At Black Hat Asia, Andy Davis presented “USB Attacks Need Physical Access Right? Not Any More..." NCC Group Research Director Andy Davis likes to test USB host security; over the years, Davis has “identified over 100 bugs covering all the major operating systems.” He said most vendors typically respond with “Thank you for the bug, but as you need physical access to plug in your rogue device, the impact is actually quite low.” Yet Davis continued researching USB security, giving presentations such as “Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions” [pdf] at Black Hat USA 2013.Three years ago at Black Hat USA, Davis used “Frisbee,” a proof-of-concept exploit, “to identify and attack flaws in Windows 7, Windows XP, Xbox 360 and Apple OS X.” He said a person with a rigged USB could insert it and “do a huge amount (of damage) in a few seconds.” But major security vendors said they couldn’t provide USB security, leading Davis “to joke that the only truly foolproof way to protect computers from the threats posed by compromised USBs is to ‘fill the USB sockets with epoxy resin’.”But now vendors may take the potential impact from USB attacks a lot more seriously; they may change their tune about bugs introduced via rogue USB devices after Black Hat Asia in Singapore where Davis presented “USB Attacks Need Physical Access Right? Not Any More…”Davis explained: Due to recent advances in a number of remoting technologies, USB attacks can now be launched over a network. The talk went into detail about how these technologies work, the resulting impact on the world of USB bugs and included a live demo remotely triggering a USB kernel bug in Windows 2012 server.Davis noted “implications for future USB bugs” such as:Windows USB bugs no longer need local physical access.Remote exposure of the Windows kernel has been increased.What were local DoS bugs can now remotely “blue-screen” a server.May apply to other (non-Windows) remoting technologies.Primarily, it seems as if the presentation highlighted [pdf] how “physical access is no longer a requirement to trigger Windows USB bugs.” The talk is on slides, but that’s not the same as seeing it in person, in video, or even just audio. Those slides seem to indicate that Davis demonstrated RemoteFX redirection attacks in which the rogue USB can “blue screen” a remote desktop protocol (RDP) server. He concluded, “RemoteFX USB remoting has exposed more of the Windows kernel to attackers.”According to the Remote Desktop Services blog post that introduced Microsoft’s RemoteFX USB device redirection, “The goal of RemoteFX USB redirection is simple: the user should be able to use any device they want, and have it just work.” However, “to redirect USB devices from a given machine, the RemoteFX USB redirection feature must be enabled.” The post goes on to explain how to “enable the policy and specify whether you wish to allow all users or only admins to redirect devices.”The second RemoteFX USB redirection tutorial explained how to setup to allow for webcams with microphones, biometric devices, printers, USB audio devices, cameras, scanners and VoIP phones. Server device security stated:Multiple Group Policy settings are available to control when and how users can use RemoteFX USB redirection. RemoteFX USB redirection can be controlled by using the same policy settings that control Plug and Play device redirection. The “Do not allow supported Plug and Play device redirection” policy setting can be used to allow or block RemoteFX USB redirection on a VM. The Plug and Play redirection policy settings for RD Gateway apply as well.It seems obvious that the best protection would be to not enable RemoteFX if it’s not needed. According to Davis:How can you reduce the risks?If RemoteFX is not required on the server, turn it off.If RemoteFX is required specify GUIDs of authorized USB devices.Do not enable RemoteFX USB remoting on clients.Minimise the use of USB “High-level” remoting via RDP.Be more cautious of “local” vulnerabilities and apply the patches. Here is Davis’s slide presentation of “USB Attacks Need Physical Access Right? Not Any More…” [pdf].Like this? Here’s more posts:Don’t you have a right to link to a hack without going to jail?IP address does not identify a person, judge tells copyright troll in BitTorrent caseGoogle Map jacker called a hero by feds he wiretappedIs Obama’s proposal to end NSA bulk collection of phone records really a privacy win?How to customize Windows 8.1 Start screen and keyboard shortcut tricksGoogle wants to black out court details about data-mining e-mailsFake police warning leads to murder-suicide: Deaths due to ransomware?Your privacy is ‘very important,’ Microsoft says after reading users’ emails and IMsHow to change Windows 8.1 to local account with no Microsoft email account requiredBiased software vulnerability stats praising Microsoft were 101% misleadingNorth Korean leader plays Homefront on Xbox to practice taking over USResearchers: Phone metadata surveillance reveals VERY personal info about callersFollow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe