Published by:
| Technical, Vulnerability Management,

Using Bitlocker? Act Now

Last week researchers discovered a vulnerability in Solid State Drives (SSD) that support hardware encryption. They were able to retrieve data from encrypted drives without knowledge of the password used to encrypt the data residing on the disk.

The vulnerability requires local access to the drive to manipulate firmware.

How Bitlocker is affected

Bitlocker supports both hardware and software based encryption but if left as default will always use hardware if supported by the drive. This potentially means any drive that supports hardware encryption and Bitlocker has been used will be vulnerable to the attack described above.

If you are using Bitlocker follow the steps described below to verify your encryption method:

1)       Open an elevated command prompt.

2)       Type: manage-bde.exe –status

3)       Check for “Hardware Encryption” under encryption method

The SSD uses software if you cannot find reference to hardware encryption as stated above.

Recommendation

To avoid or remediate this vulnerability it is recommended to change your Bitlocker encryption settings via group policy to force software based encryption. The group policy setting can be found under Administrative Templates > Windows Components > Bitlocker Drive Encryption.

This can be used to force all new drives to be encrypted using the new setting however any drives previously encrypted would first need to be decrypted.

Microsoft published a security advisory ADV180028 with further details.

Share this post

Related Posts

Exposed: Critical Vulnerabilities in Remote Access VPNs

Exposed: Critical Vulnerabilities in Remote Access VPNs   Over the last year or so we have seen an uptick in critical vulnerabilities which have left...

Vulnerability Management: Why Taking a Risk-Based Approach is Important

Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed to new risks. Managing security...

Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses, many have taken this opportunity...

Get in touch

SPEAK WITH AN EXPERT

01423 425 498

Related Posts

Exposed: Critical Vulnerabilities in Remote Access VPNs

Exposed: Critical Vulnerabilities in Remote Access VPNs   Over the last year or so we have seen an uptick in critical vulnerabilities which have left...

Vulnerability Management: Why Taking a Risk-Based Approach is Important

Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed to new risks. Managing security...

Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses, many have taken this opportunity...