new ACPI registry updates for 2017

Since I last looked[1], there has been one new company added to the ACPI registry (Marvell), and one new/updated ACPI spec (CSRT). There are also multiple new Plug and Play registry entries.

http://www.uefi.org/acpi_id_list (Last updated: 5/25/2017)
Coreboot Project BOOT 02/28/2017
Exar Corporation EXAR 02/28/2017
Marvell Technology Group Ltd. MRVL 05/25/2017
VR Technology Holdings Limited 3GVR 01/19/2017

http://www.uefi.org/pnp_id_list (Last updated 4/27/2016)
HOYA Corporation PENTAX Lifecare Division PNT 05/25/2017
Inlife-Handnet Co., Ltd. IVR 01/19/2017
MediCapture, Inc. MVR 05/25/2017
Pabian Embedded Systems PMS 02/28/2017
Pimax Tech. CO., LTD PVR 02/07/2017
Shanghai Chai Ming Huang Info&Tech Co, Ltd HYL 02/28/2017
Shanghai Lexiang Technology Limited DPN 02/07/2017
Techlogix Networx TLN 02/28/2017
Televic Conference TCF 02/28/2017
Total Vision LTD TVL 02/07/2017
TRAPEZE GROUP TRP 02/28/2017
VR Technology Holdings Limited DSJ 01/19/2017

http://www.uefi.org/acpi
http://uefi.org/PNP_ACPI_Registry
[1] https://firmwaresecurity.com/2017/03/02/acpi-registry-updates/

It appears the PNP_ID exported spreadsheet is not yet up-to-date with web page. By comparison, there were many more PNP IDs registered. But the ACPI exported spreadsheet is. Yet the PNP web page’s last-updated date is wrong, and the ACPI web page’s date is correct. It would be really helpful if the URL for the company would be included in the table, as well as an URL to each ACPI spec. And announce their updates. And it would be really nice if OEMs/ODMs/IHVs/IBVs/OSVs listed what ACPI version and tables they supported (yes, wishful thinking).

 

Microsoft updates bug bounty details

Microsoft updates it’s bug bounties:

https://technet.microsoft.com/en-us/security/mt784431

https://technet.microsoft.com/en-us/library/dn425049.aspx

Intel announces Core-X series

Intel introduced the new Intel® Core™ X-series processor family on May 30, 2017. Intel’s most scalable, accessible and powerful desktop platform ever, it includes the new Intel® Core™ i9 processor brand and the Intel® Core™ i9 Extreme Edition processor – the first consumer desktop CPU with 18 cores and 36 threads of power. The company also introduced the Intel® X299, which adds even more I/O and overclocking capabilities.

https://newsroom.intel.com/editorials/new-intel-core-x-series-processors-scale-accessibility-and-performance-go-extreme/
https://newsroom.intel.com/press-kits/intel-core-x-series-processors/
http://www.intel.com/content/www/us/en/products/processors/core/x-series.html
https://newsroom.intel.com/tag/intel-core-x-series/

NIST SP 800-193: Platform Firmware Resiliency Guidelines

I thought I got all the appropriate NIST announcements, but missed this, found it in Vincent’s recent blog post:

http://vzimmer.blogspot.com/2017/05/uefi-and-security-postings.html

Very exciting to see this NIST document!

Draft NIST Special Publication 800-193
Platform Firmware Resiliency Guidelines
Andrew Regenscheid

This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks. The platform is a collection of fundamental hardware and firmware components needed to boot and operate a system. A successful attack on platform firmware could render a system inoperable, perhaps permanently or requiring reprogramming by the original manufacturer, resulting in significant disruptions to users. The technical guidelines in this document promote resiliency in the platform by describing security mechanisms for protecting the platform against unauthorized changes, detecting unauthorized changes that occur, and recovery from attacks rapidly and securely. Implementers, including Original Equipment Manufacturers (OEMs) and component/device suppliers, can use these guidelines to build stronger security mechanisms into platforms. System administrators, security professionals, and users can use this document to guide procurement strategies and priorities for future systems.

http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-193

 

Intel SSD Toolbox EoP vulnerability

Intel® Solid State Drive Toolbox™ Escalation of Privilege Vulnerability

Intel ID: INTEL-SA-00074
Product family: Intel® Solid State Drive Toolbox™
Impact of vulnerability: Elevation of Privilege
Severity rating: Important
Original release: May 30, 2017

There is an escalation of privilege vulnerability in the Intel® Solid State Drive Toolbox™ versions before 3.4.5 which allow a local administrative attacker to load and execute arbitrary code.[…]

https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00074&languageid=en-fr

ARM assembly basics, part 1

Introduction to ARM Assembly Basics
Welcome to this tutorial series on ARM assembly basics. This is the preparation for the followup tutorial series on ARM exploit development (not published yet). Before we can dive into creating ARM shellcode and build ROP chains, we need to cover some ARM Assembly basics first. The following topics will be covered step by step:

ARM Assembly Basics Tutorial Series:
Part 1: Introduction to ARM Assembly
Part 2: Data Types Registers
Part 3: ARM Instruction Set
Part 4: Memory Instructions: Loading and Storing Data
Part 5: Load and Store Multiple
Part 6: Conditional Execution and Branching
Part 7: Stack and Functions

Writing ARM Assembly (Part 1)

 

SimpleSvm: hypervisor for AMD Windows systems

SimpleSvm is a minimalistic educational hypervisor for Windows on AMD processors. It aims to provide small and explanational code to use Secure Virtual Machine (SVM), the AMD version of Intel VT-x, with Nested Page Tables (NPT) from a windows driver. SimpleSvm is inspired by SimpleVisor, an Intel x64/EM64T VT-x specific hypervisor for Windows, written by Alex Ionescu.

https://github.com/tandasat/SimpleSvm

Vape Pens: source of USB attacks

https://twitter.com/FourOctets/status/867764655954866176

If you have a vaping device, make sure it supports Verified/Secure/Trusted/etc Boot. 🙂

[…]Take this as the weirdest example yet that you should never plug random devices into your USB ports. […] While FourOctets has no ill-intent, it is easy to imagine someone less scrupulous loading a computer with something not quite as funny. Like, say, a keylogger. Or ransomware.[…]

http://mashable.com/2017/05/26/vaping-digital-security-virus-usb/#iAjGmK3E0mqd

A related presentation, as suggested from a poster in the above twitter thread:

Holy smokes, how to vape yourself to root
Ross Bevington
Abstract: We all know that smoking is bad for your health, but what about you or your organisations security? I’ll show you that an eCig isn’t just a glorified smoke machine but a low power, battery operated, exploitation platform. I’ll show you how easy it is to decrypt the firmware, write your own functionality and use this to pwn some systems. Turning your eCig into everything from a keyboard to a USB stick. On the way we’ll do a bit of reverse engineering, write a bit of code and show how you can do most of this on a shoe string budget. Looking for ways to defend against attacks like this? I have some options. Consider this talk if you want another reason to ban smoking at your organisation.

https://www.securitybsides.org.uk/talksubmissions.html

HardwareSecurity.Training

Does ‘power trio’ apply to training companies, as well as rock bands? 🙂

https://twitter.com/nedos/status/868089302646960129

“Combined, we have over 25 years of experience teaching hardware security trainings and we have taught hundreds of classes. We have helped leading tech companies build their security teams and taught thousands of hardware security engineers the skills necessary for their day to day work. Our unique experience is unparalleled in the industry.”

https://twitter.com/nedos/status/868096436210212864

https://hardwaresecurity.training/trainings/

https://hardwaresecurity.training/

http://www.grandideastudio.com/

https://www.securinghardware.com/

https://toothless.co/

 

 

Nintendo 3DS

A few links to Nintendo 3DS firmware. The first tweet below hints of Nintendo having a response (ban?) to custom firmware.

Nintendo’s Next Ban Wave is Targeting Hacked 3DS’s, Here’s Everything We Know


https://twitter.com/aquamarinedoto/status/867832446099668992


 

sighax is a BootROM exploit (revealed at 33c3) for the Nintendo 3DS/2DS/New3DS. It exploits a vulnerability in the RSA signature parser and allows you to run fake-signed firmware on any console.

http://www.sighax.com/


 

“Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain”

https://github.com/Plailect/keyshuffling


 

A complete guide to developer 3DS custom firmware, from stock to boot9strap.

https://dev.3ds.guide/

https://github.com/Plailect/devGuide

https://github.com/Plailect/Guide


A tool to parse, extract, and builds 3DS firmware files

https://github.com/TuxSH/firmtool


 

Luma3DS is a program to patch the system software of (New) Nintendo 3DS handheld consoles “on the fly”, adding features (such as per-game language settings and debugging capabilities for developers) and removing restrictions enforced by Nintendo (such as the region lock). It also allows you to run unauthorized (“homebrew”) content by removing signature checks. To use it, you will need a console capable of running homebrew software on the ARM9 processor. We recommend Plailect’s guide for details on how to get your system ready.

https://github.com/AuroraWright/Luma3DS

 

AGESA update info from AMD

[…]Beginning this month, as we promised to you, we began beta testing a new AGESA (v1.0.0.6) that is largely focused on aiding the stability of overclocked DRAM (>DDR4-2667). We are now at the point where that testing can begin transitioning into release candidate and/or production BIOSes for you to download. Depending on the QA/testing practices of your motherboard vendor, full BIOSes based on this code could be available for your motherboard starting in mid to late June. Some customers may already be in luck, however, as there are motherboards—like my Gigabyte GA-AX370-Gaming5 and ASUS Crosshair VI—that already have public betas.
[…]
If you’re the kind of user that just needs (or loves!) virtualization every day, then AGESA 1.0.0.6-based firmware will be a blessing for you thanks to fresh support for PCI Express Access Control Services (ACS). ACS primarily enables support for manual assignment of PCIe graphics cards within logical containers called “IOMMU groups.” The hardware resources of an IOMMU group can then be dedicated to a virtual machine. This capability is especially useful for users that want 3D-accelerated graphics inside a virtual machine. With ACS support, it is possible to split a 2-GPU system such that a host Linux® OS and a Windows VM both have a dedicated graphics cards. The virtual machine can access all the capabilities of the dedicated GPU, and run games inside the virtual machine at near-native performance.[…]

https://community.amd.com/community/gaming/blog/2017/05/25/community-update-4-lets-talk-dram

http://www.tomshardware.com/news/amd-agesa-firmware-update-motherboard,34525.html

 

DMTF updates MCTP SMBus/I2C Transport Binding spec

DMTF Releases Updated MCTP SMBus/I2C Transport Binding Specification
The DMTF’s Platform Management Components Intercommunication (PMCI) Working Group defines standards to address “inside the box” communication and functional interfaces between the components of the platform management subsystem (e.g., management controllers, managed devices, etc.). PMCI’s Management Component Transport Protocol (MCTP) over SMBus/I2C Transport Binding Specification is now available in version 1.1.0 . This specification addresses how MCTP packets are delivered over a physical SMBus or I2C medium using SMBus transactions. It defines how physical addresses are used, how fixed addresses are accommodated, how physical address assignment is accomplished for hot-plug or other devices that require dynamic physical address assignment, and how MCTP support is discovered. In addition, timing specifications for bus and MCTP control operations are included, and a “fairness” protocol is defined for the purpose of avoiding deadlock and starvation/lockout situations among MCTP endpoints. The binding has been designed to be able to share the same bus as devices communicating using earlier SMBus/I2C management protocols, such as Alert Standard Format (ASF) and Intelligent Platform Management (IPMI), and with vendor-specific devices using SMBus/I2C protocols. The specification also allows a given device to incorporate non-MCTP SMBus functions alongside MCTP.

Click to access DSP0237_1.1.0.pdf

https://www.dmtf.org/standards/pmci

Analyzing ECU firmware

How They Did It: An Ana­ly­sis of Emis­si­on De­feat De­vices in Mo­dern Au­to­mo­bi­les
Mo­dern ve­hi­cles are re­qui­red to com­ply with a range of en­vi­ron­men­tal re­gu­la­ti­ons li­mi­t­ing the level of emis­si­ons for va­rious green­hou­se gases, to­xins and par­ti­cu­la­te mat­ter. To en­su­re com­pli­an­ce, re­gu­la­tors test ve­hi­cles in con­trol­led set­tings and em­pi­ri­cal­ly me­a­su­re their emis­si­ons at the tail­pipe. Howe­ver, the black box na­tu­re of this tes­ting and the stan­dar­diza­t­i­on of its forms have crea­ted an op­por­tu­ni­ty for eva­si­on. Using mo­dern elec­tro­nic en­gi­ne con­trol­lers, ma­nu­fac­tu­rers can pro- gram­ma­ti­cal­ly infer when a car is un­der­go­ing an emis­si­on test and alter the be­ha­vi­or of the ve­hi­cle to com­ply with emis­si­on stan­dards, while ex­cee­ding them du­ring nor­mal dri­ving in favor of im­pro­ved per­for­mance. While the use of such a de­feat de­vice by Volks­wa­gen has brought the issue of emis­si­ons chea­ting to the pu­blic’s at­ten­ti­on, there have been few de­tails about the pre­cise na­tu­re of the de­feat de­vice, how it came to be, and its ef­fect on ve­hi­cle be­ha­vi­or. In this paper, we pre­sent our ana­ly­sis of two fa­mi­lies of soft­ware de­feat de­vices for die­sel en­gi­nes: one used by the Volks­wa­gen Group to pass emis­si­ons tests in the US and Eu­ro­pe, and a se­cond that we have found in Fiat Chrys­ler Au­to­mo­bi­les. To carry out this ana­ly­sis, we de­ve­lo­ped new sta­tic ana­ly­sis firm­ware fo­ren­sics tech­ni­ques ne­cessa­ry to au­to­ma­ti­cal­ly iden­ti­fy known de­feat de­vices and con­firm their func­tion. We tested about 900 firm­ware ima­ges and were able to de­tect a po­ten­ti­al de­feat de­vice in more than 400 firm­ware ima­ges span­ning eight years. We de­scri­be the pre­cise con­di­ti­ons used by the firm­ware to de­tect a test cycle and how it af­fects en­gi­ne be­ha­vi­or. This work fra­mes the tech­ni­cal chal­len­ges faced by re­gu­la­tors going for­ward and high­lights the im­portant re­se­arch agen­da in pro­vi­ding fo­cu­sed soft­ware as­suran­ce in the pre­sence of ad­ver­sa­ri­al ma­nu­fac­tu­rers.

http://syssec.rub.de/research/publications/defeat-devices/