Apart from the actual CPU, modern server motherboards contain other auxiliary components, for example voltage regulators for power management. Those are connected to the CPU and the separate Baseboard Management Controller (BMC) via the I2C-based PMBus. In this paper, using the case study of the widely used Supermicro X11SSL motherboard, we show how remotely exploitable software weaknesses in the BMC (or other processors with PMBus access) can be used to access the PMBus and then perform hardware-based fault injection attacks on the main CPU. The underlying weaknesses include insecure firmware encryption and signing mechanisms, a lack of authentication for the firmware upgrade process and the IPMI KCS control interface, as well as the motherboard design (with the PMBus connected to the BMC and SMBus by default). First, we show that undervolting through the PMBus allows breaking the integrity guarantees of SGX enclaves, bypassing Intel's countermeasures against previous undervolting attacks like Plundervolt/V0ltPwn. Second, we experimentally show that overvolting outside the specified range has the potential of permanently damaging Intel Xeon CPUs, rendering the server inoperable. We assess the impact of our findings on other server motherboards made by Supermicro and ASRock. Our attacks, dubbed PMFault, can be carried out by a privileged software adversary and do not require physical access to the server motherboard or knowledge of the BMC login credentials. We responsibly disclosed the issues reported in this paper to Supermicro and discuss possible countermeasures at different levels. To the best of our knowledge, the 12th generation of Supermicro motherboards, which was designed before we reported PMFault to Supermicro, is not vulnerable.
翻译:除了实际的 CPU 外, 现代服务器母板还包含其他辅助组件, 比如电源管理的电压调节器。 这些功能通过基于 I2C 的 PMBus 程序连接到 CPU 和 单独的 Baseboard 管理控制器 。 在本文中, 使用广泛使用的 Supermicro X11SSL 母板的案例研究, 我们展示了如何使用 BMC (或者使用 PMBus 访问的其他处理器) 的远程可开发软件弱点来访问 PMBus, 然后对主 CPUP 进行基于硬件的错误喷射攻击。 其内在弱点包括: 超级服务器软件加密和签名机制不安全, 缺乏对固态软件升级程序的认证和 IPMIKC 控制界面, 以及主机设计( PMBMC 和 SMBus 默认连接) 。 首先, 我们通过 PMBX 的内存质保证, 绕着 Intel 的反弹道反应器前的反弹道反应器攻击, 我们的母体机机机机头的软体进入了我们服务器的软体, 我们的软体 的软体 的软体 的软体 的软体 机的软体, 机的软体 机的机的机的机级的机的机体 的机体 机能的机级的机级的机级的机级的机级的机级的机级的机级的机级的机级的机级的机级 。