Navigation
Search
|
Thunderbolt Vulnerabilities Leave Computers Wide-Open, Researchers Find
Wednesday February 27, 2019. 03:10 AM , from Slashdot
Bismillah writes: Researchers have published the results of exploring how vulnerable Thunderbolt is to DMA attacks, and the answer is 'very.' Be careful what you plug into that USB-C port. Yes, the set of vulnerabilities has a name: 'Thunderclap.' 'Thunderbolt, which is available through USB-C ports on modern laptops, provides low-level direct memory access (DMA) at much higher privilege levels than regular universal serial bus peripherals,' reports ITNews, citing a paper published from a team of researchers from the University of Cambridge, Rice University and SRI International. 'This opens up laptops, desktops and servers with Thunderbolt input/output ports and PCI-Express connectors to attacks using malicious DMA-enabled peripherals. The main defense against the above attacks is the input-output memory management unit (IOMMU) that allows devices to access only the memory needed for the job to be done. Enabling the IOMMU to protect against DMA attacks comes at a high performance cost however. Most operating systems trade off security for performance gains, and disable the IOMMU by default.'
'Apple's macOS uses the IOMMU, but even with the hardware defense enabled, the researchers were able to use a fake network card to read data traffic that is meant to be confined to the machine and never leave it,' the report adds. 'The network card was also able to run arbitrary programs at system administrator level on macOS and could read display contents from other Macs and keystrokes from a USB keyboard. Apple patched the vulnerability in macOS 10.12.4 that was released in 2016, but the researchers say the more general scope of such attacks remains relevant.' Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/Plc0zY3su88/thunderbolt-vulnerabilities-leave-computers-wid...
|
25 sources
Current Date
Nov, Fri 1 - 08:26 CET
|