Content deleted Content added
Rescuing 12 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
|||
(43 intermediate revisions by 17 users not shown) | |||
Line 1:
{{
{{use dmy dates|date=May 2020|cs1-dates=n}}
{{Infobox bug
Line 7:
| CVE = {{CVE|2020-????|link=no}}
| discovered = {{Start date and age|2020|05|df=yes}}
| patched = 2019 via [[DMA attack|Kernel DMA Protection]]
| discoverer = Björn Ruytenberg
| affected hardware = Computers manufactured before 2019, and some after that, having the [[Thunderbolt (interface)|Intel Thunderbolt 3 (and below) port]].<ref name="WRD-20200510" />
| website = {{URL|thunderspy.io}}
}}
'''Thunderspy''' is a type of [[Vulnerability (computing)|security vulnerability]], based on the [[Thunderbolt (interface)|Intel Thunderbolt 3 port]], first reported publicly on 10 May 2020, that can result in an [[Evil maid attack|evil maid]] (
According to Björn Ruytenberg == History ==
The Thunderspy security vulnerabilities were first publicly reported by Björn Ruytenberg of [[Eindhoven University of Technology]] in the [[Netherlands]] on 10 May 2020.<ref name="TSY-20200417">{{cite news |last=Ruytenberg |first=Björn |title=Breaking Thunderbolt Protocol Security: Vulnerability Report. 2020. |url=https://thunderspy.io/assets/reports/breaking-thunderbolt-security-bjorn-ruytenberg-20200417.pdf |date=17 April 2020 |work=Thunderspy.io |accessdate=11 May 2020 |archive-date=11 May 2020 |archive-url=https://web.archive.org/web/20200511032830/https://thunderspy.io/assets/reports/breaking-thunderbolt-security-bjorn-ruytenberg-20200417.pdf |url-status=live }}</ref> Thunderspy is similar to [[Thunderclap (security vulnerability)|Thunderclap]],<ref name="TC-20190226">{{cite news |author=Staff |title=Thunderclap: Modern computers are vulnerable to malicious peripheral devices |url=http://thunderclap.io/ |date=26 February 2019 |accessdate=12 May 2020 }}</ref><ref name="VRG-20190227">{{cite news |last=Gartenberg |first=Chaim |title='Thunderclap' vulnerability could leave Thunderbolt computers open to attacks - Remember: don't just plug random stuff into your computer |url=https://www.theverge.com/2019/2/27/18243503/thunderclap-vulnerability-thunderbolt-computers-attack |date=27 February 2019 |work=[[The Verge]] |accessdate=12 May 2020 }}</ref> another security vulnerability, reported in 2019, that also involves access to computer files through the Thunderbolt port.<ref name="SR-20200511" />
== Impact ==
{{more citations needed|section|date=May 2020}}
The security vulnerability
Due to the nature of attacks that require extended
== Mitigation ==
The researchers claim there is no easy software solution, and may only be mitigated by disabling the Thunderbolt port altogether.<ref name="WRD-20200510" /> However, the impacts of this attack (reading kernel level memory without the machine needing to be powered off) are largely mitigated by anti-intrusion features provided by many business machines.<ref
== References ==
Line 31 ⟶ 34:
* {{Official website|https://thunderspy.io/}}
* {{youtube|7uvSZA1F9os|Video (5:54) – Thunderspy: proof of concept}}
* {{youtube|c9Z3hQh0NxY|Video (11:01) - Thunderspy is nothing to worry about - Here's why}}{{cn|date=May 2020}}
{{Hacking in the 2020s}}
{{Portal bar|Business and economics|Computer programming}}
[[Category:Computer security]]
[[Category:2020 in
|