Overview
Cisco's Trust Anchor module (TAm) can be bypassed through manipulating the bitstream of the Field Programmable Gate Array (FPGA). This component handles access control to a hardware component within Cisco's Secure Boot implementations, which affects multiple products that support this functionality. An authenticated, local attacker could bypass the Secure Boot and make persistent changes to the root trust for software integrity. Additionally, Cisco's IOS XE web UI improperly sanitizes user-input, and could allow an authenticated, remote attack to execute commands. An authenticated, remote attacker could execute commands as root on the vulnerable device.
Description
CVE-2019-1649: Secure Boot Tampering, also known as Thrangrycat The logic that handles Cisco's Secure Boot improperly checks an area of code that manages the Field Programmable Gate Array (FPGA). The secure boot feature is a proprietary FPGA based implementation used for ensuring chain of trust for software. The secure boot can be bypassed by modifying the bitstream of the FPGA, allowing an authenticated, local attacker to make persistent modification to the root of trust for software integrity. |
Impact
A local or remote attacker could write a new firmware image to the TAm. When exploited together, these vulnerabilities could allow a remote, authenticated attacker to remotely and persistently bypass Secure Boot and prevent future software updates to the TAm. |
Solution
CVE-2019-1649 |
Workaround |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:L/AC:L/Au:S/C:C/I:C/A:C |
Temporal | 6.8 | E:ND/RL:U/RC:C |
Environmental | 6.8 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-webui
- https://thrangrycat.com/
- https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html
- https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf
Acknowledgements
This document was written by Madison Oliver.
Other Information
CVE IDs: | CVE-2019-1649, CVE-2019-1862 |
Date Public: | 2019-05-13 |
Date First Published: | 2019-05-14 |
Date Last Updated: | 2019-05-16 17:12 UTC |
Document Revision: | 39 |