Researcher Has New Attack For Embedded Devices 86
tinkertim writes "Computerworld is reporting that a researcher at Juniper has discovered an interesting vulnerability that can be used to compromise ARM and Xscale based electronic devices such as many popular routers and mobile phones. According to the article, the vulnerability would allow hackers to execute code and compromise personal information or re-direct internet traffic at the router level. Juniper plans to demonstrate not only the researcher's discovery, but also how he managed to use a common JTAG developed Boundary Scan to discover the vulnerability at this month's CanSecWest conference in hopes of shifting more of the black hat community to looking at devices instead of software."
Researcher Has New Attack For DOS (Score:2, Informative)
I've just had the greatest idea for my PhD.
Re: (Score:3, Interesting)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Yeah, but unlike Perl and Python, AREXX sucked, from a programming language point of view. It worked as a scripting glue, but I wouldn't want to write a substantial program in that language.
Re: (Score:2)
Re: (Score:1)
Amiga's mascots have alwasy been sooooooooooo s3xy. =D
Re: (Score:1)
I wonder why they don't do the same for modern operating systems - basically storing the entire "context" (memory pages, registers, etc.) and loading it later, mayb
Re: (Score:1)
Re: (Score:1, Insightful)
Is the article suggesting (Score:2)
To me that seems bass ackwards. Something seems fishy about the post, perhaps they want White HAT hackers, or maybe they are afraid of the interest of Black Hats but... surely they aren't excited to have people finding holes in their devices and not reporting them?
Re: (Score:3, Insightful)
Not on their hardware, but hardware in general. Show folks that those Linksys firewalls aren't as good as the Netscreen product which cost 5x to 100x more. I'm sure they are unreasonably confident in the security of their own product.
Re: (Score:2)
Re: (Score:2)
And then there's us poor schmuck's who bought something like this [archos.com], and just want to be able to run whatever code we want on it. These folks [archopen.org] have done a lot of hacking on the Archos devices
Good God... (Score:2)
Juniper plans to demonstrate... at this month's CanSecWest conference in hopes of shifting more of the black hat community to looking at devices instead of software
My initial reaction was along the lines of, "Good God, I hope they get together with Marvell & JTAG and post some firmware updates before they release the details."
To do otherwise would strike me as nigh unto criminally negligent.
Or maybe they're saying that the vulnerability can't be patched in firmware?!? If so, then yikes! [And all
Re: (Score:2, Informative)
Re: (Score:1)
Via JTAG? (Score:5, Interesting)
If it's not remote, then what's the point? I though it was already well-established that if you have physical access to the device you can do anything you want.
Re: (Score:3, Interesting)
Re:Via JTAG? (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
Re: (Score:3, Insightful)
I'm not saying it's impossible, but it would
Re: (Score:2)
Remote RF interference (Score:2)
Unless you're talking about trying
Yes you can jtag remotely (Score:2)
You just need to get the victim to open up their unit, solder on some contacts and hook up an ethernet-enabled jtag debugger and plug that into the ethernet without a firewall. Something like: http://users.actrix.co.nz/manningc/lejos_nxt.jpg [actrix.co.nz] (a JTAG unit hooked up to a Lego NXT device).
You'd then be able to debug the device as much as you want without the victim noticing anything.
Re: (Score:2)
The researcher discovered a vulnerability via JTAG, however a Boundary Scan is obviously not needed to use the exploit remotely. A Boundary Scan is w
Long on hype, short on details (Score:3, Insightful)
Re:Long on hype, short on details (Score:4, Informative)
So it's not exactly an exploit, but a way to discover exploits by targeting issues with the embedded processors as discovered via jtag access to a similar unit.
Re: (Score:2)
Re: (Score:3, Informative)
TFA talks about using JTAG itself to run exploits, which I don't care about since physical security is the first layer of any security plan. If someone has better physical acc
Re:Long on hype, short on details (Score:5, Informative)
The proper trained eye looking at the circuit schematics would have been able to identify the same things--and probably have. The engineers who see the exploits usually take them home and play core wars with their friends. It's the same concept as reverse engineering closed source drivers. The original engineers wrote the closed source implementation and now Jack (at Juniper) is reverse engineering it and finding some interesting twists along the way.
What do you call a zero day exploit before it's released to the general public and called a zero day exploit? Whatever it's called it has existed since before common home routers have been available at major consumer outlets. It's impossible to think that nobody ever took advantage of it until now.
Re: (Score:1)
He said he found some architectural weirdnesses using jtag to debug stuff. No biggie. The thing is between some external packets coming in and exploiting an architectural misfeature is a bunch of OS software, so it seems like there should be plenty of opportunities to squash whatever bugs he's going to come up with.
Re: (Score:1)
Re:Long on hype, short on details (Score:5, Informative)
The rest of the article goes on to discuss the security implications of leaving the JTAG enabled
I imagine that Juniper produces some of the 10% of those devices that disable the JTAG on their equipment, that is why they are promoting this in hacker circles.
Re: (Score:1)
to assume that the bad guy knows *exactly* how your algorithm works. Other security mechanisms should, and do,
use the same threat model.
If the article is about "I used JTAG to dump the code from the CPU, which allowed me to find exploitable flaws",
it's rather boring.
If the article is about "I used JTAG to cause the CPU to do something other than the origin
Re: (Score:2)
Re: (Score:2)
I cracked open (physically) a Juniper packet filter the other day (a 1U box with only an ethernet in, ethernet out, and power). Inside was an Intel-made x86 CPU (I forget which one, but a fairly old one) on a minimal motherboard and a 3.5 inch HD set with a the 2GB clip enabled (the drive was 10GB). The filesystem was FAT16 with no long file names
Re: (Score:1)
Re: (Score:1)
Attacking embedded devices. (Score:4, Informative)
The article doesn't claim that the attack uses the JTAG port. It claims that he used the JTAG port to find some sort of vulnerability. People do this ALL THE TIME.... I do it at work to reverse engineer automotive computers.
Now it does say that there is some peculiarity of these specific CPUs that makes them vulnerable to an attack of some sort. I hope the peculiarity isn't the presense of the JTAG port. If you assume people won't get your binary code off of a chip because it doesn't have a debug port then you're a fool.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
You can disable JTAG on some devices (Score:2)
If you have physical access, you already won. (Score:4, Insightful)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
I have just quit a gig at Freescale Semiconductor, and I can assure you that the security capabilities of their mobile platforms are absolutely spot on - you can nail absolutely *everything* down. However, if you want to debug models that have failed in the field, then you need to at ship them with the secure JTAG cranked down to a not-totally-disabled (by e-fuses, no way back) setting. For work at service centres, rath
Re: (Score:1)
Can't you just require signing something with a very secret key - one that even the original developers don't know - to re enable JTAG? I don't know all the details of the solution, and I wouldn't want to post them if I did, but I know at least some embedded systems ship in a state where both the factory/service centre
Re: (Score:1)
Re: (Score:2)
Right, like I said, only people who believe they can keep someone from breaking into their own computer think that you can win even when the other guy has physical access. Cellphone manufacturers are a perfect example.
What keeps people from chipping their own cellphones isn't the technical difficulty of breaking in and unlocking it, it's that the risk of losing
A line from Moby Dick.... (Score:1)
Just tell us, no free publicity.
Not useful as atack (Score:1)
Wii (Score:1)
Re: (Score:2)
The port I think you're referring to is the debug port on the dvd-rom btw, as this is what all the hacks I know of at the moment use.
Re:Wii (Score:4, Informative)
Re: (Score:1)
If he discovered an attack from the WAN side, that isn't new. People disassemble and scrutinize devices all the time. Most likely, a simple reflash of an updated ROM will take care of this.
Access to the JTAG contacts on a chip isn't hard to disable either. One can set stuff read-only, or just do like Microsoft did with the Xbox 360, and encase the critical chips in hard epoxy blobs.
iPods? (Score:2)
JTAG developed Boundary Scan? (Score:2)
He probably used the JTAG port to take a look and play with the ARM/XScale processors, but not the Boundary Scan part of the port's capabilities. Even the article doesn't mention the Boundary Scan, which is normally used only for testing whether the processor is well and alive.
Re: (Score:1, Funny)
Processor Magazine [processor.com] is reporting that developers at Steelcape [steelcape.com] have developed a new solution [for] sending data without opening ports on the firewall. Will this work with embedded devices?
Oh what the hell? (Score:2)
ARM/XScale implementation differences (Score:1)
JTAG Is a tool, not an exploit (Score:2, Interesting)
Mod up (Score:1)