A research team has found a new security vulnerability for Thunderbolt data transfer, called Thunderclap. This weakness can lead to serious attacks by other computers with computers with USB-C or DisplayPort interfaces.
As the researcher Theo Marquette explains, Thunderclap Vulnerabilities uses a privileged direct access (DMA) privilege to access Thunderbolt's accessory target device. Unless security measures are taken, hackers can use this access to steal data, track files and run malicious code.
At the operating system level we are talking about this type of access, that is, because graphics processors or network cards are geared towards devices. Because Thunderbolt designs these functions as an external function, it requires the same access level, but it is vulnerable to the aggressive external nature of the connection. In fact, connecting malicious port devices is easier than opening your own computer physically and hacking a video card.
Thunderclap weakness does not have the unique Thunderbolt 3 interface. The oldest Thunderbolt devices instead of the USBP-based DisplayPort, are also at stake.
The Markettos team presented a vulnerability in 2016 and transmitted information to manufacturers for the purpose of developing repairs. Apple has released a patch on part of a MacOS 10.12.4-year bug, and the latest updated Macs should provide anti-attacks protection. In Windows 10, 1803 protects this vulnerability.