Security researcher Björn Ruytenberg found [PDF] seven vulnerabilities in Intel Thunderbolt chips. Critically, an attacker needs physical access to the machine, otherwise known as an evil maid attack, though it only takes roughly five minutes to perform.

Thunderspy

Here are the vulnerabilities:

  1. Inadequate firmware verification schemes.
  2. Weak device authentication scheme.
  3. Use of unauthenticated device metadata.
  4. Backwards compatibility.
  5. Use of unauthenticated controller configurations.
  6. SPI flash interface deficiencies.
  7. No Thunderbolt security on Boot Camp.

Mr. Ruytenberg uploaded a video showing how an attack is performed:

By itself, macOS is partially affected by numbers 2 and 3. However, when a user runs Windows or Linux in Boot Camp, then it becomes affected by all except 5 and 6. Since these vulnerabilities are found in the physical chips, there is no way to fix them with a software update.

Apple and Intel are both aware of this, and Intel says it’s not new and was mitigated with Kernel Direct Memory Access (DMA).

Further Reading

[Important Details Emerge on Apple’s New Products]

[Apple TV+ Will Not Fulfil Its Potential While Its Name Causes Such Confusion]

Subscribe
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments