Vulnerabilities in Hardware Security Modules (HSMs) allow attackers to retrieve sensitive data | Cyware Hacker News (2024)

  • Several vulnerabilities are detected in the HSM of a major vendor, allowing an attacker to take full control of the vendor's HSM.
  • The vulnerabilities could allow attackers to retrieve sensitive data stored inside Hardware Security Modules.

Security researchers Gabriel Campana and Jean-Baptiste Bédrune uncovered vulnerabilities that could allow attackers to retrieve sensitive data stored inside Hardware Security Modules.

What is HSM?

Hardware Security Module (HSM) is a hardware isolated device that use advanced cryptography to store sensitive data such as digital keys, passwords, and PINs.

HSMs are widely used in financial institutions, government agencies, data centers, and cloud providers.

More details on the vulnerability

Several vulnerabilities are detected in the HSM of a major vendor, allowing an attacker to take full control of the vendor's HSM.

Attackers could also exploit a cryptography bug in the firmware signature verification to upload a modified firmware to the HSM that includes a persistent backdoor.

“This highly technical presentation targets an HSM manufactured by a vendor whose solutions are usually found in major banks and large cloud service providers. It will demonstrate several attack paths, some of them allowing unauthenticated attackers to take full control of the HSM. The presented attacks allow retrieving all HSM secrets remotely, including cryptographic keys and administrator credentials,” the researchers said.

A translated summary of the vulnerability

As the researchers’ research paper is available only in French, Cryptosense has translated a brief summary of the vulnerability, which read as follows,

  1. “They started by using legitimate SDK access to their test HSM to upload a firmware module that would give them a shell inside the HSM. Note that this SDK access was used to discover the attacks, but is not necessary to exploit them.
  2. They then used the shell to run a fuzzer on the internal implementation of PKCS#11 commands to find reliable, exploitable buffer overflows.
  3. They checked they could exploit these buffer overflows from outside the HSM, i.e. by just calling the PKCS#11 driver from the host machine
  4. They then wrote a payload that would override access control and, via another issue in the HSM, allow them to upload arbitrary (unsigned) firmware. It’s important to note that this backdoor is persistent – a subsequent update will not fix it.
  5. They then wrote a module that would dump all the HSM secrets, and uploaded it to the HSM”.

Vendor releases patches

The researchers notified the HSM maker about the vulnerabilities and the vendor has published firmware updates with security fixes to address the vulnerability.

The researchers did not name the vendor, however, Cryptosense security team noted that the vendor might be Gemalto.

Vulnerabilities in Hardware Security Modules (HSMs) allow attackers to retrieve sensitive data | Cyware Hacker News (2024)
Top Articles
Where can I find my iPhone eSIM activatio…
How to Budget as a College Student
Section 4Rs Dodger Stadium
9192464227
Beautiful Scrap Wood Paper Towel Holder
Best Transmission Service Margate
Fnv Turbo
Calamity Hallowed Ore
Craigslist Cars And Trucks Buffalo Ny
Here's how eating according to your blood type could help you keep healthy
Palace Pizza Joplin
3472542504
Pittsburgh Ultra Advanced Stain And Sealant Color Chart
10 Free Employee Handbook Templates in Word & ClickUp
Nebraska Furniture Tables
272482061
Moviesda3.Com
boohoo group plc Stock (BOO) - Quote London S.E.- MarketScreener
Clear Fork Progress Book
R Cwbt
ELT Concourse Delta: preparing for Module Two
Kamzz Llc
What Channel Is Court Tv On Verizon Fios
R&S Auto Lockridge Iowa
Loslaten met de Sedona methode
Copper Pint Chaska
Pixel Combat Unblocked
2021 Tesla Model 3 Standard Range Pl electric for sale - Portland, OR - craigslist
Amazing Lash Bay Colony
The Rise of "t33n leaks": Understanding the Impact and Implications - The Digital Weekly
Renfield Showtimes Near Marquee Cinemas - Wakefield 12
Los Amigos Taquería Kalona Menu
Slv Fed Routing Number
Old Peterbilt For Sale Craigslist
The Mad Merchant Wow
Personalised Handmade 50th, 60th, 70th, 80th Birthday Card, Sister, Mum, Friend | eBay
Bimmerpost version for Porsche forum?
Cl Bellingham
Legit Ticket Sites - Seatgeek vs Stubhub [Fees, Customer Service, Security]
Craigslist Tulsa Ok Farm And Garden
Puretalkusa.com/Amac
How to Get a Better Signal on Your iPhone or Android Smartphone
Clima De 10 Días Para 60120
Lucifer Morningstar Wiki
Craigslist Rooms For Rent In San Fernando Valley
Ssc South Carolina
Spurs Basketball Reference
15 Best Places to Visit in the Northeast During Summer
Free Carnival-themed Google Slides & PowerPoint templates
The Significance Of The Haitian Revolution Was That It Weegy
Latest Posts
Article information

Author: Zonia Mosciski DO

Last Updated:

Views: 6385

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Zonia Mosciski DO

Birthday: 1996-05-16

Address: Suite 228 919 Deana Ford, Lake Meridithberg, NE 60017-4257

Phone: +2613987384138

Job: Chief Retail Officer

Hobby: Tai chi, Dowsing, Poi, Letterboxing, Watching movies, Video gaming, Singing

Introduction: My name is Zonia Mosciski DO, I am a enchanting, joyous, lovely, successful, hilarious, tender, outstanding person who loves writing and wants to share my knowledge and understanding with you.