Security researcher Björn Ruytenberg with the Eindhoven University of Technology recently published a report detailing a series of serious security vulnerabilities in Thunderbolt 2 and Thunderbolt 3, collectively called “Thunderspy.”

They affect every single computer with a Thunderbolt 2 or Thunderbolt 3 port, including old-style port connectors and new Type-C connectors, whether the computers are running Windows, Linux, or macOS.

Seven Thunderspy vulnerabilities

Ruytenberg describes seven vulnerabilities in his paper. They are as follows.

  1. Inadequate firmware verification schemes.
  2. Weak device authentication scheme.
  3. Use of unauthenticated device metadata.
  4. Backwards compatibility.
  5. Use of unauthenticated controller configurations.
  6. SPI flash interface deficiencies.
  7. No Thunderbolt security on Boot Camp.

Read more at MacWorld.com

Leave a Reply

Discover more from

Subscribe now to keep reading and get access to the full archive.

Continue reading