Microsoft Xbox One Hacked
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是一个叫Gaasedelen的人通过电压波动攻击Xbox One的漏洞。他无法使用重置 glitch,所以转向电压 glitching。他开发了新的硬件工具来检测CPU电压的变化,最终成功利用Bliss漏洞,在ARM Cortex内存保护和Memcpy操作中制造两次电压波动,从而绕过保护机制。 这个漏洞允许加载未签名代码,包括Hypervisor和OS,还能访问安全处理器,解密游戏和固件。攻击是无法修补的,因为是硬件层面的。 现在我要把这些信息浓缩到100字以内。要抓住关键点:电压波动、绕过内存保护、加载未签名代码、解密功能、无法修补。 可能的结构:Gaasedelen通过电压波动攻击Xbox One,绕过内存保护,利用Bliss漏洞加载未签名代码并解密内容。攻击无法修补。 检查字数是否在限制内,并确保信息准确。 </think> Gaasedelen通过电压波动攻击Xbox One,绕过内存保护机制并利用Bliss漏洞加载未签名代码,可解密游戏和固件。该攻击无法修补。 2026-3-23 11:1:0 Author: www.schneier.com(查看原文) 阅读量:6 收藏

It’s an impressive feat, over a decade after the box was released:

Since reset glitching wasn’t possible, Gaasedelen thought some voltage glitching could do the trick. So, instead of tinkering with the system rest pin(s) the hacker targeted the momentary collapse of the CPU voltage rail. This was quite a feat, as Gaasedelen couldn’t ‘see’ into the Xbox One, so had to develop new hardware introspection tools.

Eventually, the Bliss exploit was formulated, where two precise voltage glitches were made to land in succession. One skipped the loop where the ARM Cortex memory protection was setup. Then the Memcpy operation was targeted during the header read, allowing him to jump to the attacker-controlled data.

As a hardware attack against the boot ROM in silicon, Gaasedelen says the attack in unpatchable. Thus it is a complete compromise of the console allowing for loading unsigned code at every level, including the Hypervisor and OS. Moreover, Bliss allows access to the security processor so games, firmware, and so on can be decrypted.

Tags: ,

Posted on March 23, 2026 at 7:01 AM0 Comments

Sidebar photo of Bruce Schneier by Joe MacInnis.


文章来源: https://www.schneier.com/blog/archives/2026/03/microsoft-xbox-hacked.html
如有侵权请联系:admin#unsafe.sh