Thunderbolt has seven vulnerabilities that cannot be patched on older PCs and Laptops
Granted, you need physical access to the PC or laptop, but Thunderbolt has been exposed to being vulnerable, in fact, I need to restate that, it has seven vulnerabilities. The vulnerabilities make it possible to steal information from your computer if a hacker manages to access the port briefly.
The new findings have been discovered by a research from a master student at Eindhoven University of Technology.
"All the attacker needs is five minutes of undisturbed access to the computer, a screwdriver, and some portable hardware," the university writes on its website.
"We present Thunderspy, a series of attacks that break all primary security claims for Thunderbolt 1, 2, and 3. So far, our research has found the following vulnerabilities:
- Inadequate firmware verification schemes
- Weak device authentication scheme
- Use of unauthenticated device metadata
- Downgrade attack using backwards compatibility
- Use of unauthenticated controller configurations
- SPI flash interface deficiencies
- No Thunderbolt security on Boot Camp
These vulnerabilities lead to nine practical exploitation scenarios. In an evil maid threat model and varying Security Levels, we demonstrate the ability to create arbitrary Thunderbolt device identities, clone user-authorized Thunderbolt devices, and finally obtain PCIe connectivity to perform DMA attacks. In addition, we show unauthenticated overriding of Security Level configurations, including the ability to disable Thunderbolt security entirely, and restoring Thunderbolt connectivity if the system is restricted to exclusively passing through USB and/or DisplayPort. We conclude with demonstrating the ability to permanently disable Thunderbolt security and block all future firmware updates.
All Thunderbolt-equipped systems shipped between 2011-2020 are vulnerable. Some systems providing Kernel DMA Protection, shipping since 2019, are partially vulnerable. The Thunderspy vulnerabilities cannot be fixed in software, impact future standards such as USB 4 and Thunderbolt 4, and will require a silicon redesign. Users are therefore strongly encouraged to determine whether they are affected using Spycheck, a free and open-source tool we have developed that verifies whether their systems are vulnerable to Thunderspy. If it is found to be vulnerable, Spycheck will guide users to recommendations on how to help protect their system."
The vulnerabilities have been categorized under the name Thunderspy, and include seven vulnerabilities primarily affecting Linux and Windows, it seems macOS is less vulnerable due to a separate layer of security. The vulnerabilities apply to Thunderbolt 1, 2 and 3.
Many computers built after 2011 have such a port, which is used for external hard drives, among other things. According to master student Björn Ruytenberg, these vulnerabilities are not adequately protected with modern cryptographic methods. The university has contacted Intel and Apple, which makes extensive use of the Thunderbolt port. Intel points out in a blog post certain protection software, Kernal DMA Protection, should address the issue. However, it can only be used on recent hardware from 2019 or later.
Eindhoven University of Technology offers a special tool on the website to check whether your PC or laptop can be hacked using this method.
The ThunderBay 8 can do 128TB and 2576 MB/sec on ThunderBolt 3 - 04/22/2020 07:22 AM
Meet the ThunderBay 8, a RAID case with 8-bay configuration compatible with Thunderbolt 3. OWC's external RAID case "ThunderBay 8" was announced already, but due to everything goin on g...
AVerMedia Offes an External 4K HDR & 240 FPS Capture Box (Thunderbolt) - 04/15/2020 12:07 PM
The latest addition to AVerMedia's 4K video capture lineup, the Live Gamer BOLT—shortened as the BOLT— is the world's first external video capture device to record 4K60 HDR10 and Full HD at 240 ...
ASRock X570 Phantom Gaming-ITX TB3 Receives Official Thunderbolt Certification - 02/07/2020 08:29 AM
ASRock, announces X570 Phantom Gaming-ITX/TB3 receives the Thunderbolt Host certification from Intel. It is the first Thunderbolt Certified AMD motherboard....
Intel Previews 10nm+ Tiger Lake with Xe-based GPU and Thunderbolt 4 - 01/07/2020 09:28 AM
Intel talked about breakthroughs in artificial intelligence (AI) that pave the way for autonomous driving, a new era of mobile computing at CES 2020....
Intel releases Thunderbolt to the industry - To Become USB 4.0 at 40 Gbps - 03/04/2019 04:04 PM
Intel announced that it has contributed the Thunderbolt protocol specification to the USB Promoter Group. This will enable other chip makers to build Thunderbolt compatible silicon, royalty free. It w...
Senior Member
Posts: 2634
Joined: 2008-02-25
Oh, yeah i need to take a dump too lol.
Senior Member
Posts: 11345
Joined: 2003-05-24
I dare some security firm and who ever else is purposely look for flaws to out go take intels 286/386/486 cpu along with amd first offering and look for flaws in them too....
Instead of Witch Hunts we have Flaw hunts. I have seen or heard of some many "flaws" and "security" holes in computer tech as I have in past few years since meltdown and spectre started all this
Senior Member
Posts: 519
Joined: 2007-09-24
Yeah, right...
Five minutes AND A SCREWDRIVER and I can steal you hdd and key your display with a message that I was there...
It is a capital rule in it security to not allow unsupervised physical access no matter how secure are the systems - even without this "vulnerability".
Senior Member
Posts: 2028
Joined: 2010-05-26
Omg that's shocking ^^. Although i have no idea what a Thunderbolt even is. It's either a thunder clap or a lightning bolt.
Senior Member
Posts: 1117
Joined: 2011-01-11
Daaaaaaaaaaaamn. Glad it needs to be accessed locally from the actual machine. Just a bit more security issue icing on the cake for Intel....
Wonder if this is something that will effect my eventual purchase of my thunderbolt AIC for my tRX40 Aorus Xtreme? Not like someone is going to go out of their own way to come into my house and grab my not so sensitive data...
You have a better chance if any (good luck) to get through the network first at my place. Otherwise peeps would be met with a 12 GAUGE or a .45 to the face.