Flutterby™! : Via C3 backdoors

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

Via C3 backdoors

2018-08-11 18:53:20.447508+02 by Dan Lyke 0 comments

project:rosenbridge — hardware backdoors in Via C3 x86 architecture CPUs.

The rosenbridge backdoor is a small, non-x86 core embedded alongside the main x86 core in the CPU. It is enabled by a model-specific-register control bit, and then toggled with a launch-instruction. The embedded core is then fed commands, wrapped in a specially formatted x86 instruction. The core executes these commands (which we call the 'deeply embedded instruction set'), bypassing all memory protections and privilege checks.

While the backdoor should require kernel level access to activate, it has been observed to be enabled by default on some systems, allowing any unprivileged code to modify the kernel.

[ related topics: Robotics Space & Astronomy Embedded Devices Architecture ]

comments in ascending chronological order (reverse):