News DaMAgeCard SD Express card vulnerability leverages the privileged access that PCIe provides — bypasses traditional software-based security mechanisms

I'm not familiar with PCIe malware protection, but why is only SD express affected?
Like what about oculink or an open m.2 nvme slot? Why are those not affected by this exploit?
 
I'm not familiar with PCIe malware protection, but why is only SD express affected?
Like what about oculink or an open m.2 nvme slot? Why are those not affected by this exploit?
It’s not exclusive to SD Express, but SD Express is uniquely vulnerable because it’s hot pluggable, the standard doesn’t require implementing IOMMU to limit address visibility, and SD cards are more commonly exchanged and given less scrutiny. Thunderbolt used to have the same vulnerability, but Intel VT-d or AMD-Vi (or equivalent) is now mandatory for Thunderbolt implementations.

OCuLink is theoretically vulnerable to DMA attacks along with other malicious PCIe devices, but OCuLink or m.2 can’t be connected while the system is running and data is already in memory, and you’re much less likely to be swapping around and connecting OCuLink or m.2 devices of unknown provenance.
 
  • Like
Reactions: Notton
Aren't IOMMUs enabled by default, for like a while, now? I'd guess any PC new enough to have a SD Express card reader is going to have an IOMMU and it's going to be enabled.

I built an AM5 based system back in February this year and IOMMU defaulted to disabled. The last 2 laptops i got (several years ago, 7th and 8th gen intel core CPUs) also defaulted disabled. Of course, I don't know if this speaks to most new systems.
 
  • Like
Reactions: bit_user