Vulnerabilities / Threats
7/29/2011
01:26 PM
50%
50%

Mac OS X Lion Password Vulnerability: Sleep Mode

Forensic software can exploit a seven-year-old FireWire design error to snoop system memory for passwords, even for devices that are locked or in sleep mode.

Updated forensic software can steal Apple OS X login passwords in minutes, even when the devices are locked or asleep.

To be successful, however, users of the software, Passware Kit Forensic v11, must have physical access to the target Mac device, as well as a FireWire cable connection. At that point, the software can capture the password data from the Mac's memory, even on the latest version of Apple's operating system, Mac OS X Lion.

According to Passware, its $995 software kit only takes a few minutes to work. It also functions regardless of password strength, and even if FileVault encryption has been activated. Passware previously implemented the same technique to decrypt Windows hard disks encrypted with BitLocker and TrueCrypt, with software running on a USB key that is plugged into the target machine.

Interestingly, the "potential vulnerability"--as Passware described it--in Apple OS X that enables password extraction is in many ways also a documented FireWire feature. "One of the design features of FireWire, and part of what makes it attractive for professional use, is that it allows for [direct memory access], a technology used in modern computers which allows peripherals to bypass the CPU and directly read from and write to memory," said Aryeh Goretsky, a distinguished researcher at ESET, in a blog post. "Because the processor does not have to manage the data transfer, higher data rates, and lower CPU utilization can be ensured, while leaving the CPU available to perform other functions."

Security researchers first identified the underlying "FireWire design error" in 2004, he said, though it was largely ignored until an "authentication bypass attack on Windows XP and (with some modification) the then-new Windows Vista operating system," emerged in 2008.

Stealing passwords isn't all that's possible via FireWire. In February 2011, for example, "computer security firm HBGary partnered with defense contractor General Dynamics on a project named 'Task B' to install rootkits onto computers by writing them directly into a computer's memory," he said, referencing an Ars Technica story.

As a data transfer technology, FireWire has already been well eclipsed by the less expensive USB 2.0. Many Apple devices--including the MacBook and MacBook Air--now ship with no FireWire port. In fact, Apple is now putting its weight behind Thunderbolt, a connection technology that offers roughly twice the speed of USB 3.0, and 12 times the speed of FireWire 800.

For Apple computers that do have a FireWire port, and owners who fear their machines will be hacked via forensic software and an attacker who has the required physical access to the machine, here's an easy mitigation strategy: always turn off the computer instead of putting it to sleep, and deactivate the "automatic login" setting, which will prevent the computer from fully booting until a password has been entered. "This way, passwords will not be present in memory and cannot be recovered," according to Passware. Such a log-in password will already be required for any users who have activated Lion's built-in whole-disk encryption feature, FileVault 2.

Another mitigation strategy is to disable FireWire, if you have no devices that use the port, said Goretsky. "Or, even more simply, don't leave your computer alone in an unsafe location. While the chance of a password theft or rootkit injection via FireWire is likely quite low, there's a much higher probability of its being stolen the old-fashioned way."

In other Apple-related forensic software update news, on Monday, Russian forensic software maker Elcomsoft announced that its iOS Forensic Toolkit has been updated to support Windows, and includes the ability to decrypt keychain data--used to store sensitive information--for all devices running iOS 3.x, and most that run iOS 4.x, using brute-force recovery if necessary.

The iOS Forensic Toolkit can also be used to obtain an image of an iPhone, iPad, or iPod Touch device--provided the software's user has physical access to the device--and decrypt these images. As a result, it "allows one to obtain a fully usable image of the device's file system with the contents of each and every file decrypted and available for analysis," said Andrey Belenko a security researcher at Elcomsoft, in a blog post.

The update also allows for "logging of all activities occurring while the toolkit is running," he said, which was a feature requested by multiple law enforcement agency users.

Security concerns give many companies pause as they consider migrating portions of their IT operations to cloud-based services. But you can stay safe in the cloud. In this Dark Reading Tech Center report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls. Read our report now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

CVE-2015-0528
Published: 2015-03-29
The RPC daemon in EMC Isilon OneFS 6.5.x and 7.0.x before 7.0.2.13, 7.1.0 before 7.1.0.6, 7.1.1 before 7.1.1.2, and 7.2.0 before 7.2.0.1 allows local users to gain privileges by leveraging an ability to modify system files.

CVE-2015-0996
Published: 2015-03-29
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 rely on a hardcoded cleartext password to control read access to Project files and Project Configuration files, which makes it easier for local users to obtain sensitive info...

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.