PMFault: Voltage Fault Injection on Server Platforms Through the PMBus
This talk demonstrates a novel voltage fault injection technique targeting server platforms by manipulating the Power Management Bus (PMBus) to induce faults in the CPU. The researchers show that by accessing the PMBus via the Baseboard Management Controller (BMC) or directly through the CPU, an attacker can perform undervolting or overvolting attacks to bypass security mechanisms like Intel SGX or cause system crashes. The presentation highlights the risks of improper hardware configuration and shared communication buses in modern server architectures. The researchers also released a tool, PMBusDetect, to identify vulnerable voltage regulators.
Bypassing Intel SGX via PMBus Voltage Fault Injection
TLDR: Researchers have demonstrated a novel hardware attack that manipulates the Power Management Bus (PMBus) to perform voltage fault injection on server platforms. By targeting the voltage regulator through the Baseboard Management Controller (BMC) or CPU, an attacker can induce faults to bypass security features like Intel SGX or force system crashes. This research highlights the critical need to secure internal management buses and restrict access to hardware configuration interfaces in multi-tenant server environments.
Hardware security often feels like a black box to those of us living in the application layer. We assume the silicon beneath our feet is immutable, but recent research into server-side hardware vulnerabilities proves that the physical layer is just as susceptible to exploitation as any web API. The work presented at Black Hat 2023 regarding PMFault is a perfect example of why we need to stop treating the server chassis as a trusted boundary.
The Mechanics of the Attack
Voltage fault injection is not new, but the method of delivery here is elegant. Instead of requiring physical access to the motherboard to manually probe pins or solder wires, the researchers identified that the Power Management Bus (PMBus) is often accessible via software. PMBus is an open-standard digital power management protocol that allows for communication with power converters.
The attack flow is straightforward: an attacker gains access to the BMC or the CPU and uses the libi2c library to send commands over the PMBus. By manipulating the voltage regulator module (VRM), the attacker can perform undervolting or overvolting. Undervolting is particularly dangerous because it can induce bit-flips during sensitive cryptographic operations, such as those performed within Intel SGX enclaves. This effectively revives the Plundervolt attack vector, but moves it from a local CPU-based exploit to a bus-level manipulation that is significantly harder to detect and mitigate.
From Software to Silicon
During the research, the team discovered that many Supermicro X11 motherboards expose the PMBus to the BMC. This is a massive oversight. The BMC is designed to be a management interface, but it often lacks the granular access controls required to prevent a compromised BMC from reaching out and touching the power delivery system.
To identify vulnerable hardware, the researchers released PMBusDetect, a tool that scans the I2C bus for devices that respond to PMBus commands. If you are performing a hardware-focused penetration test or auditing a data center environment, this tool is essential. It allows you to map the power management topology of a server without needing to open the case.
The command structure is simple. Once you identify the address of the VRM, you can interact with it using standard tools like ipmitool. For example, to check the voltage output, you might use:
# Scan for devices on the I2C bus
sudo i2cdetect -y 1
# Send a read command to the VRM at a specific address
# This is a simplified representation of the interaction
ipmitool raw 0x06 0x52 0x20 0x8B
The researchers found that they could successfully trigger faults in 26% of their test cases. While this might sound low, in a brute-force scenario against a cryptographic key, 26% is an eternity. It is the difference between a secure system and a complete compromise of the enclave's secrets.
Real-World Applicability
For a pentester, this vulnerability is a game-changer in environments where you have achieved low-level access to the BMC. Many organizations treat the BMC as a "management-only" network, but if that network is bridged or if the BMC is compromised via a web vulnerability, the entire server is at risk.
The impact is not limited to data exfiltration. By overvolting the CPU, an attacker can cause permanent hardware damage. The researchers demonstrated that by setting the voltage step-select bit incorrectly, they could push the CPU voltage well beyond the manufacturer's maximum tolerance, leading to physical destruction of the silicon. This is a rare case where a software-based exploit results in a permanent denial-of-service that requires a hardware replacement.
The Defensive Reality
Defending against this is difficult because the vulnerability is baked into the architecture of the server. The primary defense is to restrict access to the BMC and ensure that the firmware is updated to the latest versions provided by the vendor. Supermicro has already released security advisories addressing these issues, and it is imperative that these patches are applied.
Furthermore, organizations should implement strict network segmentation for BMC interfaces. If an attacker cannot reach the BMC, they cannot reach the PMBus via the BMC. Additionally, hardware-level protections that prevent software from issuing arbitrary PMBus commands should be a requirement for any future server procurement.
We need to stop assuming that the hardware layer is static. As we continue to push for more "smart" management features in our servers, we are inadvertently increasing the attack surface. The next time you are auditing a server, don't just look at the OS and the applications. Look at the management interfaces and the buses that connect them. The most interesting vulnerabilities are often the ones that bridge the gap between the code we write and the electricity that runs it.
CVEs
Vulnerability Classes
Target Technologies
OWASP Categories
Up Next From This Conference

A New Attack Interface In Java Applications

Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks

Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators
Similar Talks

Hacking Apple's USB-C Port Controller

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

