9 comments

  • Tiberium 17 hours ago ago
  • eqvinox 13 hours ago ago

    Not exactly surprising; unless you establish some type of shared secret between the TPM and CPU (e.g. by burning it into fuses in both devices, or through some signature scheme), the bus connecting the two will always be a problem…

    • pseudohadamard an hour ago ago

      Also not exactly surprising: It requires direct physical access to the hardware, if an attacker has that level of control you're a goner no matter what you do. In any case since Moxa devices have historically been riddled with buffer overflows and XSS and RCEs and similar vulns, no attacker will ever need to use this attack because there's much, much easier ways to get in that don't require that you travel to where the device is, get past the physical security at the site, remove the device, dismantle it, and attach probes to internal buses.

    • Neywiny 12 hours ago ago

      I've thought about it but haven't checked too hard: can they not do a key exchange? In my existing research I've found no reason they can't, just that they don't.

      • jcalvinowens 12 hours ago ago

        They often do, but it can be MITM'd without some sort of authentication, which generally requires something to be installed in the factory.

        • Neywiny 11 hours ago ago

          I guess we only see the ones that don't in the news. Makes sense. I have yet to see one of these where the data is encrypted and they M'dITM to get it, but I'm sure it's happened.

        • eqvinox 11 hours ago ago

          Exactly this. Burning in a shared secret works; alternatively you could do something with private keys burned into each device, signed with some PKI scheme whose public keys are known to the other entity.

          Notably both of these turn it into a 'microscope' problem, alternatively if the key leaks somewhere…

          At the end of the day, if the system is to process the data, it needs to access it. (Homomorphic encryption nonwithstanding.)

          • Neywiny 11 hours ago ago

            I thought security chips put (extra?) metallization over top the logic to prevent the microscope problem. Do they not or can that still be defeated? I guess if you're careful enough you can strip off that extra layer

            • eqvinox 9 hours ago ago

              People are very creative in defeating those mechanisms. It's mostly a question of time. Also doesn't help if there's some side channel or software leak.

              The only "truly" 'safe-ish' thing is active battery powered intrusion detection. It's done for high end HSMs… which easily sell for 5 or 6 digit prices.