Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    USB Devices Can Crack Windows

    By
    Paul F. Roberts
    -
    July 22, 2005
    Share
    Facebook
    Twitter
    Linkedin

      Vulnerabilities in USB drivers for Windows could allow an attacker to take control of locked workstations using a specially programmed Universal Serial Bus device, according to an executive from SPI Dynamics, which discovered the security hole.

      The buffer-overflow vulnerabilities could enable an attacker to circumvent Windows security and gain administrative access to a users machine.

      This is just the latest example of a growing danger posed by peripheral devices that use USB (Universal Serial Bus), FireWire and wireless networking connections, which are often overlooked in the search for remotely exploitable security holes, experts say.

      The buffer-overflow flaw is in device drivers that Windows loads whenever USB devices are inserted into computers running Windows 32-bit operating systems, including Windows XP and Windows 2000, said Caleb Sima, chief technology officer and founder of SPI Dynamics.

      SPI is still testing the hole, and hasnt informed Microsoft Corp. about the problem. The company will be demonstrating the vulnerability at this weeks Black Hat Briefings hacker conference in Las Vegas, but will not release details of the security hole, Sima said.

      A spokesperson for Microsofts Security Response Center confirmed that the company has not received a vulnerability report from SPI. The company strongly encouraged any researcher to contact the MSRC if they have a vulnerability to report.

      /zimages/4/28571.gifRead more here about Microsofts Security Response Center and how it creates patches.

      However, the flaw is with USB, not Windows, said David Dewey, a research engineer at SPI. Standards developed by the USB Implementers Forum Inc., the nonprofit corporation that governs USB, dont consider security, he said.

      For example, an attacker who knows of a vulnerability in a USB device driver can program one USB device—say a portable memory stick—to pose as the kind of device that uses the vulnerable driver, then plug the device into the host system and trigger the exploit when the host system loads the flawed driver, said Darrin Barrall, another SPI researcher.

      Flaws in standard USB drivers arent hard to find, either, Dewey and Barrall said. “Like many hardware drivers, USB drivers are written with very little data validation and security awareness. Theyre bare-bones drivers that focus on [speed],” Dewey said.

      Best of all, for attackers, the device drivers run with System-level privileges, giving an attacker full control of the host system once the exploit has been triggered. SPI tested attacks on Windows systems, but any operating system that is USB-compliant is probably vulnerable, he said.

      Researchers at Safend, of Tel Aviv, Israel, have discovered similar holes in USB and other protocols used by peripheral devices, said CEO Gil Sever, demonstrating a USB storage device that is programmed to automatically copy recently accessed files when inserted into a Windows PC.

      Attacks from peripheral devices usually require physical access to the host system, but janitors or contractors can easily exploit such access with a USB attack device, Sever said.

      On Thursday, Safend released a beta version of Safend Protector, which allows companies to lock down or assign security policies to peripheral devices on Windows systems.

      /zimages/4/28571.gifClick here to read an ExtremeTech comparison of Seagates 5GB Pocket Hard Drive and Iomegas 20GB Mini Hard Drive.

      Companies like Microsoft are just beginning to consider the security threat from peripheral devices, even as developments like the USBIFs Wireless USB standard will make it possible to remotely connect to PCs using high-speed, USB-based technology, Sever said.

      But IT administrators, and an increasing number of companies, are waking up to the threat. DeviceLock (formerly SafeLine Inc.) of San Ramon, Calif. and Milan, Italy, and SecureWave S.A. of Luxembourg also sell technology that can secure peripheral or “end point” devices.

      At Baptist Memorial Healthcare Corp., in Memphis, Tenn., IT administrators turned to Safend after some departments in the hospital network, such as Human Resources and Risk Management, started using portable USB “jump” drives to make backup copies of sensitive data after the hospital introduced new desktop systems that did not have floppy drives, said Lenny Goodman, director of the desktop management group at Baptist.

      Goodman initially waited for Microsoft to address the problem by adding better features for controlling peripheral devices into Windows, but has been disappointed by the companys lack of attention to the problem.

      “I was really looking to them to address this issue, but Microsoft feels that this is a hardware issue and doesnt see it as a problem,” he said.

      Baptist, which operates 15 hospitals in Tennessee, Mississippi and Arkansas, has been using Safends USB auditing tool and will be providing users with encrypted, password-protected USB drives to do local backups.

      The hospital is purchasing 6,000 licenses of Safends Port Protector product to block other, unauthorized peripheral devices, including insecure USB drives and iPods, he said.

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Avatar
      Paul F. Roberts

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×