Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

Glossary > Thunderbolt PCIe DMA Attacks

What is Thunderbolt PCIe DMA Attacks?

Understanding Thunderbolt PCIe DMA Attacks

Thunderbolt/PCIe DMA Attacks exploit direct memory access capabilities inherent in high-speed peripheral interfaces. When peripherals connect via Thunderbolt or other PCIe-based ports, they may gain unrestricted access to system memory, bypassing typical operating system protections. Attackers need brief physical access to the device, plugging in a malicious peripheral or using a compromised cable. This can reveal encryption keys, hijack sessions, or install stealthy backdoors. Mitigations include enabling Input-Output Memory Management Units (IOMMUs) to restrict DMA ranges, adopting newer security standards like Kernel DMA Protection in Windows or “secure boot” configurations that enable DMA protections. Some systems offer Thunderbolt security levels requiring device authentication or user prompts. Despite partial solutions, older hardware often lacks robust defenses. Attackers with specialized hardware and knowledge can bypass naive checks. Practical defense also includes locking workstations, restricting physical port access (e.g., glue or BIOS policies), or disabling Thunderbolt ports if unnecessary. Overall, these attacks highlight how local physical access combined with DMA privileges undermines OS-level security, prompting OS vendors and hardware manufacturers to integrate better runtime protections in modern systems.

Learn More About Thunderbolt PCIe DMA Attacks: