4. Agenda
- Part 1
- Background
- Overview of platform assets
- Types of platform components
- Motivation for malicious intent
- Part 2
- Real world example of a worst case scenario
- Explanation of vulnerabilities found
17. Modern platform
• Hide a tiny amounts of data in
SPD
• OLD attack – change SPD to
indicate smaller RAM size than
actually exists to cause PDOS
• OLD attack – change SPD to
indicate larger RAM size than
actually exists to make some
memory accesses wrap
around and bypass security
controls (i.e. memory aliasing)
28. Modern platform
The curious case of “Plugable”
- USB 3.0 SATA dock for external HDD
- Controller used is made by ASMedia
- Release a firmware update tool and patch
back in 2013
- http://plugable.com/2013/03/05/usb3-sata-
u3-firmware-update
30. Example
1. Malware gets installed on a platform via
phishing, browser vulnerability, etc.
2. It detects a vulnerable platform component.
3. Then uses that component for persistence on
the device.
38. LTE module firmware update vulnerability
• Windows firmware update tool performs CRC check before passing firmware
image to LTE module
• LTE module only performs CRC check of firmware image before accepting update
• CRC helps with integrity verification, but is not sufficient to prevent security
compromise
• Easy to recalculate CRC and get LTE module to accept any arbitrary update
• Even easier to patch firmware update tool to recalculate CRC for us
• Bonus: No way to force firmware update if the module has been compromised
• Firmware updates should be signed by OEMs private key
• LTE module should perform a signature verification using public key stored inside
module
39. • CVE-2015-5367
• Insecure Linux Image in Firmware
• CVE-2015-5368
• Insecure Firmware Update Authentication
41. Thanks for your research and for giving the DefCon talk. I was there in the
audience.
Huawei is refusing to provide the ME906 firmware update directly to end users.
Instead, they refer to the OEM partner (Sony, etc.), who in turn knows nothing
about this. It's a classic case of finger pointing.
Do you have any insight and/or suggestions on how an end user of one of these
LTE modules can acquire the patch? In my case, it's the Sony variant.
Thanks in advance for your assistance. Please excuse the anonymous disposable
email, but I'm sure you know it's the only way to remain secure.
Regards,
A (Disgruntled) Huawei Modem Owner
42. Summary and key takeaways
• Every modern platform contains many CPUs beyond the main one everyone knows
about
• They often do not use a secure update mechanism
• AV software running on main CPU doesn’t have visibility into these additional CPUs
• They can be used to circumvent security controls in interesting ways
• Once one of these CPUs has been compromised, it can be impossible to clean
• We have to view the platform as an interconnected system with multiple security
boundaries and execution environments rather than focusing only on main CPU
and OS security issues
• Impossible to secure the overall platform without fixing device firmware security