In the wake of Meltdown and Spectre, AMD has come out relatively clean compared with Intel. While it remains exposed to Spectre (Variant 1 and Variant 2), it dodged Meltdown altogether. But a new security firm is claiming AMD has no fewer than 13 critical vulnerabilities in its Ryzen processor and chipsets, including vulnerabilities within the heart of the CPU itself.
In a recent disclosure, security firm CTS-Labs has accused AMD of failing to catch 13 high-profile and serious security flaws in four separate families: Masterkey, Ryzenfall, Chimera, and Fallout. A chart of the four is shown below:
CTS-Labs has not disclosed enough information about these flaws to discuss them in great detail, but we’ll cover the summaries. The first flaw, Masterkey, can only be triggered if the malware author can flash a malicious UEFI on to the motherboard itself. Once flashed, this malicious UEFI can be used to execute code arbitrarily on the integrated ARM Cortex-A5 processor inside every Ryzen CPU. While this type of malicious code execution attack from within the CPU is a real threat — it’s one of the problems with the Intel Management Engine — it’s not clear if this is practically all that easy to exploit. Locking the UEFI from updates should prevent it. Ryzen and Epyc are both affected; Ryzen Pro and Ryzen Mobile are theorized to be affected.
Next up is Ryzenfall, a set of security issues within the Ryzen Secure OS (that’s the OS running in the Cortex-A5 CPU). This attack allows for secure access to areas of memory that are supposed to be fenced off and protected. Epyc is not affected by any of these vulnerabilities, though Ryzen Mobile and Ryzen are. Ryzenfall requires elevated administrator privileges and a vendor-signed boot driver to exploit.
Fallout is basically Ryzenfall, but for Epyc. It targets the off-chip boot loader as opposed to an on-chip hardware block, but it targets protected memory and the system management mode that’s not meant to be user-accessible.
Finally, there’s Chimera, which refers to a pair of backdoors supposedly hidden in the Ryzen chipset. The white paper claims “one is implemented within the firmware running on the chip, while the other is inside the chip’s ASIC hardware. Because the latter has been manufactured into the chip, a direct fix may not be possible and the solution may involve either a workaround or a recall.”
AMD’s chipsets are designed by Asmedia, and previous Asmedia chips have been criticized for their security implementations. The security flaws in Chimera allege that code can be run directly on the chipset and then used to manipulate the OS running on the main CPU, at least as a proof of concept. The security firm theorizes this could be used to create a keylogger or to spy on network accesses. It may also be possible to again access protected memory (this is the only area where CTS-Labs performed any verification).
If true, these security flaws collectively represent some significant problems that weren’t previously known, and AMD is going to have to do some significant work to fix them. It’s not clear yet how difficult that will be or what form it will take.
NASA Makes Contact With Satellite Thought Lost 13 Years Ago
NASA's IMAGE satellite has reactivated itself after over a decade of silence. Is there any data left to find?
This Contact Lens Could Lets You Shoot Lasers From Your Eyes
They won't vaporize bad guys, but a laser is a laser.
NASA Loses Contact With Opportunity Rover as Martian Dust Storm Rages On
NASA now says the rover has missed its latest check-in. That suggests its batteries are drained, and that could spell the end for this tenacious little solar-powered rover.