CAPEC-665: Exploitation of Thunderbolt Protection Flaws

ID CAPEC-665
Typical Severity Very High
Likelihood Of Attack Low
Status Stable

An adversary leverages a firmware weakness within the Thunderbolt protocol, on a computing device to manipulate Thunderbolt controller firmware in order to exploit vulnerabilities in the implementation of authorization and verification schemes within Thunderbolt protection mechanisms. Upon gaining physical access to a target device, the adversary conducts high-level firmware manipulation of the victim Thunderbolt controller SPI (Serial Peripheral Interface) flash, through the use of a SPI Programing device and an external Thunderbolt device, typically as the target device is booting up. If successful, this allows the adversary to modify memory, subvert authentication mechanisms, spoof identities and content, and extract data and memory from the target device. Currently 7 major vulnerabilities exist within Thunderbolt protocol with 9 attack vectors as noted in the Execution Flow.

https://capec.mitre.org/data/definitions/665.html

Weaknesses

# ID Name Type
CWE-288 Authentication Bypass Using an Alternate Path or Channel weakness
CWE-345 Insufficient Verification of Data Authenticity weakness
CWE-353 Missing Support for Integrity Check weakness
CWE-862 Missing Authorization weakness
CWE-1188 Initialization of a Resource with an Insecure Default weakness

Taxonomiy Mapping

Loading...