Why Intel CPUs Pose Growing Security Threats to China – Four Critical Risks
The Chinese Cyberspace Security Association warns that Intel processors suffer frequent high‑severity vulnerabilities, reliability problems, covert remote‑management features, and built‑in backdoors, urging a systematic cybersecurity review of Intel products sold in China to protect national security and consumer rights.
Frequent security vulnerabilities in Intel CPUs
Several high‑severity flaws have been disclosed in Intel processors over the past two years:
Downfall (August 2023) – a transient‑execution side‑channel that abuses the AVX2/AVX‑512 gather instruction to read data from previous vector registers. Affects Core, Celeron, Pentium generations 6‑through 11 and Xeon generations 1‑through 4. Intel initially denied the issue despite a 2022 report and only issued a fix after public disclosure, leading to a class‑action lawsuit in November 2023.
Reptar (November 2023) – discovered by Google researchers, this vulnerability allows an attacker in a multi‑tenant virtualized environment to exfiltrate personal accounts, credit‑card numbers, passwords, and can trigger system hangs or crashes, creating a denial‑of‑service condition.
Subsequent 2024 disclosures – GhostRace , NativeBHI and Indirector further demonstrate systemic weaknesses in Intel’s vulnerability‑management process.
Poor reliability and delayed remediation
From late 2023, users of Intel 13th‑ and 14th‑generation Core i9 CPUs reported frequent crashes when running certain games. ModelFarm, a visual‑effects studio, measured a failure rate of roughly 50 % on Intel‑based workstations. Intel eventually attributed the instability to an aggressive voltage request caused by a microcode bug, but the corrective microcode update was not released until July 2024, illustrating a pattern of denial and slow response.
Remote‑management interfaces exposing critical attack surface
Intel co‑designed the Intelligent Platform Management Interface (IPMI) specification with OEMs such as HP. While IPMI’s Baseboard Management Controller (BMC) enables legitimate remote power‑on, OS reinstall, and ISO mounting, it also introduces attack vectors. Notably, CVE‑2019‑11181 is a high‑severity vulnerability in BMC firmware that can give attackers full control of the server.
Intel server boards (e.g., model M10JNPSB) ship with outdated third‑party components. The embedded web server is lighttpd 1.4.35 released in March 2014, whereas the current upstream version is 1.4.66, leaving the management interface exposed to known exploits.
Intel Management Engine (ME) and AMT backdoors
The Intel Management Engine (ME), embedded in virtually all Intel CPUs since 2008, operates independently of the host operating system and is part of the Active Management Technology (AMT) suite. Security researcher Damien Zammit describes ME as an undeletable backdoor that can bypass OS firewalls, access memory, and transmit network traffic without user consent.
ME has been linked to high‑severity vulnerabilities such as CVE‑2017‑5689, which allows authentication bypass and remote code execution. In 2017, researchers uncovered a hidden “High Assurance Platform” (HAP) switch in the PCHSTERP0 field of the chipset—believed to be a NSA‑origin backdoor—that can silently disable ME, effectively granting a privileged entity unrestricted remote control.
Contextual market data and regulatory recommendation
Intel’s global revenue exceeds US$50 billion, with approximately 77 % of China’s desktop CPU market and 81 % of the laptop market in 2021, and about 91 % of the Chinese x86 server market in 2022. The Chinese Cyberspace Security Association recommends that Chinese regulators conduct a comprehensive cybersecurity review of Intel products sold in China to mitigate the identified risks to national security and consumer protection.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
ITPUB
Official ITPUB account sharing technical insights, community news, and exciting events.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
