Field Programmable Gate Arrays (FPGAs) are programmable additional circuits. They are often key components of security-relevant system functions and are used, for example, in servers in data centers, in routers or in firewalls. They are also frequently found in workstation computers and more complex industrial and IoT systems, where they monitor and control essential logical functions.
A big advantage of FPGA chips is the flexible programming of the required logical connections and functions. In contrast to fixed logic circuits, the same device can be configured differently and can also be expanded or adapted afterwards. The configuration is mapped via the so-called “bitstream” and secured by encryption to prevent unauthorized access and manipulation.
Fundamental weakness in chip design
Until now, FPGA chips were considered very secure, which is why they were often used for deep system functions. However, a joint research project by the Horst Götz Institute at the Ruhr University of Bochum and the Max Planck Institute demonstrates a fundamental security gap.[1] The special feature of this weakness, known as ” Starbleed”, is that the problem lies in the design of the chips and can only be solved by replacing them.
The error in the programming and update process allows functions to be read out and modified program sequences to be inserted. Theoretically, the vulnerability can also be exploited remotely. The tools required for an attack are usually available directly in the affected systems.
Manufacturer provides recommendations for protection
In a statement, Xilinx as the manufacturer of the affected chips confirms the basic findings of the researchers, but also points out how important system-related safeguards of the access and programming interfaces are. In accordance with the recommendations, the components should only have protected remote access options.
Subsequent protection of affected systems should be at least partially possible. For critical systems that cannot receive an update or patch, the only option is to replace or physically upgrade the affected subcomponents, e.g. the mainboard. Newer versions of the FPGA chips should not be vulnerable. [2]
It is therefore particularly important in the first step to identify the systems affected by the vulnerability in order to make appropriate decisions and initiate necessary measures. Please refer to the publications of your suppliers!
[1] https://www.usenix.org/conference/usenixsecurity20/presentation/ender
[2] https://www.zdnet.com/article/starbleed-bug-impacts-fpga-chips-used-in-data-centers-iot-devices-industrial-equipment/