Forum Moderators: open
We have found 7 vulnerabilities in Intel’s design and developed 9 realistic scenarios how these could be exploited by a malicious entity to get access to your system, past the defenses that Intel had set up for your protection.
All the attacker needs is 5 minutes alone with the computer, a screwdriver, and some easily portable hardware.
[ :) ! ]
In 2019, major operating systems implemented Kernel Direct Memory Access (DMA) protection to mitigate against attacks such as these. This includes Windows (Windows 10 1803 RS4 and later), Linux (kernel 5.x and later), and MacOS (MacOS 10.12.4 and later). The researchers did not demonstrate successful DMA attacks against systems with these mitigations enabled.
For all systems, we recommend following standard security practices, including the use of only trusted peripherals and preventing unauthorized physical access to computers.