The Thunderclap vulnerabilities
The Thunderclap vulnerabilities
Posted Mar 7, 2019 2:15 UTC (Thu) by arekkusu (guest, #54092)In reply to: The Thunderclap vulnerabilities by flussence
Parent article: The Thunderclap vulnerabilities
What constitute an external or internal interface might not be obvious for some attack. For example the SATA port on my ThinkPad UltraBay is quite accessible. Disabling FireWire and other unused port in the BIOS is something I've been doing for a long time.
But a USB Type-C connector is something everyone will be using. Considering Thunderbolt 3 will become USB4, it is a real concern. And just telling user to not plug in "untrusted device" is not good enough.
And my understanding is that this can not be fully fixed at the OS level:
"Kernel DMA Protection only protects against drive-by DMA attacks after the OS is loaded. It is the responsibility of the system firmware/BIOS to protect against attacks via the Thunderboltâ„¢ 3 ports during boot."
Ref: https://docs.microsoft.com/en-us/windows/security/informa...
Posted Mar 7, 2019 8:35 UTC (Thu)
by mangix (guest, #126006)
[Link] (1 responses)
Posted Mar 7, 2019 17:39 UTC (Thu)
by mebrown (subscriber, #7960)
[Link]
We don't get equivalent top speeds until USB4 is released.
The Thunderclap vulnerabilities
The Thunderclap vulnerabilities
USB 3.2 2x2 superspeed - 20Gbps top speed