TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

When Lightning Strikes Thrice: Breaking Thunderbolt 3 Security

124 pointsby dafrankenstein2about 5 years ago

12 comments

tptacekabout 5 years ago
I skimmed the paper and while the research looks solid, just in terms of the digging they did and the documentation they&#x27;re providing, this website <i>really</i> buries its lede: if you&#x27;ve got a Macbook running macOS, the Macbook IOMMU breaks the DMA attack, which is the thing you&#x27;re actually worried about here.<p>Additionally, regardless of the OS you run, Macbooks aren&#x27;t affected by the Security Level&#x2F;SPI flash hacks they came up with to disable Thunderbolt security.
评论 #23139296 未加载
评论 #23144328 未加载
评论 #23143279 未加载
dataflowabout 5 years ago
&gt; there is no malicious piece of hardware that the attacker tricks you into using<p>&gt; All the attacker needs is 5 minutes alone with the computer, a screwdriver, and some easily portable hardware.<p>Just started reading, but the comparison is already a little bizarre. It almost seems like the digital version of &quot;This murderer is on the loose and you&#x27;re in danger! He doesn&#x27;t need to inject poison into your food. All he needs is just 5 minutes in front of you with a knife!&quot;
评论 #23138466 未加载
评论 #23138369 未加载
评论 #23138403 未加载
评论 #23138249 未加载
vvandersabout 5 years ago
Looks like most of these require physical access to the SPI flash and not just the thunderbolt port unless I&#x27;m reading the disclosure wrong.
osyabout 5 years ago
This is the kind of garbage that the infosec community often memes about. A marketing website, a domain name, a cute logo for a vanity project masquerading as security research. Basically every one of the &quot;seven&quot; vulnerabilities boils down to &quot;if someone can flash the SPI of the thunderbolt controller then xxx&quot; but if they can flash the TB SPI, then they can also flash the BIOS SPI which has a lot of the same &quot;vulnerabilities&quot; but arguably is more impactful. The reason they only mentioned TB is because the BIOS stuff is well known and you can&#x27;t put your name on it.<p>Let&#x27;s break down each of the &quot;vulnerability&quot;.<p>1. &quot;However, we have found authenticity is not verified at boot time, upon connecting the device, or at any later point.&quot; This is actually false. Like, the author either didn&#x27;t experiment properly or is lying&#x2F;purposely misleading you. The firmware IS verified at boot for Alpine Ridge and Titan Ridge (Intel&#x27;s TB3 controllers). They aren&#x27;t for older controllers which does NOT support TB3. When verification fails, the controller falls back into a &quot;safe mode&quot; which does NOT run the firmware code for any of the ARC processors in the Ridge controller (there are a handful of processors where the firmware contains compressed code for). I&#x27;m willing to bet the author did not manage to reverse engineer the proprietary Huffman compression the firmware uses and therefore couldn&#x27;t have loaded their own firmware. Because if they did, it wouldn&#x27;t have worked. Now the RSA signature verification scheme they use to verify the firmware does suffer from some weaknesses but afaik doesn&#x27;t lead to arbitrary code execution (on any of the Ridge ARC processors). I would love to be proven wrong here with real evidence though ;)<p>2. Basically the string identifiers inside the firmware isn&#x27;t signed&#x2F;verified. This has no security implications beyond you can spoof identifiers and make the string &quot;pwned&quot; appear in system details when you plug the device in and authenticate it. Basically if you&#x27;ve ever developed custom USB devices you can see how silly this is as a &quot;vulnerability.&quot;<p>3. This is literally the same as #2.<p>4. Yes, TB2 is vulnerable to many DMA attacks as demonstrated in the past. Yes, TB3 has a TB2 compatibility mode. Yes, that means the same vulnerabilities exist in compatibility mode which is why you can disable it.<p>5. This one is technically true. If you open the case up, and flash the SPI chip containing the TB3 firmware, you can patch the security level set in BIOS and do stuff like re-enable TB2 if the user disabled it. But if I were the attacker, I would instead look at the SPI chip right next to it containing the UEFI firmware and NVRAM variables (most of which aren&#x27;t signed&#x2F;encryption in any modern PC).<p>6. SPI chips have interfaces for writing, erasing, and locking. If you have direct access to the chip you can abuse these pins to permanently brick the device. Here&#x27;s another way: take your screwdriver and jam it into the computer.<p>7. Apple does not enable TB3 security features on Boot Camp. I guess this one is vaguely the only real &quot;vulnerability&quot; although it&#x27;s well known and Apple doesn&#x27;t care much about Windows security anyways (they don&#x27;t enable Intel Boot Guard or BIOS Guard or TPM or any other Intel&#x2F;Microsoft security feature).<p>Not that it matters but my personal experience with TB3 is that I&#x27;ve done significant reverse engineering of the Ridge controllers for the Hackintosh community.
评论 #23139596 未加载
评论 #23170877 未加载
评论 #23147836 未加载
评论 #23144590 未加载
评论 #23147780 未加载
justaguyonlineabout 5 years ago
What would it take to have a Thunderbolt&#x2F;USB C condom? You know, like those standard USB adapter that just drops the data leads on a usb charger to make attacks like this impossible. Maybe we would have to implement a hardware switch on the device itself?<p>I&#x27;m not going to feel safe charging with a public use charger until I find some way to insure only power and not data is making it to my device. Even POE feels like it&#x27;s safer than modern peripheral standards right now.<p>(I admit this might not be perfectly linked to the article, it&#x27;s just a need I&#x27;ve felt for a while but I can&#x27;t seem to buy a solution for.)
评论 #23139006 未加载
评论 #23138376 未加载
评论 #23138778 未加载
gratonabout 5 years ago
I wonder if that could be used by used sellers of MacBooks to get into the computers.<p><a href="https:&#x2F;&#x2F;www.vice.com&#x2F;en_us&#x2F;article&#x2F;akw558&#x2F;apples-t2-security-chip-has-created-a-nightmare-for-macbook-refurbishers" rel="nofollow">https:&#x2F;&#x2F;www.vice.com&#x2F;en_us&#x2F;article&#x2F;akw558&#x2F;apples-t2-security...</a><p>I guess MacBook resellers sometimes get computers where the password has been set and they can&#x27;t get into the computers. I imagine they would be motivated to find anyway they can to unlock the computers.
评论 #23142942 未加载
评论 #23150462 未加载
oicatabout 5 years ago
There is a nice write-up about this on attackerkb. If you&#x27;re not familiar with it it&#x27;s a community to provide assessments of vulnerabilities and point out which are worth stopping everything to patch and which are mostly harmless. It&#x27;s currently in open beta. Main site: <a href="https:&#x2F;&#x2F;attackerkb.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;attackerkb.com&#x2F;</a> Thunderspy assessment: <a href="https:&#x2F;&#x2F;attackerkb.com&#x2F;topics&#x2F;mPaHZgsUvk&#x2F;thunderspy" rel="nofollow">https:&#x2F;&#x2F;attackerkb.com&#x2F;topics&#x2F;mPaHZgsUvk&#x2F;thunderspy</a>
zerof1labout 5 years ago
There were news sometime ago that Microsoft did not include thunderbolt in their surface 3 because it was insecure. I wonder if that&#x27;s related to this and whether Microsoft knew about this for a while.
mschuster91about 5 years ago
&gt; Contrary to USB, Thunderbolt is a proprietary connectivity standard. Device vendors are required to apply for Intel’s Thunderbolt developer program, in order to obtain access to protocol specifications and the Thunderbolt hardware supply chain. In addition, devices are subject to certification procedures before being admitted to the Thunderbolt ecosystem.<p>I thought that this had changed with USB-C?!
dafrankenstein2about 5 years ago
Easy read on the Wired magazine: <a href="https:&#x2F;&#x2F;www.wired.com&#x2F;story&#x2F;thunderspy-thunderbolt-evil-maid-hacking&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.wired.com&#x2F;story&#x2F;thunderspy-thunderbolt-evil-maid...</a>
dafrankenstein2about 5 years ago
This video shows the POC demo: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=7uvSZA1F9os" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=7uvSZA1F9os</a>
person_of_colorabout 5 years ago
Really though, if an attacker has unencumbered access to one’s device, all security goes flying out the window.<p>The website is highly self-promoting.
评论 #23138453 未加载
评论 #23138367 未加载
评论 #23138471 未加载