<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HSM Testing and Defect Discovery in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23524#M1372</link>
    <description>&lt;P&gt;At this years Black Hat USA we'll see a presentation from a couple of researchers that&lt;SPAN&gt;&amp;nbsp;discovered remote unauthenticated attacks giving full control of a Hardware Security Module (HSM) and complete access to keys and secrets stored on it. That's pretty serious stuff! Cryptosense validated the vulnerability &lt;A href="https://cryptosense.com/blog/how-ledger-hacked-an-hsm/" target="_blank" rel="noopener"&gt;here.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Researchers used the SDK provided with the HSM to upload a custom firmware module to the unit. This gave them access to a shell inside the HSM that they could use to run a debugger and analyze the inner workings of the unit. From there, they ran a fuzzer to send random queries to the HSMs PKCS #11 API looking for parameters that would throw the HSM into an unstable state. The tests uncovered several buffer overflow error bugs that they could trigger by sending the HSM certain commands.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:13:52 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:13:52Z</dc:date>
    <item>
      <title>HSM Testing and Defect Discovery</title>
      <link>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23524#M1372</link>
      <description>&lt;P&gt;At this years Black Hat USA we'll see a presentation from a couple of researchers that&lt;SPAN&gt;&amp;nbsp;discovered remote unauthenticated attacks giving full control of a Hardware Security Module (HSM) and complete access to keys and secrets stored on it. That's pretty serious stuff! Cryptosense validated the vulnerability &lt;A href="https://cryptosense.com/blog/how-ledger-hacked-an-hsm/" target="_blank" rel="noopener"&gt;here.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Researchers used the SDK provided with the HSM to upload a custom firmware module to the unit. This gave them access to a shell inside the HSM that they could use to run a debugger and analyze the inner workings of the unit. From there, they ran a fuzzer to send random queries to the HSMs PKCS #11 API looking for parameters that would throw the HSM into an unstable state. The tests uncovered several buffer overflow error bugs that they could trigger by sending the HSM certain commands.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:13:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23524#M1372</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: HSM (insecurity)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23529#M1374</link>
      <description>&lt;P&gt;This is all good and well, but the topic should be changed to:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"HSM (insecurity) flaw in unnamed HSM hardware"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;People might speed read and think every HSM has or might have the same flaw.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 13:23:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23529#M1374</guid>
      <dc:creator>MikeGlassman</dc:creator>
      <dc:date>2019-06-11T13:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: HSM (insecurity)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23539#M1377</link>
      <description>&lt;P&gt;It's probably the Gemalto Ledger Vault HSM. Not the Safenet Line of products:&lt;/P&gt;&lt;P&gt;&lt;A href="https://safenet.gemalto.com/technical-support/security-updates/" target="_blank"&gt;https://safenet.gemalto.com/technical-support/security-updates/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 16:10:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23539#M1377</guid>
      <dc:creator>RobertM</dc:creator>
      <dc:date>2019-06-11T16:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: HSM (insecurity)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23590#M1387</link>
      <description>&lt;P&gt;You nailed it &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/478379273"&gt;@RobertM&lt;/a&gt;&amp;nbsp;with that link. The specific issue is with Gemalto&amp;nbsp;&lt;SPAN&gt;ProtectServer HSMs running firmware versions from 3.20.00 to 3.20.10 and ProtectServer-2 HSMs running firmware between 5.00.02 and 5.03.00.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 15:02:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23590#M1387</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-06-12T15:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: HSM (insecurity)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23591#M1388</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/341872409"&gt;@MikeGlassman&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;People might speed read and think every HSM has or might have the same flaw.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;You're right the sky is not falling and the design "flaw" is not systemic. We can still have faith in HSMs.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 15:04:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/HSM-Testing-and-Defect-Discovery/m-p/23591#M1388</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-06-12T15:04:23Z</dc:date>
    </item>
  </channel>
</rss>

