Breaking
March 12, 2025

This Week in Security: Recall, BadRAM, and OpenWRT Jonathan Bennett | usagoldmines.com

Microsoft’s Recall feature is back. You may remember our coverage of the new AI feature back in June, but for the uninitiated, it was a creepy security trainwreck. The idea is that Windows will take screenshots of whatever is on the screen every few seconds, and use AI to index the screenshots for easier searching. The only real security win at the time was that Microsoft managed to do all the processing on the local machine, instead of uploading them to the cloud. All the images and index data was available unencrypted on the hard drive, and there weren’t any protections for sensitive data.

Things are admittedly better now, but not perfect. The recall screenshots and database is no longer trivially opened by any user on the machine, and Windows prompts the user to set up and authenticate with Windows Hello before using Recall. [Avram] from Tom’s Hardware did some interesting testing on the sensitive information filter, and found that it worked… sometimes.

So, with the public preview of Recall, is it still creepy? Yes. Is it still a security trainwreck? It appears that the security issues are much improved. Time will tell if a researcher discovers a way to decrypt the Recall data outside of the Recall app.

Patch Tuesday

Since we’re talking about Microsoft, this week was Patch Tuesday, and we had seventy-one separate vulnerabilities fixed, with one of those being a zero-day that was used in real-world attacks. CVE-2024-49138 doesn’t seem to have a lot of information published yet. We know it’s a Heap-based Buffer Overflow in the Common Log File driver, and allows an escalation of privilege to SYSTEM on Windows machines.

BadRAM

One of the most interesting frontiers in computing right now is trying to give cloud computing actual security. AMD has approached this problem with SEV-SNP, Secure Encrypted Virtualization/Secure Nested Paging, among other approaches. But today we have a very clever hardware attack that can defeat SEV-SNP: BadRAM.

The key here is the DIMM memory specification’s SPD, Serial Presence Detect. That’s a simple protocol that uses SMBus, an I2C protocol, to pull information from a memory module. How does your desktop know that those are 4 GB modules? And how does it know the right timings to actually boot successfully? SPD provides that data. BadRAM asks the rather simple question, what happens if you overwrite a module’s SPD chip?

When you convince SPD to lie, and report a memory module that’s larger than it really is, you get a sort of shadow memory. Put simply, multiple memory addresses refer to the same physical bits. That should set your security alarm bells to sounding. This defeats most memory protection schemes, and allows overriding SEV-SNP, by just over-writing the security hashes after they’ve been calculated. AMD has released updated firmware that actively checks for aliasing addresses, defeating the attack.

When rnd is Hard

Getting good random bits is hard. There is the obvious problem, that computers are deterministic, and can’t actually generate randomness without dedicated hardware for the purpose. Beyond that, different languages and platforms have different quirks. Many of those languages have a pseudorandom function, that can produce a good approximation of random numbers. The catch is that those numbers are entirely deterministic, and to be anything close to usable as a safe source of randomness, the pseudorandom function must be seeded with a truly non-deterministic number.

Which is why it’s particularly bad to accidentally hard-code the seed into a platform. And yes, that’s exactly what the Web assembly platform for Dart did until surprisingly recently. This did result in an easy-to-guess websocket port/key/password combination that could result in the takeover of a Dart application from another visited website. And that’s not all, follow the link above to find two other similar stories in the Dart/Flutter world.

OpenWRT and sha256 collisions

The OpenWRT project had a bit of a security scare late last week. It turns out that the attended sysupgrade service actually triggers custom firmware builds on the OpenWRT servers. And it’s possible to run arbitrary code insode that build process. That’s not as bad as it sounds, as the project works very hard to isolate each of those builds inside podman containers. There was another problem, where build artifacts were tracked using a partial SHA256 hash. The full 64 characters of a SHA256 hash is enough to be secure, particularly in this case — but reducing that to twelve characters is not.

[RyotaK] actually did the work, using hashcat to find a hash collision, resulting in the server serving a tampered firmware image in place of the correct one. The find was reported, and the sysupgrade build server was temporarily taken offline, and a fix rolled out. The OpenWRT project put out a statement, acknowledging the issue, and pointing out that there are insufficient logs to determine whether this vulnerability chain has ever actually been used. And so out of an abundance of caution, users of the sysupgrade server should trigger an in place upgrade to completely rule out the possibility of running a compromised image.

Bits and Bytes

Facebook Messenger on iOS had an issue, where a member of group calls could crash the app for all members of the call, simply by sending an invalid emote to the group. Sure puts the angry face in context. It’s fixed now, appears to be strictly limited to the denial of service crash, and there’s a decent walkthrough of the problem at the link.

Maxwell Dulin, AKA [Striꓘeout], has now worked on both sides of the security coin. He’s both been the security researcher, and now is on the security team at a company. This puts him in a particularly good position to comment on why it takes so long to fix a given bug. And not to give it away, but some of the reasons are better than others.

And finally, how not to fall for a crypto scam. In this case, it was a Telegram group, that was hawking a fake new token. The scam was rather impressive, with faked reviews from Certik and TechRate, and legitimate looking smart contracts. But like most deals that seem to good to be true, this was a rugpull, where criminal con artists convinced a few investors to put money into the scheme, only to take the money and run. Stay frosty out there!

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

How To Use LLMs For Programming Tasks Donald Papp | usagoldmines.com

A Magic Eye Tube Does All The Work In This Kit Jenny List | usagoldmines.com

A Deep Dive Into Canon Autofocus Lenses Maya Posch | usagoldmines.com

Keebin’ with Kristina: the One with the Batwing Typewriter Kristina Panos | usagoldmines.com

Tiny Laptop Gets a New Case and an Unlocking Dan Maloney | usagoldmines.com

TrapC: A C Extension For the Memory Safety Boogeyman Maya Posch | usagoldmines.com

Josephine Cochrane Invented the Modern Dishwasher — In 1886 Donald Papp | usagoldmines.com

Homebrew Traffic Monitor Keeps Eyes on the Streets Tom Nardi | usagoldmines.com

Hacking a Heavyweight Philco Radio Heidi Ulrich | usagoldmines.com

Satellite Imagery You Can Play With Jenny List | usagoldmines.com

What’s Wrong With This Antenna Tuner? Al Williams | usagoldmines.com

Solar-Powered E-Reader With No Buttons Bryan Cockfield | usagoldmines.com

Freeing Windows Al Williams | usagoldmines.com

Conservationists Are Flying Microlites To Teach Birds How To Migrate Lewin Day | usagoldmines.com

The ESP32 Bluetooth Backdoor That Wasn’t Maya Posch | usagoldmines.com

Inexpensive Repairable Laptops, With Apple Style Bryan Cockfield | usagoldmines.com

Ripple Co-Founder Chris Larsen Lost $661,623,870 in XRP Due to LastPass Hack: Report Alex Richardson...

You Are Already Traveling at the Speed of Light Al Williams | usagoldmines.com

ZX Spectrum, Soviet Style: A 44-IC Clone You Can Build Heidi Ulrich | usagoldmines.com

IPV4, IPV6… Hey! What Happened to IPV5? Al Williams | usagoldmines.com

Clock Mechanism Goes Crazy for Arduino Al Williams | usagoldmines.com

Hackaday Links: March 9, 2025 Dan Maloney | usagoldmines.com

Deep Drawing with Ultrasonics Al Williams | usagoldmines.com

Old Chromebooks Get Second Life as Video Wall Tom Nardi | usagoldmines.com

Taming the Wobble: An Arduino Self-Balancing Bot Heidi Ulrich | usagoldmines.com

Fixing an Unpleasant SD Card Slot Issue In a NanoVNA Maya Posch | usagoldmines.com

The Coolest Batteries You’ve Never Heard Of Heidi Ulrich | usagoldmines.com

Retrotechtacular: Better Living Through Nuclear Chemistry Dan Maloney | usagoldmines.com

Fictional Computers: EMERAC was the Chatbot of 1957 Al Williams | usagoldmines.com

Writing an OLED Display Driver in MicroZig Maya Posch | usagoldmines.com

Expensive Camera, Cheap 3D-Printed Lens Jenny List | usagoldmines.com

Bank of America Warns Social Security Numbers, IDs and Other Sensitive Customer Data Potentially Exp...

Transceiver Reveals Unusual Components Al Williams | usagoldmines.com

$830,000 Drained From Wells Fargo As Customer Executes Brazen Attack, Triggers Fraudulent Bank Trans...

Physical Computing Used to be a Thing Elliot Williams | usagoldmines.com

The Pentium Processor’s Innovative (and Complicated) Method of Multiplying by Three, Fast Donald Pap...

Retail Pharmacy Giant Handing $6,800,000 To Customers After Hackers Trigger Massive Data Breach Dail...

Get Into Meshtastic On the Cheap With This Tiny Node Kit Dan Maloney | usagoldmines.com

The Road to Lucid Dreaming Might be Paved With VR Donald Papp | usagoldmines.com

This Laser Knows about Gasses Al Williams | usagoldmines.com

Trump Sues Capital One After Slamming Bank of America, JPMorgan Chase Over Abrupt Bank Account Termi...

Tearing Down a Vintage Word Processor Al Williams | usagoldmines.com

Trio of Mods Makes Delta Printer More Responsive, Easier to Use Dan Maloney | usagoldmines.com

Run Xbox 360 Games on Your PC With XenonDecomp Maya Posch | usagoldmines.com

Open Source Hardware, How Open Do You Want It To Be? Jenny List | usagoldmines.com

Hackaday Podcast Episode 311: AirTag Hack, GPS Rollover, and a Flat-Pack Toaster Tom Nardi | usagold...

GNSS Signals Tracked on the Moon By LuGRE Maya Posch | usagoldmines.com

This Week in Security: Zen Jailbreak, Telegram Exploit, and VMware Hyperjack Jonathan Bennett | usag...

The Long Goodbye: More Instruments Shut Down on the Voyagers as End Nears Maya Posch | usagoldmines....

Open Safety In The Auto Business: Renault Shares Its Battery Fire Suppression Tech Jenny List | usag...

Repairing a 1955 Classic Radio Al Williams | usagoldmines.com

Combined Crypto, Anglo-American Style Al Williams | usagoldmines.com

The Strange Afterlife of the Xbox Kinect Dave Rowntree | usagoldmines.com

Plastic Gear Repair Al Williams | usagoldmines.com

Custom Touchpad PCBs Without The Pain Jenny List | usagoldmines.com

Hackaday Europe 2025 Welcomes David Cuartielles, Announces Friday Night Bring-a-Hack Elliot Williams...

Hacking Digital Calipers for Automated Measurements and Sorta-Micron Accuracy Dan Maloney | usagoldm...

Why 56k Modems Relied On Digital Phone Lines You Didn’t Know We Had Lewin Day | usagoldmines.com

The Future We Never Got, Running a Future We Got Jenny List | usagoldmines.com

Rackmount all the Things, Hi-Fi Edition Heidi Ulrich | usagoldmines.com

A TV With Contrast You Haven’t Seen For Years Jenny List | usagoldmines.com

Ptychography for High Resolution Microscopy Al Williams | usagoldmines.com

Designing a Toy Conveyor Belt For Fun and Profit Kristina Panos | usagoldmines.com

Piggyback Board Brings Touch Sensing to USB Soldering Iron Dan Maloney | usagoldmines.com

FLOSS Weekly Episode 823: TuxCare, 10 Years Without Rebooting! Jonathan Bennett | usagoldmines.com

Haptic Displays Bring Sports To The Vision Impaired Lewin Day | usagoldmines.com

Is This The Oldest HD Video Online? Jenny List | usagoldmines.com

Big Chemistry: Glass Dan Maloney | usagoldmines.com

China Claims Commercial Nuclear Fusion by 2050 as Germany Goes Stellarator Maya Posch | usagoldmines...

Speaking Computers from the 1970s Al Williams | usagoldmines.com

Build a Parametric Speaker of Your Own Jenny List | usagoldmines.com

Smartwatches Could Flatten the Curve of the Next Pandemic Navarre Bartz | usagoldmines.com

Shortwave Resurrection: A Sticky Switch Fix on a Hallicrafters Heidi Ulrich | usagoldmines.com

Lawsuit Accusing JPMorgan Chase, Wells Fargo, Bank of America and Zelle of Failing To Protect Custom...

Interposer Helps GPS Receiver Overcome Its Age Arya Voronova | usagoldmines.com

Inexpensive Powder Coating Al Williams | usagoldmines.com

Keebin’ with Kristina: the One with the Schreibmaschine Kristina Panos | usagoldmines.com

It’s 2025, and Here’s a New Film Format Jenny List | usagoldmines.com

LTA’s Pathfinder 1: the Dawn of a New Age of Airships? Maya Posch | usagoldmines.com

Cheap Hackable Smart Ring Gets a Command Line Client Arya Voronova | usagoldmines.com

CNC Router and Fiber Laser Bring the Best of Both Worlds to PCB Prototyping Dan Maloney | usagoldmin...

It’s SSB, But Maybe Not Quite As You Know It Jenny List | usagoldmines.com

Hijacking AirTag Infrastructure To Track Arbitrary Devices Arya Voronova | usagoldmines.com

Make Your Own Air Knife and Air Amplifier Maya Posch | usagoldmines.com

JPMorgan Chase Loses Package Containing Customers’ Sensitive Data, Warns Bank Account Info Could Be ...

Here’s A Spy Movie-Grade Access Card Sniffing Implant Arya Voronova | usagoldmines.com

Deep Space DX Hack Chat Dan Maloney | usagoldmines.com

Sensory Substitution Device Tingles Back Of Your Hand Arya Voronova | usagoldmines.com

12VHPWR Watchdog Protects You From Nvidia Fires Arya Voronova | usagoldmines.com

FOSDEM 2025, A Hardware Hacker’s Haven Arya Voronova | usagoldmines.com

A MicroPython Interpreter For Flipper Zero Arya Voronova | usagoldmines.com

Wake, Boot, Repeat: Remote OS Selection with GRUB and ESP Heidi Ulrich | usagoldmines.com

Flat Pack Toaster Heats Up the Right to Repair Navarre Bartz | usagoldmines.com

Making The Alarmo Customizable, By Any Means Necessary Arya Voronova | usagoldmines.com

Hackaday Links: March 2, 2025 Dan Maloney | usagoldmines.com

On Sensory Weaver Building Arya Voronova | usagoldmines.com

Make Ice Spheres in a Copper Press Navarre Bartz | usagoldmines.com

A CaptionCall Phone Succumbs To Doom, Again Arya Voronova | usagoldmines.com

24,041 Americans Affected As Billion-Dollar Bank Suffers Data Breach Mark Emem | usagoldmines.com

“Some Assembly Required” Makes Us Love Things More Navarre Bartz | usagoldmines.com

Leave a Reply