Encrypting your hard disk is not safe anymore: New vulnerability affects Microsoft, Intel, HP and others
Microsoft, Intel, HP, Lenovo and leading vendors are affected by a new vulnerability that allows attackers to bypass hard-disk encryption software, system boot passwords and steal confidential data.
LAS VEGAS - Aug 25, 2008: iViZ, an On-Demand Penetration Testing company, announced its discovery of a new class of vulnerability at Defcon 16, the world's leading security conference. This vulnerability allows attackers to steal computer boot passwords and bypass the security of pre-boot authentication software like hard disk encryption tools. It affects general computer users, enterprises, governments and can result in unauthorized access or theft of confidential data. Incidentally, in 2007 the global loss due to data theft is estimated to be USD 40 Billion.
"Surprisingly, this vulnerability has been existing for 25 years" says Jonathan Brossard, iViZ lead security researcher and discoverer of this vulnerability. "Programmers unaware of this security hole have coded boot password feature in such a way that user entered text do not get flushed from memory properly leading to inadvertent leakage and theft. Even hard-drive encryption does not help in this case." adds Mr. Brossard. This vulnerability affects Microsoft Bitlocker on the latest TPM (but not Vista SP1), Truecrypt, Intel/HP BIOS and several others.
As a part of responsible disclosure practice, iViZ has already briefed all the affected vendors. "We appreciate vendors like Microsoft, Intel, HP taking a proactive approach in providing fixes to users. iViZ is committed to initiatives making the web safe and would continue to conduct research that helps to secure organizations worldwide." said Bikash Barai, CEO of iViZ.
Vulnerability Details: www.ivizsecurity.com/security-advisory.html