- INTEL THUNDERBOLT 3 SECURE SOFTWARE DOWNLOAD HOW TO
- INTEL THUNDERBOLT 3 SECURE SOFTWARE DOWNLOAD INSTALL
- INTEL THUNDERBOLT 3 SECURE SOFTWARE DOWNLOAD DRIVERS
- INTEL THUNDERBOLT 3 SECURE SOFTWARE DOWNLOAD FREE
Option 2 – Automatically (Recommended) – This is the quickest and easiest option.
INTEL THUNDERBOLT 3 SECURE SOFTWARE DOWNLOAD INSTALL
Option 1 – Manually– You’ll need some computer skills and patience to update your driver this way, because you need to find exactly the right driver online, download it and install it step by step. There are two ways you can update your driver:
INTEL THUNDERBOLT 3 SECURE SOFTWARE DOWNLOAD HOW TO
How to update your Intel Thunderbolt Controller driver Don’t worry, here we’ll show you how to update your Intel Thunderbolt Controller driver.
INTEL THUNDERBOLT 3 SECURE SOFTWARE DOWNLOAD DRIVERS
As we all know, drivers are essential to your devices but the process of downloading and installing drivers can be quite fiddly sometimes.
INTEL THUNDERBOLT 3 SECURE SOFTWARE DOWNLOAD FREE
Ruytenberg has released the Spycheck free open source tool for Windows 7, 8.x and 10, and Linux kernel 3.6 and later, to help users find out if their systems are vulnerable.Are you looking for the Intel Thunderbolt Controller drivers? If the answer is “yes,” then you’ve come to the right place. There could be further Thunderbolt vulnerabilties arriving, as Ruytenberg is continuing his Thunderspy research with a second part. USB 4 that was introduced last year supports Thunderbolt-based signalling, and Ruytenberg advised users to exercise caution until hardware designed with the new peripheral interconnect protocols has been tested to ensure the current vulnerabilities are addressed. Whether or not the most recent version 4 of Thunderbolt, introduced by Intel this year, is vulnerable is unknown at the moment. The protective measure could reduce performance however, and in some cases causes compatibility issues with Thunderbolt devices that stop working, if their drivers don't support DMA remapping.
Intel implemented kernel DMA protection last year which partially mitigates against Thunderspy. Suspend to disk hibernation or completely powering off systems instead of using suspend to memory sleep mode is also recommended for additional protection against Thunderspy exploitation. Users should not leave their systems powered on even with the screen lock enabled. This includes only connecting your own Thunderbolt peripherals, and not lending them to anybody or leaving them unattended. To mitigate against the Thunderspy vulnerabilties, Ruytenberg suggests to implement physical security if it isn't feasible to disable the Thunderbolt controller entirely. Plugging in malicious Thunderbolt cables, USB-C to DisplayPort or HDMI video output dongles or external hard drives could let attackers break into the vast majority of recent laptops and desktops, if they have physical access to the devices.Īpple and Intel have been notified of the vulnerabilties, which appear to be unfixable as they are likely to require a hardware redesign. It is also possible to permanently disable Thunderbolt security and block all firmware updates, Ruytenberg found. These allowed him to create arbitrary Thunderbolt devices, and to clone already user-authorised ones and to obtain PCIe bus connectiivty to perform DMA attacks. On Macs, running Windows or Linux within Apple's Boot Camp emulator disables all Thunderbolt security, making attacks trivial to perform.īy exploiting the vulnerabilties, Ruytenberg created nine practical exploits. Ruytenberg's Thunderspy is a collection of seven vulnerabilities that break Intel's Security Levels architecture for Thunderbolt versions 1, 2 and 3, which is allows users to authorise trusted devices only. To achieve the high bandwidth of up to 40 gigabit per second, Thunderbolt devices use direct memory access (DMA) which researchers last year showed could be abused to fully take over computers. The attack takes about five minutes, and leaves no traces otherwise.ĭesigned by Intel and Apple, and included in millions of Windows, Linux and Mac computers since 2011, Thunderbolt is a high-speed peripheral interconnect system that can daisy-chain up to six devices. Physical access to computers are required however, to perform the attack that MSc student Björn Ruytenberg named Thunderspy. A Dutch masters student has found vulnerabilities in the Thunderbolt input/output port hardware design that lets attackers fully bypass computer access security measures such as Secure Boot, login passwords and full-disk encryption.