Direct Memory Access (DMA) Attacks
Overview
Utilizing Direct Memory Access connections avaiable on modern computers it is possible to access main memory without any operating system supervision. This means access to Ring 0, allowing for anything from access to cryptographic information to running malware without credentials, if unmitigated.
Connections which allow DMA include:
FireWire
CardBus
ExpressCard
Thunderbolt
USB 4.0
PCI, PCI-X and PCI Express
Efficacy on Windows 10
Windows > 8.1 introduced protections against Thunderbolt and CFexpress ports. Win 10 v1903 introduced additional protections for other internal PCIe ports (including M.2 slots).
"This [current] mitigation only protects PCI-based buses, for example, ExpressCard, Thunderbolt, & some docking stations (PCIe based). Older, non-PCI buses such as 1394 and CardBus are still vulnerable," Microsoft admitted. - https://www.bleepingcomputer.com/news/security/some-windows-10-devices-still-exposed-to-dma-attacks-that-can-steal-bitlocker-keys/ Additionally it seems that currently USB4 is not covered. - https://www.usb.org/sites/default/files/D1T2-2%20-%20USB4%20on%20Windows.pdf
Tools
Last updated
Was this helpful?