AMD’s Ryzen CPUs, Chipsets Allegedly Contain Serious Security Flaws

In the wake of Meltdown and Spectre, AMD has come out relatively clean compared with Intel. While it remains exposed to Spectre (Variant 1 and Variant 2), it dodged Meltdown altogether. But a new security firm is claiming AMD has no fewer than 13 critical vulnerabilities in its Ryzen processor and chipsets, including vulnerabilities within the heart of the CPU itself.
In a recent disclosure, security firm CTS-Labs has accused AMD of failing to catch 13 high-profile and serious security flaws in four separate families: Masterkey, Ryzenfall, Chimera, and Fallout. A chart of the four is shown below:

CTS-Labs has not disclosed enough information about these flaws to discuss them in great detail, but we’ll cover the summaries. The first flaw, Masterkey, can only be triggered if the malware author can flash a malicious UEFI on to the motherboard itself. Once flashed, this malicious UEFI can be used to execute code arbitrarily on the integrated ARM Cortex-A5 processor inside every Ryzen CPU. While this type of malicious code execution attack from within the CPU is a real threat — it’s one of the problems with the Intel Management Engine — it’s not clear if this is practically all that easy to exploit. Locking the UEFI from updates should prevent it. Ryzen and Epyc are both affected; Ryzen Pro and Ryzen Mobile are theorized to be affected.
Next up is Ryzenfall, a set of security issues within the Ryzen Secure OS (that’s the OS running in the Cortex-A5 CPU). This attack allows for secure access to areas of memory that are supposed to be fenced off and protected. Epyc is not affected by any of these vulnerabilities, though Ryzen Mobile and Ryzen are. Ryzenfall requires elevated administrator privileges and a vendor-signed boot driver to exploit.

Fallout is basically Ryzenfall, but for Epyc. It targets the off-chip boot loader as opposed to an on-chip hardware block, but it targets protected memory and the system management mode that’s not meant to be user-accessible.
Finally, there’s Chimera, which refers to a pair of backdoors supposedly hidden in the Ryzen chipset. The white paper claims “one is implemented within the firmware running on the chip, while the other is inside the chip’s ASIC hardware. Because the latter has been manufactured into the chip, a direct fix may not be possible and the solution may involve either a workaround or a recall.”
AMD’s chipsets are designed by Asmedia, and previous Asmedia chips have been criticized for their security implementations. The security flaws in Chimera allege that code can be run directly on the chipset and then used to manipulate the OS running on the main CPU, at least as a proof of concept. The security firm theorizes this could be used to create a keylogger or to spy on network accesses. It may also be possible to again access protected memory (this is the only area where CTS-Labs performed any verification).
If true, these security flaws collectively represent some significant problems that weren’t previously known, and AMD is going to have to do some significant work to fix them. It’s not clear yet how difficult that will be or what form it will take.
Continue reading

Apple’s New M2 Takes Serious Shots at Intel, x86
Apple's new M2 has finally broken cover and the CPU looks like a solid jump forward — and a further challenge to both Intel and x86.

Internal Memo From Meta Warns of ‘Serious Times’ For The Company
A Meta executive posted an internal memo to employees this week warning of slimmer budgets, less engineers, higher goals, and stiff headwinds.

Microsoft’s Windows on ARM Effort is Seriously Limited
A new list of Windows 10 on ARM limitations has dropped. It's a doozy. Depending on your use case for the laptop, you might end up with your workflow hamstrung.

Serious Rowhammer Attacks Can Now Be Carried Out Remotely
Memory corrupting techniques used for local attacks can now be launched remotely, with no need for privilege escalation or direct system access.