Tuesday, March 13th 2018

13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

Security researchers with Israel-based CTS-Labs, have discovered a thirteen security vulnerabilities for systems based on AMD Zen processors. The thirteen new exploits are broadly classified into four groups based on the similarity in function of the processor that they exploit: "Ryzenfall," "Masterkey," "Fallout," and "Chimera."

The researchers "believe that networks that contain AMD computers are at a considerable risk," and that malware can "survive computer reboots and re-installations of the operating system, while remaining virtually undetectable by most endpoint security solutions," such as antivirus software. They also mention that in their opinion, "the basic nature of some of these vulnerabilities amounts to complete disregard of fundamental security principles. This raises concerning questions regarding security practices, auditing, and quality controls at AMD."
Since this story went up some follow ups were posted:1. "Masterkey": This is an exploit of the Secure Boot feature, which checks if nothing has been tampered with on your machine while it was powered down (i.e. changes in firmware, hardware, or the last software state before shutdown). The Masterkey vulnerability gets around this environment integrity check by using an infected system BIOS, which can be flashed even from within Windows (with administrative privileges). This does not mean that the user has to modify and flash the BIOS manually before becoming vulnerable, the malware can do that on the fly once it is running. Theoretically, Secure Boot should validate the integrity of the BIOS, but apparently this can be bypassed, exploiting bugs in the Secure Processor's metadata parsing. Once the BIOS signature is out of the way, you can put pretty much any ARM Cortex A5 compatible code into the modified BIOS, which will then execute inside the ARM-based Secure Processor - undetectable to any antivirus software running on the main CPU, because the antivirus software running on the CPU has no way to scan inside the Secure Processor.

2. "Ryzenfall" is a class of vulnerabilities targeting Secure Processor, which lets a well-designed malware stash its code into the Secure Processor of a running system, to get executed for the remainder of the system's up-time. Again, this attack requires administrative privileges on the host machine, but can be performed in real-time, on the running system, without modifying the firmware. Secure Processor uses system RAM, in addition to its own in-silicon memory on the processor's die. While this part of memory is fenced off from access by the CPU, bugs exist that can punch holes into that protection. Code running on the Secure Processor has complete access to the system; Microsoft Virtualization-based Security (VBS) can be bypassed and additional malware can be placed into system management storage, where it can't be detected by traditional antivirus software. Windows Defender Credentials Guard, a component that stores and authenticates passwords and other secure functions on the machine, can also be bypassed and the malware can spread over the network to other machines, or the firmware can be modified to exploit "Masterkey", which persists through reboots, undetectable.

3. "Fallout": This class of vulnerabilities affects only AMD EPYC servers. It requires admin privileges like the other exploits, and has similar effects. It enables an attacker to gain access to memory regions like Windows Isolated User Mode / Kernel Mode (VTL1) and Secure Management RAM of the CPU (which are not accessible, even with administrative privileges). Risks are the same as "Ryzenfall", the attack vector is just different.

4. "Chimera": This class of vulnerabilities is an exploitation of the motherboard chipset (e.g. X370 also known as Promontory). AMD outsourced design of their Ryzen chipsets to Taiwanese ASMedia, which is a subsidiary of ASUS. You might know the company from the third-party USB 3.0 and legacy PCI chips on many motherboards. The company has been fined for lax security practices in the past, and numerous issues were found in their earlier controller chips. For the AMD chipset, it looks like they just copy-pasted a lot of code and design, including vulnerabilities. The chipset runs its own code that tells it what to do, and here's the problem: Apparently a backdoor has been implemented that gives any attacker knowing the right passcode full access to the chipset, including arbitrary code execution inside the chipset. This code can now use the system's DMA (direct memory access) engine to read/write system memory, which allows malware injection into the OS. To exploit this attack vector, administrative privileges are required. Whether DMA can access the fenced off memory portions of the Secure Processor, to additionally attack the Secure Processor through this vulnerability, is not fully confirmed, however, the researchers verified it works on a small number of desktop boards. Your keyboard, mouse, network controllers, wired or wireless, are all connected to the chipset, which opens up various other attack mechanisms like keyloggers (that send off their logs by directly accessing the network controller without the CPU/OS ever knowing about these packets), or logging all interesting network traffic, even if its destination is another machine on the same Ethernet segment. As far as we know, the tiny 8-pin serial ROM chip is connected to the CPU on AMD Ryzen platform, not to the chipset or LPCIO controller, so infecting the firmware might not be possible with this approach. A second backdoor was found that is implemented in the physical chip design, so it can't be mitigated by a software update, and the researchers hint at the requirement for a recall.

AMD's Vega GPUs use an implementation of the Secure Processor, too, so it is very likely that Vega is affected in a similar way. An attacker could infect the GPU, and then use DMA to access the rest of the system through the attacks mentioned above.

The researchers have set up the website AMDFlaws.com to chronicle these findings, and to publish detailed whitepapers in the near future.

AMD provided us with the following statement: "We have just received a report from a company called CTS Labs claiming there are potential security vulnerabilities related to certain of our processors. We are actively investigating and analyzing its findings. This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings. At AMD, security is a top priority and we are continually working to ensure the safety of our users as potential new risks arise."

Update March 14 7 AM CET: It seems a lot of readers misunderstand the BIOS flashing part. The requirement is not that the user has to manually flash a different BIOS first before becoming vulnerable. The malware itself will modify/flash the BIOS once it is running on the host system with administrative privileges. Also, the signed driver requirement does not require a driver from any specific vendor. The required driver (which is not for an actual hardware device and just provides low-level hardware access) can be easily created by any hacker. Signing the driver, so Windows accepts it, requires a digital signature which is available from various SSL vendors for a few hundred dollars after a fairly standard verification process (requires a company setup with bank account). Alternatively an already existing signed driver from various hardware utilities could be extracted and used for this purpose.
Source: Many Thanks to Earthdog for the tip
Add your own comment

482 Comments on 13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

#226
laszlo
R-T-BThey do to survive a detection/reinstall.
don't see where is the need of survive; as admin you can do whatever you want even reinstall when you want and what you want...
Posted on Reply
#227
R-T-B
laszlodon't see where is the need of survive; as admin you can do whatever you want even reinstall when you want and what you want...
Until someone hops on locally and wipes out all your hard work.

This can survive that... if it's real, anyhow.
Posted on Reply
#228
silentbogo
Well, that's beyond fishy... Even without looking at company's background I can tell that this is a load of bullshit just by paying attention to wording in their whitepaper.
We did not attempt to produce exploits for Ryzen Pro and Ryzen Mobile, although we have seen the vulnerabilities in the code. We also did not attempt to produce exploits for MASTERKEY-3.
The others are also quite vague and always imply plausibility, and not a proof (e.g. "if you get access to Fenced RAM, then you are in trouble").

So, basically it's like my occasional rants about PSP and ME, but with better presentation and many-many words.

Also, what I find strange, is that with all of my google-fu skills I cannot find shit about ASM1042 or 1142 vulnerabilities these dudes mention. The only thing I could find is a forced firmware update through upstream port on ASM1074(USB3.0 hub), ASM1053(USB to SATA bridge) ,which is basically a feature, but could be used as an attack vector on the device side. And nothing related to DMA attacks (except for some Thunderbolt stuff from Blackhat 2013, which is not even a hack but still interesting).

P.S> I'm still worried about potential vulnerabilities in ME and PSP, but I'm definitely not worried about these four "totally not made-up, pinkie swear" vulns.
Posted on Reply
#229
john_
lexluthermiesterMeltdown and Spectre weren't?
There is a clear difference between "Meltdown" and, for example, "Intelfail".
Posted on Reply
#230
W1zzard
laszlodon't see where is the need of survive; as admin you can do whatever you want even reinstall when you want and what you want...
How do you plan on removing the virus in your BIOS that you don't know about, that your antivirus can not find, that has enabled BIOS write protection since it became active?
Buy a new computer, sell old computer on eBay

Oh your name contains "bank" ? Here let me sell you these awesome computers with great motherboards.

Edit: I just realized I should get into the business of selling crypto-equipment :D
Posted on Reply
#231
ikeke
W1zzardHow do you plan on removing the virus in your BIOS that you don't know about, that your antivirus can not find, that has enabled BIOS write protection since it became active?
Buy a new computer, sell old computer on eBay

Oh your name contains "bank" ? Here let me sell you these awesome computers with great motherboards.

Edit: I just realized I should get into the business of selling crypto-equipment :D
If someone with elevated admin access can craft a modified BIOS or has access to signed drivers that they, again with elevated admin access, can deploy to your system - then you are way too f***ed anyway.

..and to add that having a virus/backdoor/keylogger in the system is the least of your worries if theres a bad actor with this level of access to your environment.
Posted on Reply
#232
las
Intel paid for this - Just before Ryzen refresh. What a coincidence...
Posted on Reply
#233
W1zzard
ikekeIf someone with elevated admin access can craft a modified BIOS or has access to signed drivers that they, again with elevated admin access, can deploy to your system - then you are way too f***ed anyway.

..and to add that having a virus/backdoor/keylogger in the system is the least of your worries if theres a bad actor with this level of access to your environment.
You have never run GPU-Z ? It starts with admin privileges and comes with a signed driver
Posted on Reply
#234
laszlo
W1zzardHow do you plan on removing the virus in your BIOS that you don't know about, that your antivirus can not find, that has enabled BIOS write protection?
Buy a new computer, sell old computer on eBay

Oh your name contains "bank" ? Here let me sell you these awesome computers with great motherboards.

Edit: I just realized I should get into the business of selling crypto-equipment :D
i understand your point; one solution would be to have bios update directly from manufacturer server; basically deny the admin the right to manually do it without a connection to bios server from where is flashed

now question is can bios be hacked at manufacturer ? unfortunately the answer is yes as we already had situation when new hardware had hacked bios...

we already know that every hardware is susceptible to intrusion at bios level having the needed means and authorization so we'll be never safe ...
Posted on Reply
#235
W1zzard
laszlonow question is can bios be hacked at manufacturer ?
Actually the more realistic attack vector is that someone performs a man in the middle attack (malware on your PC, your router, ISP, upstream ISP of mobo vendor) to swap out the BIOS.
Posted on Reply
#236
delshay
If a BIOS is re-written, I do believe it resets back to default basic settings. It seems I will keep an eye on this if my computer somehow defaults back for no reason. Please correct me if I am wrong here.
Posted on Reply
#237
INSTG8R
Vanguard Beta Tester
I’ll be sure to leave my front door unlocked so the “hackers” can have a go with these flaws...:rolleyes:
Posted on Reply
#238
bug
delshayIf a BIOS is re-written, I do believe it resets back to default basic settings. It seems I will keep an eye on this if my computer somehow defaults back for no reason. Please correct me if I am wrong here.
It does. I believe the target here is the uninformed user who both runs everything at default settings and couldn't tell their systems were reset to defaults if their life depended on it.
Posted on Reply
#239
jabbadap
bugIt does. I believe the target here is the uninformed user who both runs everything at default settings and couldn't tell their systems were reset to defaults if their life depended on it.
Afaik it does not have to revert to default settings. Maker of malicious code might wanted to modify bios settings to i.e. grant remote access.
Posted on Reply
#240
Veradun
qubitEDIT: Ok, reading some of the comments, it seems that the veracity of this report may be in some doubt. Let's hope it's fake, but I'm not holding my breath.
It's very likely not fake. The point is it is super-obvious that once you give root access to anyone you are fucked <insert Nicolas Cage meme here>
W1zzardHow do you plan on removing the virus in your BIOS that you don't know about, that your antivirus can not find, that has enabled BIOS write protection since it became active?
Buy a new computer, sell old computer on eBay
So you think people in the industry randomly reinstall operating systems for the sake of it without knowing there is a virus/whatever? The point is you are already fucked when they get root access, no matter what else comes later. If you instead know there is a problem, well, you solve it, no matter what the vulnerability is (i.e. reflash with legit BIOS).

If someone in the manufacturing industry wants to craft a keylogging bios they can do that with or without a "flaw" that enables root users to flash bioses.

The whole thing is laughable and I just registered to this forum to laugh together :D
Posted on Reply
#241
W1zzard
VeradunSo you think people in the industry randomly reinstall operating systems for the sake of it without knowing there is a virus/whatever?
That's exactly what happens at server hosting companies?
Posted on Reply
#242
Veradun
W1zzardThat's exactly what happens at server hosting companies?
So this method lets you get to bios flashing from a windows host on an hypervisor?
Posted on Reply
#243
W1zzard
VeradunSo this method lets you get to bios flashing from a windows host on an hypervisor?
Lots of people are renting full servers, not just virtual machines. Yes I can flash the BIOS of our webservers
Posted on Reply
#244
qubit
Overclocked quantum bit
VeradunIt's very likely not fake. The point is it is super-obvious that once you give root access to anyone you are fucked <insert Nicolas Cage meme here>
After reading more about it, it's clear that this is clearly a smear campaign against AMD. Of course there's some truth to it, but it's obviously been designed to try and damage AMD. So underhand and in my opinion, I believe Intel is behind it, since AMD are giving them a good kicking now in sales and market share.
Posted on Reply
#245
laszlo
W1zzardYes I can flash the BIOS of our webservers
this is the main problem ; admin can do whatever they want without a superadmin to check; of course if superadmin is human we're back at the beginning..
Posted on Reply
#246
Veradun
W1zzardLots of people are renting full servers, not just virtual machines. Yes I can flash the BIOS of our webservers
We are at the beginning:

- you don't want to exploit your own windows server
- if you gift someone with root access you can't blame Intel/AMD/whatever since the flaw is in your policies

Besides people renting full servers usually don't randomly reinstall OSes. They do if they have a BIG problem, and only after investigation on what the problem has been (i.e. a breach that gave someone root access) and what as been done since then.
Posted on Reply
#248
delshay
jabbadapAfaik it does not have to revert to default settings. Maker of malicious code might wanted to modify bios settings to i.e. grant remote access.
Then how about I set my own overclocking BIOS, then lock the BIOS chip. Any changes I want to do, I will have to insert a new BIOS chip. I can live with this.

Now nobody can write to it.
Posted on Reply
#250
bug
I'm know I'm talking to myself here, but would it be possible we wait until somebody looks into these further, before we decide how much of an impact they have under various circumstances?

I mean, ok, it's rather suspicious how these were discovered and announced, but the crux of the matter is if they're real and if yes, who and how should guard against these. Everything else is just noise.
Posted on Reply
Add your own comment
Jan 24th, 2025 02:29 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts