[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FD] Western Digital - My Passport / My Book self-encrypting external hard drive series - Multiple vulnerabilities
- To: fulldisclosure@xxxxxxxxxxxx
- Subject: [FD] Western Digital - My Passport / My Book self-encrypting external hard drive series - Multiple vulnerabilities
- From: alendal@xxxxxxxxxxxx
- Date: Sun, 18 Oct 2015 22:35:44 +0200
Research overview:
==========================
Research on Western Digital wide-spread self-encrypting hard drive series "My
Passport" / "My Book".
Devices researched utilizes mandatory HW AES encryption.
Authors:
==========================
Gunnar Alendal
Christian Kison
modg
Paper and presentation links:
==========================
Full paper at Cryptology ePrint Archive:
https://eprint.iacr.org/2015/1002.pdf
Presentation slides, based on research paper:
http://hardwear.io/wp-content/uploads/2015/10/got-HW-crypto-slides_hardwear_gunnar-christian.pdf
Vulnerabilities disclosed:
==========================
Multiple vulnerabilities, including:
* Multiple authentication backdoors, bypassing password authentication
* AES factory key recovery attacks, exposing user data on all affected devices,
regardless of user password
* Exposure of HW PRNGs used in cryptographic contexts
* Unauthorized patching of FW, facilitating badUSB/evil-maid attacks
Vendor notification:
==========================
The vendor has been informed of the research.
Patches:
==========================
The authors are not aware of any fixes.
Architectures researched:
==========================
USB Bridge Vendor - Chip model - Architecture
===============
JMicron - JMS538S - Intel 8051
Symwave - SW6316 - Motorola M68k
PLX - OXUF943SE - ARM7
Initio - INIC-1607E - Intel 8051
Initio - INIC-3608 - ARC 600
JMicron - JMS569 - Intel 8051
===============
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/