Jump to content

Thunderspy

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Drbogdan (talk | contribs) at 19:42, 11 May 2020 (External links: adj). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Thunderspy
A logo created for the vulnerability, featuring an image of a spy
CVE identifier(s)CVE-2020-????
Date discoveredMay 2020; 4 years ago (2020-05)
DiscovererBjörn Ruytenberg
Affected hardwareComputers manufactured before 2019, and some after that, having the Intel Thunderbolt port.[1]
Websitethunderspy.io

Thunderspy is a type of security vulnerability, based on the Intel Thunderbolt port, first reported publicly on 10 May 2020, that can result in an evil maid (ie, attacker of an unattended device) attack gaining full access to a computer's information in about five minutes, and may affect millions of Apple, Linux and Windows computers, as well as any computers manufactured before 2019, and some after that.[1][2][3][4][5][6][7] According to Björn Ruytenberg. the discoverer of the vulnerability, "All the evil maid needs to do is unscrew the backplate, attach a device momentarily, reprogram the firmware, reattach the backplate, and the evil maid gets full access to the laptop. All of this can be done in under five minutes."[1]

History

The Thunderspy security vulnerabilities were first publicly reported by Björn Ruytenberg of Eindhoven University of Technology in the Netherlands on 10 May 2020.[8]

Impact

The security vulnerability may affect millions of Apple, Linux and Windows computers, as well as any computers manufactured before 2019, and some after that.[1][3][4]

Mitigation

Researchers claim there is no easy software solution, and may only be mitigated by disabling the Thunderbolt port altogether.[1]

References