破解Magic Leap的安全启动链和特斯拉自动驾驶系统
Making Magic Leap past Nvidia's secure bootchain and breaking Tesla Autopilots

原始链接: https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/making-the-magic-leap-past-nvidia-s-secure-bootchain-and-breaking-some-tesla-autopilots-along-the-way

本次演示详细介绍了一位安全研究人员利用 NVIDIA Tegra X2 系统芯片的安全启动过程的经历,该芯片应用于 Magic Leap One 和 Tesla Autopilot 等设备。由于 Magic Leap 设备因服务器关闭而无法使用,研究人员感到沮丧,并开始调查引导加载程序。 他们成功利用 NVIDIA Fastboot 实现中的漏洞——“sparsehax”用于初始访问,“dtbhax”用于持久化——使用了公开可用的源代码。研究人员并不满足,他们采用了故障注入来转储 BootROM,发现其 USB 恢复模式中存在一个关键且无法修补的漏洞。 尽管内存访问有限,但该 BootROM 漏洞的利用成功实现了最高权限级别的完全代码执行。重要的是,研究人员证明了该漏洞*同样*适用于 Tesla 的 Autopilot 2 和 2.5 硬件,引发了重大的安全问题。这项工作凸显了“安全”启动实现的脆弱性以及可能被广泛攻破的潜力。

在39c3大会上的一次演讲详细介绍了一种成功的黑客攻击,绕过了英伟达Tegra X2系统芯片的安全启动链,该芯片被用于Magic Leap One和特斯拉自动驾驶等设备。 这基于之前在任天堂Switch中使用的Tegra X1中发现的一个漏洞。 讨论迅速转向了Magic Leap的现状,评论员指出该公司已经大不如前,正在转向镜头并与谷歌合作——这一举动被许多人视为负面。 许多用户严厉批评Magic Leap是一家建立在炒作之上的欺诈公司,引用了有毒的工作文化和未能兑现承诺,并将其与Theranos进行比较。 这次黑客攻击本身很有趣,因为它展示了安全系统中的潜在漏洞,而对话则凸显了人们对增强现实现状的幻灭,目前增强现实已被大型科技公司主导。 这些嵌入式系统的启动速度也被讨论,汽车应用的目标是亚5秒启动。
相关文章

原文

The Tegra X2 is an SoC used in devices such as the Magic Leap One, and Tesla's Autopilot 2 & 2.5 promising a secure bootchain. But how secure really is the secure boot? In this talk I go over how I went from a secured Magic Leap One headset, to exploiting the bootloader over USB, to doing fault injection to dump the BootROM, to finding and exploiting an unpatchable vulnerability in the BootROM's USB recovery mode affecting all Tegra X2s.

In mid 2024, a friend approached me about Magic Leap making their TX2 based XR headsets little more than a paperweight by disabling the mandatory activation servers. I morally dislike this, companies shouldn't turn functional devices into e-waste just because they want to sell newer devices.

After obtaining one, and poking at the Fastboot implementation, I discovered it was based off NVIDIA's Fastboot implementation, which is source available. I found a vulnerability in the NVIDIA provided source code in how it unpacks SparseFS images (named sparsehax), and successfully blindly exploited the modified implementation on the Magic Leap One. I also found a vulnerability in it that allowed gaining persistence via how it loads the kernel DTB (named dtbhax).

Still unsatisfied with this, I used fault injection to dump the BootROM from a Tegra X2 devkit.

In the BootROM I discovered a vulnerability in the USB recovery mode. Exploiting this vulnerability proved difficult due to only having access to memory from the perspective of the USB controller. I will explain what was tried, why it didn't work, and how I eventually got code execution at the highest privilege level via it.

As I will demonstrate, this exploit also functions on Tesla's autopilot hardware.

联系我们 contact @ memedata.com