mickey threats inside your platform final

43
THE HIDDEN DANGERS INSIDE THE PLATFORM

Upload: pacsecjp

Post on 29-Jan-2018

435 views

Category:

Internet


6 download

TRANSCRIPT

Page 1: Mickey  threats inside your platform final

THE HIDDEN DANGERS INSIDE

THE PLATFORM

Page 2: Mickey  threats inside your platform final

Thank you for having us here

Page 3: Mickey  threats inside your platform final

私たちです

Page 4: Mickey  threats inside your platform final

Agenda

- Part 1

- Background

- Overview of platform assets

- Types of platform components

- Motivation for malicious intent

- Part 2

- Real world example of a worst case scenario

- Explanation of vulnerabilities found

Page 5: Mickey  threats inside your platform final

古典プラットフォーム

Page 6: Mickey  threats inside your platform final

Classic platform

Page 7: Mickey  threats inside your platform final

Modern platform

Page 8: Mickey  threats inside your platform final

Modern platform

Page 9: Mickey  threats inside your platform final

Modern platform

Page 10: Mickey  threats inside your platform final

Modern platform

Page 11: Mickey  threats inside your platform final

There is code insideBSL Mask ROM, MarkedThis is an MSP430F2274

bootloader ROM. The

leftmost column is

annotated

- Travis Goodspeed

Page 12: Mickey  threats inside your platform final

Attackers motivation

Page 13: Mickey  threats inside your platform final

Attackers motivation

• Stealth• Persistence• Low level security bypass• Data intercepts (USB)• Side channel spying (sensors etc.)• Privilege escalation• VM escape• Jail break/carrier unlock• PDoS (Permanent/Persistent Denial of Service)

Page 14: Mickey  threats inside your platform final

It is possible

BadUSB root cause- Controller inside flash drive has a CPU (8051)

- Insecure firmware update mechanism

Page 15: Mickey  threats inside your platform final

Attack surface review

from the inside

Page 16: Mickey  threats inside your platform final

Modern platform

Page 17: Mickey  threats inside your platform final

Modern platform

• Hide a tiny amounts of data in

SPD

• OLD attack – change SPD to

indicate smaller RAM size than

actually exists to cause PDOS

• OLD attack – change SPD to

indicate larger RAM size than

actually exists to make some

memory accesses wrap

around and bypass security

controls (i.e. memory aliasing)

Page 18: Mickey  threats inside your platform final

Modern platform

• JEDEC eMMC spec 5.1

• Introduced FFU

• FIELD FIRMWARE UPDATE

Page 19: Mickey  threats inside your platform final

Modern platform

Page 20: Mickey  threats inside your platform final

Modern platform

Page 21: Mickey  threats inside your platform final

Modern platform

Page 22: Mickey  threats inside your platform final

Modern platform

Page 23: Mickey  threats inside your platform final

Modern platform

Page 24: Mickey  threats inside your platform final

Modern platform

Page 25: Mickey  threats inside your platform final

Modern platform

Page 26: Mickey  threats inside your platform final

Modern platform

Page 27: Mickey  threats inside your platform final

Modern platform

Page 28: Mickey  threats inside your platform final

Modern platform

The curious case of “Plugable”

- USB 3.0 SATA dock for external HDD

- Controller used is made by ASMedia

- Release a firmware update tool and patch

back in 2013

- http://plugable.com/2013/03/05/usb3-sata-

u3-firmware-update

Page 29: Mickey  threats inside your platform final

Modern platform

Same ASMedia

controller found in

Samsung Ultrabook

Page 30: Mickey  threats inside your platform final

Example1. Malware gets installed on a platform via

phishing, browser vulnerability, etc.

2. It detects a vulnerable platform component.

3. Then uses that component for persistence on

the device.

Page 31: Mickey  threats inside your platform final

Platform

DEMO

Internet

Malware

C&C

Internal LTE

module

AV clean or

OS wipe &

reinstall

Page 32: Mickey  threats inside your platform final

VIDEO

Page 33: Mickey  threats inside your platform final

Internal Huawei LTE modem

• Connected via USB interface in M.2 socket

• ARMv7, 256MB flash, 50MB ram

Page 34: Mickey  threats inside your platform final

• Software

• Windows utility for firmware updates

• Firmware

• Strings is useful

• Hardware

• Test pads?

Page 35: Mickey  threats inside your platform final
Page 36: Mickey  threats inside your platform final

Contains embedded Linux with Android kernel

Page 37: Mickey  threats inside your platform final

root@9615-cdp:# cat /proc/cpuinfoProcessor : ARMv7 Processor rev 1 (v7l)BogoMIPS : 274.02Features : swp half thumb fastmult vfp edsp neon vfpv3 tlsvfpv4CPU implementer : 0x41CPU architecture: 7CPU variant : 0x0CPU part : 0xc05CPU revision : 1

Hardware : QCT MSM9615 CDPRevision : 0000Serial : 0000000000000000

Contains embedded Linux with Android kernel

Page 38: Mickey  threats inside your platform final

LTE module firmware update vulnerability

• Windows firmware update tool performs CRC check before passing firmware

image to LTE module

• LTE module only performs CRC check of firmware image before accepting update

• CRC helps with integrity verification, but is not sufficient to prevent security

compromise

• Easy to recalculate CRC and get LTE module to accept any arbitrary update

• Even easier to patch firmware update tool to recalculate CRC for us• Bonus: No way to force firmware update if the module has been compromised

• Firmware updates should be signed by OEMs private key

• LTE module should perform a signature verification using public key stored inside module

Page 39: Mickey  threats inside your platform final

• CVE-2015-5367

• Insecure Linux Image in Firmware

• CVE-2015-5368

• Insecure Firmware Update Authentication

Page 40: Mickey  threats inside your platform final

Affected products

• Huawei • ME906V/J/E

• HP • HP EliteBook 725 G2,HP EliteBook 745 G1,HP EliteBook 755 G2,HP EliteBook 820 G1,HP EliteBook 820 G2,HP

EliteBook 840 G1,HP EliteBook 840 G2,HP EliteBook 850 G1,HP EliteBook 850 G2,HP EliteBook 1040 G1,HP EliteBook 1040 G2,HP EliteBook Folio 9470m,HP EliteBook Revolve 810 G2,HP EliteBook Revolve 810 G3,HP ElitePad 1000 G2,HP Elite x2 1011 G2,HP ProBook 430 G1,HP ProBook 430 G2,HP ProBook 440 G0,HP ProBook 440 G1,HP ProBook 440 G2,HP ProBook 450 G0,HP ProBook 450 G1,HP ProBook 450 G2,HP ProBook 640 G1,HP ProBook 645 G1,HP ProBook 650 G1,HP ProBook 655 G1,HP Pro x2 612 G1,HP Spectre x2 13-SMB Pro,HP ZBook14,HP ZBook 14 G2,HP ZBook 15,HP ZBook 15 G2,HP ZBook 15u HP ZBook 17,HP Zbook 17 G2,mt41 Thin Client

Page 41: Mickey  threats inside your platform final

Thanks for your research and for giving the DefCon talk. I was there in the

audience.

Huawei is refusing to provide the ME906 firmware update directly to end users.

Instead, they refer to the OEM partner (Sony, etc.), who in turn knows nothing

about this. It's a classic case of finger pointing.

Do you have any insight and/or suggestions on how an end user of one of these

LTE modules can acquire the patch? In my case, it's the Sony variant.

Thanks in advance for your assistance. Please excuse the anonymous disposable

email, but I'm sure you know it's the only way to remain secure.

Regards,A (Disgruntled) Huawei Modem Owner

Page 42: Mickey  threats inside your platform final

Summary and key takeaways

• Every modern platform contains many CPUs beyond the main one everyone knows

about

• They often do not use a secure update mechanism

• AV software running on main CPU doesn’t have visibility into these additional CPUs

• They can be used to circumvent security controls in interesting ways

• Once one of these CPUs has been compromised, it can be impossible to clean

• We have to view the platform as an interconnected system with multiple security

boundaries and execution environments rather than focusing only on main CPU

and OS security issues

• Impossible to secure the overall platform without fixing device firmware security

Page 43: Mickey  threats inside your platform final

Questions?