigated and examined for malware via reverse engineering. [11] [12]

Manufacturers are unlikely to insert a malicious backdoor intentionally into every product. The reason is if/when the backdoor was discovered, its intent would be undeniable and it would destroy the reputation of the business and severely impact revenue. Recent disclosures indicate that some adversaries instead favor targeted attacks (product interdiction and implants) to avoid detection for as long as possible. [13] [14] "Zero day" exploits are another preferred method of access by adversaries. [15]

The problem with out-of-band management is exemplified by the recent Intel security advisory. Exposing proprietary, hard-to-patch blobs which contain bugs to the network can lead to remote exploitation by advanced adversaries, including common criminals. The "Nobody But Us" (NOBUS) concept promoted by adversaries is simply a fallacy as evidenced by recent worldwide security incidents, including the leaking of the adversary toolkit used for hacking targets. According to prominent Intel ME researchers and reverse-engineers, only corporate AMT firmware includes the networking stack, but the safest action is for users to avoid computers with this feature entirely. [16] [17]

In principle, the concept of out-of-band management has its place in data centers, not on personal home computers. Even in the former case, without Libre software the owner of the machine(s) cannot be sure they are the only person with remote access control, in order to patch security vulnerabilities on demand. [18] While the functionality is not secret, running a network-facing, bug-ridden proprietary OS and giving hardware privileged access to a machine has proven a horriblearchive.org ideaarchive.org.


Avoid Other Out-of-band Features[edit]

The commonly deployed PXE boot [19] and Wake-on-Lan (WoL) "features" should be avoided or disabled. PXE is implemented either as a Network Interface Card (NIC) BIOS extension or as UEFI code in modern devices (where it can be easily disabled). [20] [21] On most systems, WoL hardware functionality is usually blocked by default and explicitly needs to be enabled using the system BIOS or UEFI. [22] [23]

Though rare nowadays, also avoid machines with the LoJack anti-theft feature since it is a persistent BIOS/UEFI firmware module that shares features with trojans or rootkits. If enabled, laptops can be remotely locked, have files deleted, or disclose their exact location. Further, an activated LoJack module will "phone home" daily to a monitoring center, providing location, user, software, and hardware information. [24] Users do have options for mitigation. [25]

Without reason, LoJack has been found pre-activated on computers that were bought new. [26] The technology has also been exploited by the "Lojax" malware, commonly found in the Balkans and Central and Eastern Europe. [27] Fortunately, LoJack has become so disliked that some manufacturers have removed it in firmware updates made during the response to Meltdown and Spectre.


When buying new hardware, it is recommended to avoid Intel hardware that has AMT. Unfortunately, that rules out most modern Intel hardware produced in the last ten years. AMD chipsets do not contain fully-featured, out-of-band management like AMT. However, there are other comparable problems (from a freedom perspective) with hardware produced by both Intel and AMD. [28]

It has been recently discovered that ME can be disabled and mostly erased with a simple Python script. The functionality of systems running both Libre and proprietary BIOS firmwares were unaffected, including recent CPU generations. Only experts should attempt this procedure, since the computer may become "bricked" (unusable) if the procedure is completed incorrectly. [29] [30] [31]

Another alternative for advanced users is attempting to set Intel ME's "High-Assurance Platform" mode (HAP): [32] [33]

As Intel has confirmed the ME contains a switch to enable government authorities such as the NSA to make the ME go into High-Assurance Platform (HAP) mode after boot. This mode disables most of ME's functions and was intended to be available only in machines produced for specific purchasers like the US government; however, most machines sold on the retail market can be made to activate the switch.

For details on this procedure, refer to "Setting the HAP bit" instructions herearchive.org. The researchers found that by removing some ME modules and enabling HAP mode, Intel ME did not crash (suggesting it is disabled at an early stage). Notably, Intel confirmed with the researchers that the disabling/modification of certain features (via HAP) was made available to government agencies, presumably to reduce the threat of side-channel leaks. [34]

Intel ME Disabling Disadvantages[edit]

Limitations Intel ME disabling

Disabling the Intel Management Engine (ME) results in the following features no longer being available:

  • Remote Management
  • fTPM (the hardware TPM is still available)
  • Thunderbolt*. USB-C, Display Alt Mode (for video signals) and USB-C charging (PowerDelivery) are still supported.

In addition, modern standby (S0ix) is affected: suspend mode consumes about 3 times more energy than with ME enabled. You can workaround this issue by setting up a suspend-then-hibernatearchive.org policy.

* We are testing Thunderbolt support in combination with ME disabling.

You can easily switch ME disabling on and off in the UEFI firmware settingsarchive.org (UEFI only, not for Heads).

[ ] I understand the consequences of Intel ME disabling

For a further reference, see also Prevent battery draining while suspending with ME disabled (Linux)archive.org.

Intel ME Kernel Modules[edit]

Disabling or blacklisting the Intel ME-related kernel modules doesn't disable the Intel Management Engine itself, which operates at a lower level directly inside the CPU.



mei-gsc / mei_gsc_proxy:


  • High-bandwidth Digital Content Protection (HDCP)
  • DRM?


  • /dev/meiX


  • NFC



  • Intel® Trusted Execution Engine (Intel® TXE) is a trusted execution environment that provides a trusted foundation and extends Intel's security technologies.

  • DRM?


  • Virtual Serial Controller (VSC)


  • Similar to above.


  • Intel Active Management Technology (iAMT) watchdog
  • Intel® Active Management Technology (Intel® AMT) is a feature of Intel® Core™ processors with Intel® vPro™ technology and workstation platforms that allows IT or managed service providers to better discover, repair, and protect their networked computing assets.


  • NFC

Firmware Choice[edit]

Some hardware comes with firmware which has an option to disable Intel ME.

See also:


  1. https://en.wikipedia.org/wiki/Intelligent_Platform_Management_Interfacearchive.org
  2. https://en.wikipedia.org/wiki/Intelligent_Platform_Management_Interface#Baseboard_management_controllerarchive.org
  3. Facebook has put out OpenBMC, an interesting implementation that theoretically can be placed on BMCs. Problematically, most vendors (HP, Dell, IBM, and so on) will not let users install firmware that is not signed by them. In addition to permission issues, without available low-level drivers and publicly available hardware that will run the firmware, the user is simply out of luck.
  4. https://ia800209.us.archive.org/4/items/IntelCentrino2WithVproTechnologyAndIntelCore2Processor/IntelCentrino2WithVproTechnologyAndIntelCore2ProcessorWithVproTechnology.pdfarchive.org
  5. https://en.wikipedia.org/wiki/Intel_Active_Management_Technologyarchive.org
  6. 7.0 7.1 7.2 https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-itarchive.org
  7. https://en.wikipedia.org/wiki/Intel_Active_Management_Technology#Securityarchive.org
  8. 9.0 9.1 https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/archive.org
  9. https://web.archive.org/web/20210802184931/http://blog.ptsecurity.com/2017/08/disabling-intel-me.htmlarchive.org
  10. https://web.archive.org/web/20220327082940/xvilka.me/h2hc2014-reversing-firmware-radare-slides.pdfarchive.org
  11. https://recon.cx/2014/slides/Recon%202014%20Skochinsky.pdfarchive.org
  12. https://theintercept.com/2014/10/10/core-secrets/archive.org
  13. https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.htmlarchive.org
  14. Significant and previously unknown vulnerabilities are used as a way into all systems without leaving any a priori discoverable traces of the infection until they are used. Zero days are typically used selectively to extend their shelf-life. Another similar but more common method is compromising targets via serious bugs that users often fail to patch. See herearchive.org and herearchive.org for examples.
  15. https://www.coreboot.org/pipermail/coreboot/2016-December/082748.htmlarchive.org
  16. There were some mobile variants which had access to the wireless 3G chip (for anti-theft), but this functionality has been dropped.
  17. Libre software can also contain bugs, but it at least gives users the freedom to fix them.
  18. https://en.wikipedia.org/wiki/Preboot_Execution_Environment#Acceptancearchive.org
  19. https://www.techwalla.com/articles/how-to-disable-pxearchive.org
  20. https://en.wikipedia.org/wiki/Preboot_Execution_Environment#Overviewarchive.org
  21. https://en.wikipedia.org/wiki/Wake-on-LAN#Respond_to_the_Magic_Packet_and_restore_full_powerarchive.org
  22. https://en.wikipedia.org/wiki/Wake-on-LAN#Hardware_implementationsarchive.org
  23. https://en.wikipedia.org/wiki/Absolute_Home_%26_Officearchive.org
  24. https://nsfocusglobal.com/tracking-and-analysis-of-the-lojackcomputrace-incident/archive.org
  25. https://securelist.com/absolute-computrace-revisited/58278/archive.org
  26. https://nsfocusglobal.com/tracking-and-analysis-of-the-lojackcomputrace-incident/archive.org
  27. https://www.fsf.org/blogs/community/active-management-technologyarchive.org
  28. https://www.phoronix.com/news/Intel-ME-Cleaningarchive.org
  29. https://github.com/corna/me_cleaner/wiki/me_cleaner-statusarchive.org
  30. https://github.com/corna/me_cleanerarchive.org
  31. https://en.wikipedia.org/wiki/Intel_Management_Engine#%22High_Assurance_Platform%22_modearchive.org
  32. Although manipulation of the HAP bit has already been incorporated into the me_cleaner project.
  33. It is remarkable this Intel feature is not advertised nor made easily accessible to the wider public in order to reduce potential security threats.

Unfinished: This wiki is a work in progress. Please do not report broken links until this notice is removed, use Search Engines First and contribute improving this wiki.

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!