Loading AI tools
Security vulnerability From Wikipedia, the free encyclopedia
Thunderspy is a type of security vulnerability, based on the Intel Thunderbolt 3 port, first reported publicly on 10 May 2020, that can result in an evil maid (i.e., attacker of an unattended device) attack gaining full access to a computer's information in about five minutes, and may affect millions of Apple, Linux and Windows computers, as well as any computers manufactured before 2019, and some after that.[1][2][3][4][5][6][7][8]
CVE identifier(s) | CVE-2020-???? |
---|---|
Date discovered | May 2020 |
Date patched | 2019 via Kernel DMA Protection |
Discoverer | Björn Ruytenberg |
Affected hardware | Computers manufactured before 2019, and some after that, having the Intel Thunderbolt 3 (and below) port.[1] |
Website | thunderspy |
According to Björn Ruytenberg, the discoverer of the vulnerability, "All the evil maid needs to do is unscrew the backplate, attach a device momentarily, reprogram the firmware, reattach the backplate, and the evil maid gets full access to the laptop. All of this can be done in under five minutes."[1] The malicious firmware is used to clone device identities which makes classical DMA attack possible.[4]
The Thunderspy security vulnerabilities were first publicly reported by Björn Ruytenberg of Eindhoven University of Technology in the Netherlands on 10 May 2020.[9] Thunderspy is similar to Thunderclap,[10][11] another security vulnerability, reported in 2019, that also involves access to computer files through the Thunderbolt port.[8]
This section needs additional citations for verification. (May 2020) |
The security vulnerability affects millions of Apple, Linux and Windows computers, as well as all computers manufactured before 2019, and some after that.[1][3][4] However, this impact is restricted mainly to how precise a bad actor would have to be to execute the attack. Physical access to a machine with a vulnerable Thunderbolt controller is necessary, as well as a writable ROM chip for the Thunderbolt controller's firmware.[4] Additionally, part of Thunderspy, specifically the portion involving re-writing the firmware of the controller, requires the device to be in sleep,[4] or at least in some sort of powered-on state, to be effective.[12] Machines that force power-off when the case is open may assist in resisting this attack to the extent that the feature (switch) itself resists tampering.
Due to the nature of attacks that require extended physical access to hardware, it's unlikely the attack will affect users outside of a business or government environment.[12][13]
The researchers claim there is no easy software solution, and may only be mitigated by disabling the Thunderbolt port altogether.[1] However, the impacts of this attack (reading kernel level memory without the machine needing to be powered off) are largely mitigated by anti-intrusion features provided by many business machines.[14] Intel claims enabling such features would substantially restrict the effectiveness of the attack.[15] Microsoft's official security recommendations recommend disabling sleep mode while using BitLocker.[16] Using hibernation in place of sleep mode turns the device off, mitigating potential risks of attack on encrypted data.
Seamless Wikipedia browsing. On steroids.
Every time you click a link to Wikipedia, Wiktionary or Wikiquote in your browser's search results, it will show the modern Wikiwand interface.
Wikiwand extension is a five stars, simple, with minimum permission required to keep your browsing private, safe and transparent.