Article 6E6Y4 Bypassing Bitlocker Using a Cheap Logic Analyzer on a Lenovo Laptop

Bypassing Bitlocker Using a Cheap Logic Analyzer on a Lenovo Laptop

by
Fnord666
from SoylentNews on (#6E6Y4)

owl writes:

https://www.errno.fr/BypassingBitlocker.html

Have you ever been told that the company's data on laptops is protected thanks to BitLocker? Well it turns out that this depends on BitLocker's configuration...

The BitLocker partition is encrypted using the Full Volume Encryption Key (FVEK). The FVEK itself is encrypted using the Volume Master Key (VMK) and stored on the disk, next to the encrypted data. This permits key rotations without re-encrypting the whole disk.

The VMK is stored in the TPM. Thus the disk can only be decrypted when booted from this computer (there is a recovery mechanism in Active Directory though).

In order to decrypt the disk, the CPU will ask that the TPM sends the VMK over the SPI bus.

The vulnerability should be obvious: at some point in the boot process, the VMK transits unencrypted between the TPM and the CPU. This means that it can be captured and used to decrypt the disk.

Original Submission

Read more of this story at SoylentNews.

External Content
Source RSS or Atom Feed
Feed Location https://soylentnews.org/index.rss
Feed Title SoylentNews
Feed Link https://soylentnews.org/
Feed Copyright Copyright 2014, SoylentNews
Reply 0 comments