Switch chip-level vulnerability is disclosed: you can happily run linux

Guided reading ReSwitch group female hacker Kate Temkin officially announced the chip-level vulnerability of Nintendo's new console Switch after the buffer period, and announced the Fusée Gelée cracking method that can be applied to any system version, which can bypass the BootRom protection part and access memory to run arbitrary code.

Switch chip-level vulnerability disclosed: can happily run linux switch chip-level vulnerability disclosed: can happily run linux

ReSwitch group female hacker Kate Temkin officially announced the chip-level vulnerability of Nintendo's new console Switch after the buffer period, and announced the Fusée Gelée cracking method that can be applied to any system version, which can bypass the BootRom protection part and access memory to run arbitrary code. Another hacker group fail0verflow also published the code of ShofEL2, a cracking method based on similar vulnerabilities, and the method of loading Linux on Github . There is no official news about the release of the homemade Switch firmware and the Switch game Dump.

Switch chip-level vulnerability disclosed: can happily run linux switch chip-level vulnerability disclosed: can happily run linux

This crack exploits the USB recovery mode vulnerability of the Nvidia Tegra X1 chip (version 210), which can bypass the bootROM, a key part of the protection chip, and cause memory overflow by sending an overly long control request, thereby obtaining direct memory access. Arbitrary code can be run. The hack can be done with a paper clip or an accessory called the Switchx Pro, just shorting the two contacts of the right handle slot.

The original text comes from: https://www.linuxprobe.com/switch-linux.html

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325112066&siteId=291194637