Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Patch Management

3/14/2018
09:35 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

AMD Chips Have Their Own Massive Hardware Security Flaws

CTS-Labs issued a report this week that detailed 13 different vulnerabilities in AMD's Ryzen and EPYC processors that are as dangerous as the Spectre and Meltdown flaws that Intel has been trying to fix.

After smiling smugly at Intel's Spectre and Meltdown chip problems and claiming its CPU architecture prevented these vulnerabilities from happening on its hardware, it's AMD's turn to face the music -- big time.

CTS-Labs, a security company based in Israel, announced on March 13 that its researchers had found 13 critical security vulnerabilities affecting data that is stored on AMD's Ryzen and EPYC processors. There is no current mediation for them, although CTS notes it is not releasing proof-of-concept exploitation code.

In addition, CTS has seemingly only given AMD 24 hours notice before publishing its findings.

The reported problems break down into four categories, and allow an attacker to target the secure segment of a processor.

The Masterkey variant installs malware on the BIOS, which is the segment that controls startup processes. This is supposed to ensure a tamper-proof startup. However, CTS finds that the injection is due to multiple vulnerabilities in the AMD Secure Processor firmware, which allows attackers to infiltrate the Secure Processor.

This will allow tampering with AMD's firmware-based security features such as Secure Encrypted Virtualization (SEV) and Firmware Trusted Platform Module (fTPM). In turn, it facilitates stealthy and persistent malware, which would be resilient against security solutions currently on the market.

This exploit is found by CTS to affect the EPYC server chips, as well as the Ryzen Workstation, Mobile and Pro processors.

Ryzenfall affects Ryzen Workstation, Mobile and Pro chips, and allows a complete takeover of the AMD Secure Processor. The SP privileges could be leveraged to read and write protected memory areas, such as SMRAM and the Windows Credential Guard isolated memory.

This could allow attackers using the vulnerability to bypass Windows Credential Guard and obtain network credentials that allow the attack to spread over a network.

Fallout affects the EPYC server -- the processor Microsoft chose for its Azure cloud servers -- and enables attackers to read from and write to protected memory areas. This could include SMRAM and Windows Credential Guard isolated memory (VTL-1). Again, this could allow network credentials to be obtained.

Additionally, leveraging the vulnerabilities could bypass BIOS flashing protections that are implemented in SMM.

The last category, Chimera, consists of two manufacturer backdoors in the Ryzen Workstation and Pro. One is in firmware and the other in ASIC hardware. These allow for injection of malicious code. Since these chips link the CPU to USB, SATA, and PCI-E devices, these exploits could affect network, WiFi and Bluetooth traffic. The Direct Memory Access (DMA) engine could also be attacked to affect the operating system.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

CTS reported that the experts that it has consulted with noted that the firmware vulnerabilities such as Masterkey, Ryzenfall and Fallout would take several months to fix. Not only that, hardware vulnerabilities such as Chimera cannot be fixed and require a workaround.

Producing a workaround may be difficult and cause undesired side-effects, according to CTS.

CTS has shared the vulnerability information with AMD, Microsoft, and a small number of companies that could produce patches and mitigations. As of this writing, AMD has issued no definitive statement, other than to note that the company is investigating.

Without testable POC code, however, it is impossible to verify that all of CTS's statements are accurate. Therefore, the warnings may be taken with some reservation even though it's possible that they are valid.

In any case, it seems AMD has some massive work that needs to be undertaken to rectify these claims.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5604
PUBLISHED: 2020-07-09
Android App 'Mercari' (Japan version) prior to version 3.52.0 allows arbitrary method execution of a Java object by a remoto attacker via a Man-In-The-Middle attack by using Java Reflection API of JavaScript code on WebView.
CVE-2020-5974
PUBLISHED: 2020-07-08
NVIDIA JetPack SDK, version 4.2 and 4.3, contains a vulnerability in its installation scripts in which permissions are incorrectly set on certain directories, which can lead to escalation of privileges.
CVE-2020-15072
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An error-based SQL Injection vulnerability exists via the Import Administrators section.
CVE-2020-15073
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An XSS vulnerability occurs within the Import Administrators section via upload of an edited text document. This also affects the Subscriber Lists section.
CVE-2020-2034
PUBLISHED: 2020-07-08
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect...