Vulnerabilities / Threats
7/25/2011
11:29 AM
50%
50%

Apple Laptop Batteries Hacked By Researcher

Attackers could use a password weakness to render your laptop's battery useless--or overcharge it to start a fire, researcher warns.

Building The Mac Office
(click image for larger view)
Slideshow: Building The Mac Office
Attackers could turn your laptop's battery into a useless brick, or worse, overcharge it to the point where it starts a fire.

That warning comes by way of security expert Charlie Miller, who said that he's successfully reverse-engineered Apple laptop "smart batteries," enabling him to reprogram their embedded controllers. Miller, who's a researcher at consultancy Accuvant, plans to document his research at next month's Black Hat conference in Las Vegas.

According to Miller's Black Hat talk description, "being able to control the working smart battery and smart battery host may be enough to cause safety issues, such as overcharging or fire." Notably, when the lithium-ion batteries used in laptops overheat, they can rupture, causing injuries. On the other hand, well-manufactured batteries also include numerous safety features, such as the ability to shut down in the event of overheating, as well as circuit interrupters designed to prevent overcharging or undercharging.

In his forthcoming talk, Miller plans to will demonstrate how to modify the firmware used by Apple smart batteries, disable their anti-tampering checksum, and reprogram the battery firmware using "a simple API," which he plans to release publicly. While Miller's research focused on MacBook, MacBook Pro, and MacBook Air laptops from Apple--with whom he's already shared the results of his research--he suspects that Windows laptop batteries would be susceptible to firmware attacks.

Miller reverse-engineered Apple's battery firmware after the company issued a related firmware update in 2009. From there, he discovered the default password used to secure batteries, and from there, he learned how to read the values from that firmware and alter how the battery firmware interacts with the laptop. To date, Miller said he's successfully bricked seven Mac laptops via battery firmware hacks.

Interestingly, however, reprogramming the battery firmware could also allow an attacker to introduce persistent malware into the laptop. "You could put a whole hard drive in, reinstall the software, flash the BIOS, and every time it would reattack," Miller told Forbes.com. "There would be no way to eradicate or detect it other than removing the battery."

Despite the apparent threat vector, battery firmware offers essential functionality, providing giving users precise readings of a laptop's remaining charge, operating time, and estimated recharge time, while also allowing the battery to control the voltage and current being provided by a charger.

But how feasible are attacks against battery firmware? Offering some perspective, Paul Ducklin, head of technology for Sophos in the Asia Pacific region, said in a blog post that when it comes to reprogramming controllers with field-updatable firmware, laptop batteries aren't the only option. Indeed, an attacker could also target "the motherboard itself, your wireless card, your 3G modem, network card, graphics device, storage devices, and much more," he said.

To address the Apple laptop battery firmware vulnerability, Miller plans to release a utility called "Caulkgun" that will allow Apple users to change their laptop battery passwords. On the upside, the utility would prevent an attacker from exploiting an Apple battery pack's embedded controller. On the downside, it would block any Apple patches, performance enhancements, or security updates from updating the battery's firmware, unless the user first restored the battery's default password.

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.