A team comprised of Sean "xobs" Cross and Xbox hacker Andrew "bunnie" Huang has demonstrated an exploit that allows SD memory cards to be used for man-in-the-middle attacks. Rather than relying on software residing in the SD card's regular pool of user-accessible flash memory, the exploit allows malicious code to be injected directly into the device's firmware. That firmware governs how SD cards and other NAND-based devices manage their flash memory, giving it access to the onboard microcontroller in addition to all incoming and outgoing data.
The exploit was demonstrated with SD cards based on a flash controller from Appotech, but Huang says all "managed NAND" devices could be vulnerable, including SSDs and USB thumb drives. The problem seems to be a lack of security surrounding the firmware update process for flash controllers. More details are available in an hour-long presentation given during the Chaos Computer Congress:
Huang has already seen Chinese vendors loading custom firmware onto SD cards that misrepresents the amount of onboard storage. Now, it's apparently possible to load much more nefarious code.
The vulnerability doesn't have to be used for evil, though. According to Huang, the exploit allows SD cards to be used as a cheap source of microcontrollers for DIY projects. The processors inside common SD cards offer "several times the performance" of an Arduino CPU at "a fraction of the price," Huang says.
|Gigabyte SA-SBCAP3350 puts formidable power on a single board||14|
|Alphacool Eisblock HDX-2 and HDX-3 help M.2 SSDs beat the heat||11|
|Corsair Lighting Pro Expansion Kit lets builders turn up the lights||10|
|Adata D16750 power bank is tougher than the average juice pack||16|
|Deals of the week: fast memory, an AM4 motherboard, and more||18|
|Corsair RMx White Series PSUs take a walk on the snowy side||24|
|Intel crams 100 GFLOPS of neural-net inferencing onto a USB stick||44|
|Toshiba's XG5 1TB NVMe SSD reviewed||10|
|Microsoft and Johnson Controls put Cortana in a thermostat||26|