Ars Technica reports that “hackers have been finding partial vulnerabilities in early versions of the [Nintendo] Switch firmware throughout 2017.” They have discovered a Webkit flaw that allows for basic “user level” access to some portions of the underlying system and a service-level initialization flaw that gives hackers slightly more control over the Switch OS. “But the potential for running arbitary homebrew code on the Switch really started looking promising late last month, with a talk at the 34th Chaos Congress (34C3) in Leipzig Germany,” reports Ars. “In that talk, hackers Plutoo, Derrek, and Naehrwert outlined an intricate method for gaining kernel-level access and nearly full control of the Switch hardware.” From the report: The full 45-minute talk is worth a watch for the technically inclined, it describes using the basic exploits discussed above as a wedge to dig deep into how the Switch works at the most basic level. At one point, the hackers sniff data coming through the Switch’s memory bus to figure out the timing for an important security check. At another, they solder an FPGA onto the Switch’s ARM chip and bit-bang their way to decoding the secret key that unlocks all of the Switch’s encrypted system binaries. The team of Switch hackers even got an unexpected assist in its hacking efforts from chipmaker Nvidia. The “custom chip” inside the Switch is apparently so similar to an off-the-shelf Nvidia Tegra X1 that a $700 Jetson TX1 development kit let the hackers get significant insight into the Switch’s innards. More than that, amid the thousand of pages of Nvidia’s public documentation for the X1 is a section on how to “bypass the SMMU” (the System Memory Management Unit), which gave the hackers a viable method to copy and write a modified kernel to the Switch’s system RAM. As Plutoo put it in the talk, “Nvidia backdoored themselves.”

Share on Google+

Read more of this story at Slashdot.