There are multiple vulnerabilities in implementations of ATA Security or TCG Opal Standards in Self-Encrypting Disks (SEDs), which can allow an attacker to decrypt contents of an encrypted drive.
There is no cryptographic relation between the password provided by the end user and the key used for the encryption of user data. This can allow an attacker to access the key without knowing the password provided by the end user, allowing the attacker to decrypt information encrypted with that key.
Key information is stored within a wear-leveled storage chip. Wear-leveling does not guarantee that an old copy of updated data is fully removed. If the updated data is written to a new segment, old versions of data may exist in the previous segment for some time after it has been updated (until that previous segment is overwritten). This means that if a key is updated with a new password, the previous version of the key (either unprotected, or with an old password) could be accessible, negating the need to know the updated password.
According to NCSC-NL, the following products are affected by CVE-2018-12038:
Other products were not reported to have been tested, and similar vulnerabilities may be found in those products.
These vulnerabilities allow for full recovery of the data without knowledge of any secret, when the attacker has physical access to the drive.
If patches are not able to be deployed, consider the following workarounds:
BitLocker's default encryption method can be controlled with Group Policy settings. Configure these settings to force BitLocker to use software-based encryption by default. Once these policy settings have been changed, BitLocker needs to be disabled and re-enabled to re-encrypt the drive with software-based encryption (if not already using software-based encryption).
Samsung Semiconductor Affected
SanDisk Corporation Affected
Western Digital Technologies Affected
Intel Not Affected
Seagate Technology LLC Not Affected
Crucial Technology Unknown
Dell EMC Unknown
HP Inc. Unknown
Hewlett Packard Enterprise Unknown
LITE-ON Technology Corporation Unknown
Samsung Memory Unknown
Sk Hynix Unknown
Toshiba Corporation Unknown
Thanks to Carlo Meijer and Bernard van Gastel for reporting these vulnerabilities and the National Cyber Security Centre of the Netherlands for leading the coordination of this vulnerability.
This document was written by Trent Novelly and Laurie Tyzenhaus.