Critical Flaws in Alibaba’s T-Head C910 RISC-V Chips Exposed

Lilu Anderson
Photo: Finoracle.net

Alibaba's T-Head C910 RISC-V Chips: Serious Security Vulnerabilities Uncovered

Researchers at the CISPA Helmholtz Center for Information Security have identified severe security flaws in Alibaba's T-Head C910 RISC-V processors. These vulnerabilities, especially impacting the T-Head C910 CPU cores within the TH1520 SoC, pose significant risks.

GhostWrite Vulnerability: A Critical Threat

The most alarming issue is a flaw dubbed GhostWrite, which enables rogue applications or users to read and write physical memory and execute arbitrary code with kernel-level privileges. In simpler terms, an attacker can potentially take full control of the affected device.

The Root Cause: Vector Extension Design

The vulnerability stems from the vector extension in the C910's design. Typically, Memory Management Units (MMUs) protect physical memory from unauthorized access. However, the C910's vector extension instructions operate on physical memory directly, bypassing these protections.

Why This Can't Be Easily Fixed

Since the instructions causing the issue are hardwired into the chip's silicon, they can't be patched through microcode or software updates. The only viable solution is to disable the vector extension, which significantly impacts application performance.

Direct Memory Manipulation

This flaw allows unprivileged users—those without special permissions—to directly manipulate physical memory. This compromises the isolation that usually exists between the operating system and individual applications. Even sophisticated security measures like Docker cannot prevent this attack.

How Easy Is It to Exploit?

Exploiting this vulnerability is alarmingly straightforward. An attacker can use a simple sequence of instructions to write to any memory address, making it a severe security concern.

Other Affected Processors

In addition to the C910, vulnerabilities were also found in the T-Head XuanTie C906 and C908 CPUs. These issues could cause the CPU to crash upon exploitation. Alibaba has acknowledged and reproduced the bugs in the C910 and C906 but has yet to respond to the report on the C908.

The Challenge of Fixing Hardware Flaws

The GhostWrite vulnerability underscores a significant challenge in hardware security. Modern RISC-V processors do not use reprogrammable microcode, which limits the ability to patch vulnerabilities after the chip is manufactured. The researchers suggest that a microcode layer should be introduced to RISC-V CPUs to mitigate future vulnerabilities.

In summary, the discovery of these vulnerabilities in Alibaba's T-Head RISC-V chips highlights the importance of rigorous security testing in hardware design. While software can often be updated to fix bugs, hardware flaws require more complex solutions, impacting performance and overall device security.

Share This Article
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.