Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/30/2020
11:45 AM
50%
50%

Enterprise Hardware Still Vulnerable to Memory Lane Attacks

Most laptops, workstations, and servers are still vulnerable to physical attacks via direct memory access, despite mitigations often being available, report says.

Hardware makers have lagged behind in protecting even the latest systems from attacks through their ports, leaving users' and companies' systems open to exploit by anyone who can snag some alone time with the targeted system, security firm Eclypsium stated in a report published on January 30.

The attacks exploit the direct memory access, or DMA, feature of some computers and servers which allow peripherals to directly access the system's memory. In a recent test of two modern laptops, security researchers at the firm found that they could easily compromise the systems — one through a port and the other through a supply chain–type attack by opening the case — even though firmware makers have solutions available to mitigate the DMA security issues, says Jesse Michael, principal researcher with Eclypsium.

"This is something has been traditionally difficult for people to fix," he says. "Because even though there are security features and capabilities and protections that are being put into silicon and the hardware by Intel and the chipset vendors, ... it takes a while for the different vendors to write code that enables and actually configures these hardware protections to secure the system before it gets into customer hands."

Not a New Issue
The attacks are not new. In 2016, Ulf Frisk, a security researcher based in Sweden, published PCILeech, a program that compromises systems through ports to give direct high-speed access to a system's memory. Such ports are often used to drive an external monitor, allow a graphics upgrade, or expand memory. A December 2016 video of the attack shows him recovering the FileVault password of a MacBook Air just by connecting his attack system through the Thunderbolt port.

Since 2017, the makers of laptops, workstations, and servers have had the tools to harden their devices against such attacks, but many have not taken the steps to deliver a secure system to end users. Eclypsium's researchers, for example, bought a new Dell XPS laptop — a model introduced in October 2019 — and found that it had PCI-over-Thunderbolt enabled by default. They easily exploited the issue, Michael says.

"While device vendors, chip vendors, and operating system vendors have all developed new controls to defend against these threats, our research shows that many devices with built-in hardware protections continue to be vulnerable," Eclypsium stated in the report.

In December 2019, Dell issued an advisory and mitigation steps for the issue. Other laptop lines are not affected, the company stated.

Giving anyone physical access to a system poses a security risk. Hardening systems against the autorun setting for devices plugged into the USB port, for example, took years and significant hacks at the US Department of Defense to spur action. Leave your laptop unattended in a cafe and someone could plug in a malicious device that compromises the system in minutes.

Yet market pressures are pushing more vendors to adopt DMA to give workers and consumers the ability to plug in an external monitor or the ability to significantly boost graphics power.

"People think of the boundaries of the laptop as the security perimeter, but if you have a modified mouse or keyboard, you are potentially owned," says Eclypsium's Michael. "We want things to go faster and faster, so we are adding capabilities to these externals ports. Now we are bringing all PCI capabilities through this external port, and there are some interesting security ramifications [extending features] outside the case."

The research also demonstrates that such attacks could be a supply-chain danger for companies, if attackers could get several minutes of hands-on access to a system to implant malicious hardware. In their second test, the researchers replaced an HP laptop's wireless card with a programmable development platform, which could modify system RAM during boot, gaining control of the device, Eclypsium stated.

HP issued an updated version of the BIOS to fix the issue last week.

While these attacks are not new, their continued existence underscore that companies need to pay more attention to the firmware of devices they acquire, says Eclypsium. In 2016, Frisk published a tool for exploiting DMA weaknesses in systems. Known as PCILeech, the program allows attackers to target Windows, Linux, and Mac systems.

"PCILeech is capable of inserting a wide range of kernel implants into the targeted kernels — allowing for easy access to live RAM and the file system via a 'mounted drive,'" Frisk wrote. "It is also possible to remove the logon password requirement, loading unsigned drivers, executing code and spawn system shells."

Since then, chipset and firmware vendors have produced solutions to the issues, but often even the latest systems do not have those mitigations turned on, Eclypsium's Michael says.

"We know how to solve it; it is just isn't in everybody's hands yet," he says. "And some vendors, like [the makers of] a gaming laptop, they might not ever put this kind of solution in."

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "7 Steps to IoT Security in 2020."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20803
PUBLISHED: 2020-11-23
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which loop indefinitely in mathematics processing while retaining locks. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.5; v3.6 versions prior to 3.6.10; v3.4...
CVE-2019-14586
PUBLISHED: 2020-11-23
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.
CVE-2019-14587
PUBLISHED: 2020-11-23
Logic issue EDK II may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2020-0569
PUBLISHED: 2020-11-23
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2020-12351
PUBLISHED: 2020-11-23
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.