InvestorsHub Logo
Followers 96
Posts 11630
Boards Moderated 0
Alias Born 06/12/2009

Re: mick post# 93740

Tuesday, 05/01/2018 7:05:19 PM

Tuesday, May 01, 2018 7:05:19 PM

Post# of 97487
All your base belong to us!

https://amdflaws.com/

White Paper.
https://safefirmware.com/amdflaws_whitepaper.pdf



Oooops!

AMD Ryzen Chipset
Outsourced Chip Design Contains Backdoors

The chipset is a central component on Ryzen and Ryzen Pro workstations: it links the processor with hardware devices such as WiFi and network cards, making it an ideal target for malicious actors.


The Ryzen chipset is currently being shipped with exploitable backdoors that could let attackers inject malicious code into the chip, providing them with a safe haven to operate from.


AMD’s outsource partner, ASMedia, is a subsidiary of ASUSTeK Computer, a company with poor security track record that has been penalized by the Federal Trade Commission for neglecting security vulnerabilities, and must now undergo independent security audits for the next 20 years.


The Chipset backdoors exist on virtually all Ryzen and Ryzen Pro workstations on the market today.


USB, SATA, PCI-E, and network traffic may flow through the chipset. Malware could leverage this position of power.

Naught Guuud!

AMD Secure Processor
Critical Security Vulnerabilities in the AMD Secure Processor

AMD Secure Processor, responsible for maintaining security within EPYC and Ryzen processors, is currently being shipped with critical security vulnerabilities allowing malicious actors to install malware inside the chip.


The vulnerabilities may allow malicious actors to proliferate through corporate networks using stolen network credentials, by allowing Microsoft Windows Credential Guard to be bypassed.


Secure Encrypted Virtualization, a key feature that AMD advertises to cloud providers, could be defeated as soon as attackers obtain malicious code execution on the EPYC Secure Processor.


A malicious actor can gain full access to the compromised system, its physical memory, peripherals and to the secrets stored inside (fTPM).


Attackers could execute malicious code on the EPYC Secure Processor.

///***********************************************************

RYZENFALL

RYZENFALL allows malicious code to take complete control over the AMD Secure Processor.


Secure Processor privileges could be leveraged to read and write protected memory areas, such as SMRAM and the Windows Credential Guard isolated memory.


Attackers could use RYZENFALL to bypass Windows Credential Guard, steal network credentials, and then potentially spread through even highly secure Windows corporate networks.


Attackers could use RYZENFALL in conjunction with MASTERKEY to install persistent malware on the Secure Processor, exposing customers to the risk of covert and long-term industrial espionage.

///*************************************************************

FALLOUT

The vulnerabilities allow attackers to read from and write to protected memory areas, such as SMRAM and Windows Credential Guard isolated memory (VTL-1).


An attacker could leverage these vulnerabilities to steal network credentials protected by Windows Credential Guard.


An attacker could leverage these vulnerabilities to bypass BIOS flashing protections that are implemented in SMM.

///****************************************************************

CHIMERA

Two sets of manufacturer backdoors discovered: One implemented in firmware, the other in hardware (ASIC). The backdoors allow malicious code to be injected into the AMD Ryzen chipset.


The chipset links the CPU to USB, SATA, and PCI-E devices. Network, WiFi and Bluetooth traffic often flows through the chipset as well. An attacker could leverage the chipset’s middleman position to launch sophisticated attacks.


Chipset-based malware could evade virtually all endpoint security solutions on the market.


Malware running on the chipset could leverage the latter’s Direct Memory Access (DMA) engine to attack the operating system. This kind of attack has been demonstrated.

///**************************************************************

MASTERKEY

Multiple vulnerabilities in AMD Secure Processor firmware allow attackers to infiltrate the Secure Processor.


Enables stealthy and persistent malware, resilient against virtually all security solutions on the market.


Allows tampering with AMD’s firmware-based security features such as Secure Encrypted Virtualization (SEV) and Firmware Trusted Platform Module (fTPM).


Facilitates network credential theft by allowing Windows Credential Guard to be bypassed.


Physical damage and bricking of hardware. Could be used by attackers in hardware-based "ransomware" scenarios.

///*******************************************************************


Volume:
Day Range:
Bid:
Ask:
Last Trade Time:
Total Trades:
  • 1D
  • 1M
  • 3M
  • 6M
  • 1Y
  • 5Y
Recent AMD News