On 2020-03-07, Rich Freeman <[email protected]> wrote:

> In this case we're talking about a TPM where a threat model
> is an attacker with physical access that is trying to play games with
> the busses/etc, and as such it is important that it initialize using
> code in ROM that is known-good.

Note that the person behind the attack doesn't need physical
access. If an attacker can shove malicious firmware into something
like a PCI card with DMA bus-master capabilities, then on power-up
that card can carry out the attack.  However, getting the firmware
into the PCI card would probably require root privledges, so there
would need to be a pre-existing privledge-elevation vulnerability.

I think.  :)

--
Grant





Reply via email to