AMD’s Ryzen CPUs, Chipsets Allegedly Contain Serious Security Flaws
In the wake of Meltdown and Spectre, AMD has come out relatively clean compared with Intel. While it remains exposed to Spectre (Variant 1 and Variant 2), it dodged Meltdown altogether. But a new security firm is claiming AMD has no fewer than 13 critical vulnerabilities in its Ryzen processor and chipsets, including vulnerabilities within the heart of the CPU itself.
In a recent disclosure, security firm CTS-Labs has accused AMD of failing to catch 13 high-profile and serious security flaws in four separate families: Masterkey, Ryzenfall, Chimera, and Fallout. A chart of the four is shown below:
CTS-Labs has not disclosed enough information about these flaws to discuss them in great detail, but we’ll cover the summaries. The first flaw, Masterkey, can only be triggered if the malware author can flash a malicious UEFI on to the motherboard itself. Once flashed, this malicious UEFI can be used to execute code arbitrarily on the integrated ARM Cortex-A5 processor inside every Ryzen CPU. While this type of malicious code execution attack from within the CPU is a real threat — it’s one of the problems with the Intel Management Engine — it’s not clear if this is practically all that easy to exploit. Locking the UEFI from updates should prevent it. Ryzen and Epyc are both affected; Ryzen Pro and Ryzen Mobile are theorized to be affected.
Next up is Ryzenfall, a set of security issues within the Ryzen Secure OS (that’s the OS running in the Cortex-A5 CPU). This attack allows for secure access to areas of memory that are supposed to be fenced off and protected. Epyc is not affected by any of these vulnerabilities, though Ryzen Mobile and Ryzen are. Ryzenfall requires elevated administrator privileges and a vendor-signed boot driver to exploit.
Fallout is basically Ryzenfall, but for Epyc. It targets the off-chip boot loader as opposed to an on-chip hardware block, but it targets protected memory and the system management mode that’s not meant to be user-accessible.
Finally, there’s Chimera, which refers to a pair of backdoors supposedly hidden in the Ryzen chipset. The white paper claims “one is implemented within the firmware running on the chip, while the other is inside the chip’s ASIC hardware. Because the latter has been manufactured into the chip, a direct fix may not be possible and the solution may involve either a workaround or a recall.”
AMD’s chipsets are designed by Asmedia, and previous Asmedia chips have been criticized for their security implementations. The security flaws in Chimera allege that code can be run directly on the chipset and then used to manipulate the OS running on the main CPU, at least as a proof of concept. The security firm theorizes this could be used to create a keylogger or to spy on network accesses. It may also be possible to again access protected memory (this is the only area where CTS-Labs performed any verification).
If true, these security flaws collectively represent some significant problems that weren’t previously known, and AMD is going to have to do some significant work to fix them. It’s not clear yet how difficult that will be or what form it will take.
Continue reading
Intel Launches AMD Radeon-Powered CPUs
Intel's new Radeon+Kaby Lake hybrid CPUs are headed for store shelves. Here's how the SKUs break down and what you need to know.
RISC-V Tiptoes Towards Mainstream With SiFive Dev Board, High-Performance CPU
RISC V continues to make inroads across the market, this time with a cheaper and more fully-featured test motherboard.
VIA Technologies, Zhaoxin Strengthen x86 CPU Development Ties
VIA and Zhaoxin are deepening their strategic partnership with additional IP transfers, intended to accelerate long-term product development.
What Does It Mean for the PC Market If Apple Makes the Fastest CPU?
Apple's M1 SoC could have a profound impact on the PC market. After 25 years, x86 may no longer be the highest-performing CPU architecture you can practically buy.