Sunday, April 29, 2018

Nvidia Chip's Issue


The Nintendo Switch is a popular console across the nation used by many. One piece in this equipment is a Nvidia chip. Unfortunately, researchers have noted a vulnerability with this chip. This was found by Kate Temkin and an engineer known as Hedgeberg. For two researchers working alone, this may have been an unnerving task. They participated however in the Nintendo Switch Hacking Project (Reswitched). The researchers titled this Fuse`e Gelee`.

As this is a published issue, the researchers did have to release the PoC exploit. The researcher was completely responsible and disclosed the issue to Nintendo and other vendors using this chip in March 2018. The researchers promised not to disclose this until June 15th. There was a third party however that also found the vulnerability and was going to disclose it. The researchers thought holding this until the promised date would be problematic, as the other researchers were going to publish this, and released this early.

Target
This affects a limited scope of the chips, and not their entire product line. This has been noted to affect the Tegra chips prior to the T186/X2 sold prior to 2016. This chip is predominantly used in the Switch, along with other products. Although this is not used in every product, where it is used, the equipment is potentially at risk.

Exploit
This vulnerability has been open for most of a decade. The Fuse`e Gelee` exploit is focussed on the Nvidia Tegra chipset. When properly executed, this allows for custom code to be placed on the “locked down” devices. This, in short, is a cold boot attack with the Switch game console while in the Tegra Recovery Mode (RCM). This exploit is due to an unpatchable oversight in the boot ROM.

Operation
In summary, this works via a vulnerability with the Switch’s start-up process. The vulnerability is at the silicon level. During the start-up the Switch chip is taken over and directed to execute unauthorized software. This is used to unlock the Switch, so potentially unauthorized software and code may be run.  

This is not a wireless attack. The attacker has to have access to the equipment prior to it powering up. Specifically, this affects the USB software stack in the Tegra boot ROM. This calls a memory copy function with a lengthy parameter, which is defined by the attacker. This allows the processor’s execution stack to be overwritten with the oversized copy operation. The device is pwned and the attacker is able to direct the processor to execute any chosen code. The coded USB control request leverages the vulnerability by the attacker copying his/her code onto the active execution stack, adding to or replacing the legitimate code. The attacker controls the Boot and Power Management Processor (BPMP) prior to any lock-outs or reduction in privileges occur.

As noted, the attacker to successfully execute the attack needs to have physical access. For this to work, the device has be pushed into the USB recovery mode, with shorting a pin in the right hand JoyCon connector.

Remediation
This attack itself is not easy for an unauthorized, third party attacker. This is also not an easy or quick fix for Nvidia. The fix will require the hardware to be re-engineered. This drastic step is required due to the chip’s design.

At the factory, the boot ROM is able to accept minor updates. Once the chip leaves the factory, it is not able to be updated. Thus, once the chip and equipment leaves the factory, it is in a vulnerable state. The issue is permanently part of the chip and may not be remediated.

In closing…
This is a rather serious issue. The successful attack allows full control of the processes, if the attacker were to choose. This however is a limited attack, as it requires physical access.


Resources
Claburn, T. (2018, April 23). I got 99 secure devices but a nintendo switch ain’t one: If you’re using nvidia’s tegra boot ROM I feel bad for you, son. Retrieved from http://www.theregister.co.uk/2018/04/23/nintendo_switch_nvidia_tegra_boot_rom_flaw/

Moore-Colyer, R. (2018, April 24). Nvidia tegra x1 flaw allows all nintendo switch consoles to be hacked. Retrieved from https://www.theinquirer.net/inquirer/news/3030823/nvidias-tegra-x1-flaw-allows-all-nintendo-switch-consoles-to-be-hacked

Orland, K. (2018, April 25). Behind the scenes with the hackers who unlocked the nintendo switch. Retrieved from https://arstechnica.com/gaming/2018/04/behind-the-scenes-with-the-hackers-who-unlocked-the-nintendo-switch/

No comments:

Post a Comment