UPDATED 13:23 EDT / MAY 11 2020

SECURITY

Unpatchable exploit in Thunderbolt allows hackers to break into locked PCs

Most personal computers with a Thunderbolt port are vulnerable to a new exploit that allows hackers with physical access to a machine to compromise it even if the screen is locked and the hard drive is encrypted.

The exploit, dubbed Thunderspy, was publicly detailed on Sunday. It affects all Windows and Linux computers with Thunderbolt ports that were made before 2019 and also poses a risk, albeit a more limited one, to Apple Inc.’s Macs.

Thunderspy relies on no fewer than seven different vulnerabilities found in the Thunderbolt standard by Bjorn Ruytenberg, the researcher who discovered the issue. A hacker could compromise them using a few hundred dollars’ worth of electronic components. The attack involves using a SPI programmer, a small device for configuring chips such as flash drives, to manipulate a Thunderbolt connector’s controller chip and disable its security features.

“Thunderbolt host and device controllers operate using updatable firmware stored in its SPI flash,” Ruytenberg wrote in the academic paper detailing the exploit. Thunderbolt ports’ controller chips check the authenticity of this firmware to prevent tampering, but the mechanism is not perfect, which makes it possible to corrupt the code. “During our experiments, using a SPI programmer, we have written arbitrary, unsigned firmware directly onto the SPI flash,” the researcher added.

The experiments showed that a hacker could sneak the malicious firmware into a PC in about five minutes by removing the machine’s case with a screwdriver and connecting the SPI programmer to the Thunderbolt port’s controller chip. The exploit bypasses a user’s security settings. A PC left unattended can be compromised even if the screen is locked, the hard drive is encrypted and Thunderbolt is disabled at the operating system level.

Intel, the developer of the Thunderbolt standard, released a technology called Kernel DMA Protection in 2019 that disables Thunderspy. “The researchers did not demonstrate successful DMA attacks against systems with these mitigations enabled,” Intel noted in a statement on Sunday. 

But Windows and Linux computers that were made before Kernel DMA Protection became available in 2019, or are newer but don’t come equipped with technology, are vulnerable. Macs can be compromised too. However, the risk to Apple Inc. users is smaller because macOS applies certain security settings to Thunderbolt that makes the vulnerability harder to exploit. 

The low-level nature of the Thunderbolt flaws that Thunderspy relies on means PC makers can’t issue an over-the-air security update. In other words, there’s no way to patch a vulnerable machine. Fortunately, the fact that Thunderspy requires physical access to a machine and a considerable amount of technical know-how to exploit means that it won’t pose a serious risk to the vast majority of users. 

Photo: Unsplash

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU