Vulnerabilities / Threats
7/25/2011
11:29 AM
50%
50%

Apple Laptop Batteries Hacked By Researcher

Attackers could use a password weakness to render your laptop's battery useless--or overcharge it to start a fire, researcher warns.

Building The Mac Office
(click image for larger view)
Slideshow: Building The Mac Office
Attackers could turn your laptop's battery into a useless brick, or worse, overcharge it to the point where it starts a fire.

That warning comes by way of security expert Charlie Miller, who said that he's successfully reverse-engineered Apple laptop "smart batteries," enabling him to reprogram their embedded controllers. Miller, who's a researcher at consultancy Accuvant, plans to document his research at next month's Black Hat conference in Las Vegas.

According to Miller's Black Hat talk description, "being able to control the working smart battery and smart battery host may be enough to cause safety issues, such as overcharging or fire." Notably, when the lithium-ion batteries used in laptops overheat, they can rupture, causing injuries. On the other hand, well-manufactured batteries also include numerous safety features, such as the ability to shut down in the event of overheating, as well as circuit interrupters designed to prevent overcharging or undercharging.

In his forthcoming talk, Miller plans to will demonstrate how to modify the firmware used by Apple smart batteries, disable their anti-tampering checksum, and reprogram the battery firmware using "a simple API," which he plans to release publicly. While Miller's research focused on MacBook, MacBook Pro, and MacBook Air laptops from Apple--with whom he's already shared the results of his research--he suspects that Windows laptop batteries would be susceptible to firmware attacks.

Miller reverse-engineered Apple's battery firmware after the company issued a related firmware update in 2009. From there, he discovered the default password used to secure batteries, and from there, he learned how to read the values from that firmware and alter how the battery firmware interacts with the laptop. To date, Miller said he's successfully bricked seven Mac laptops via battery firmware hacks.

Interestingly, however, reprogramming the battery firmware could also allow an attacker to introduce persistent malware into the laptop. "You could put a whole hard drive in, reinstall the software, flash the BIOS, and every time it would reattack," Miller told Forbes.com. "There would be no way to eradicate or detect it other than removing the battery."

Despite the apparent threat vector, battery firmware offers essential functionality, providing giving users precise readings of a laptop's remaining charge, operating time, and estimated recharge time, while also allowing the battery to control the voltage and current being provided by a charger.

But how feasible are attacks against battery firmware? Offering some perspective, Paul Ducklin, head of technology for Sophos in the Asia Pacific region, said in a blog post that when it comes to reprogramming controllers with field-updatable firmware, laptop batteries aren't the only option. Indeed, an attacker could also target "the motherboard itself, your wireless card, your 3G modem, network card, graphics device, storage devices, and much more," he said.

To address the Apple laptop battery firmware vulnerability, Miller plans to release a utility called "Caulkgun" that will allow Apple users to change their laptop battery passwords. On the upside, the utility would prevent an attacker from exploiting an Apple battery pack's embedded controller. On the downside, it would block any Apple patches, performance enhancements, or security updates from updating the battery's firmware, unless the user first restored the battery's default password.

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Equifax CIO, CSO Step Down
Dark Reading Staff 9/15/2017
Cloud Security's Shared Responsibility Is Foggy
Ben Johnson, Co-founder and CTO, Obsidian Security,  9/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.