Tuesday, March 13th 2018

13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

Security researchers with Israel-based CTS-Labs, have discovered a thirteen security vulnerabilities for systems based on AMD Zen processors. The thirteen new exploits are broadly classified into four groups based on the similarity in function of the processor that they exploit: "Ryzenfall," "Masterkey," "Fallout," and "Chimera."

The researchers "believe that networks that contain AMD computers are at a considerable risk," and that malware can "survive computer reboots and re-installations of the operating system, while remaining virtually undetectable by most endpoint security solutions," such as antivirus software. They also mention that in their opinion, "the basic nature of some of these vulnerabilities amounts to complete disregard of fundamental security principles. This raises concerning questions regarding security practices, auditing, and quality controls at AMD."
Since this story went up some follow ups were posted:1. "Masterkey": This is an exploit of the Secure Boot feature, which checks if nothing has been tampered with on your machine while it was powered down (i.e. changes in firmware, hardware, or the last software state before shutdown). The Masterkey vulnerability gets around this environment integrity check by using an infected system BIOS, which can be flashed even from within Windows (with administrative privileges). This does not mean that the user has to modify and flash the BIOS manually before becoming vulnerable, the malware can do that on the fly once it is running. Theoretically, Secure Boot should validate the integrity of the BIOS, but apparently this can be bypassed, exploiting bugs in the Secure Processor's metadata parsing. Once the BIOS signature is out of the way, you can put pretty much any ARM Cortex A5 compatible code into the modified BIOS, which will then execute inside the ARM-based Secure Processor - undetectable to any antivirus software running on the main CPU, because the antivirus software running on the CPU has no way to scan inside the Secure Processor.

2. "Ryzenfall" is a class of vulnerabilities targeting Secure Processor, which lets a well-designed malware stash its code into the Secure Processor of a running system, to get executed for the remainder of the system's up-time. Again, this attack requires administrative privileges on the host machine, but can be performed in real-time, on the running system, without modifying the firmware. Secure Processor uses system RAM, in addition to its own in-silicon memory on the processor's die. While this part of memory is fenced off from access by the CPU, bugs exist that can punch holes into that protection. Code running on the Secure Processor has complete access to the system; Microsoft Virtualization-based Security (VBS) can be bypassed and additional malware can be placed into system management storage, where it can't be detected by traditional antivirus software. Windows Defender Credentials Guard, a component that stores and authenticates passwords and other secure functions on the machine, can also be bypassed and the malware can spread over the network to other machines, or the firmware can be modified to exploit "Masterkey", which persists through reboots, undetectable.

3. "Fallout": This class of vulnerabilities affects only AMD EPYC servers. It requires admin privileges like the other exploits, and has similar effects. It enables an attacker to gain access to memory regions like Windows Isolated User Mode / Kernel Mode (VTL1) and Secure Management RAM of the CPU (which are not accessible, even with administrative privileges). Risks are the same as "Ryzenfall", the attack vector is just different.

4. "Chimera": This class of vulnerabilities is an exploitation of the motherboard chipset (e.g. X370 also known as Promontory). AMD outsourced design of their Ryzen chipsets to Taiwanese ASMedia, which is a subsidiary of ASUS. You might know the company from the third-party USB 3.0 and legacy PCI chips on many motherboards. The company has been fined for lax security practices in the past, and numerous issues were found in their earlier controller chips. For the AMD chipset, it looks like they just copy-pasted a lot of code and design, including vulnerabilities. The chipset runs its own code that tells it what to do, and here's the problem: Apparently a backdoor has been implemented that gives any attacker knowing the right passcode full access to the chipset, including arbitrary code execution inside the chipset. This code can now use the system's DMA (direct memory access) engine to read/write system memory, which allows malware injection into the OS. To exploit this attack vector, administrative privileges are required. Whether DMA can access the fenced off memory portions of the Secure Processor, to additionally attack the Secure Processor through this vulnerability, is not fully confirmed, however, the researchers verified it works on a small number of desktop boards. Your keyboard, mouse, network controllers, wired or wireless, are all connected to the chipset, which opens up various other attack mechanisms like keyloggers (that send off their logs by directly accessing the network controller without the CPU/OS ever knowing about these packets), or logging all interesting network traffic, even if its destination is another machine on the same Ethernet segment. As far as we know, the tiny 8-pin serial ROM chip is connected to the CPU on AMD Ryzen platform, not to the chipset or LPCIO controller, so infecting the firmware might not be possible with this approach. A second backdoor was found that is implemented in the physical chip design, so it can't be mitigated by a software update, and the researchers hint at the requirement for a recall.

AMD's Vega GPUs use an implementation of the Secure Processor, too, so it is very likely that Vega is affected in a similar way. An attacker could infect the GPU, and then use DMA to access the rest of the system through the attacks mentioned above.

The researchers have set up the website AMDFlaws.com to chronicle these findings, and to publish detailed whitepapers in the near future.

AMD provided us with the following statement: "We have just received a report from a company called CTS Labs claiming there are potential security vulnerabilities related to certain of our processors. We are actively investigating and analyzing its findings. This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings. At AMD, security is a top priority and we are continually working to ensure the safety of our users as potential new risks arise."

Update March 14 7 AM CET: It seems a lot of readers misunderstand the BIOS flashing part. The requirement is not that the user has to manually flash a different BIOS first before becoming vulnerable. The malware itself will modify/flash the BIOS once it is running on the host system with administrative privileges. Also, the signed driver requirement does not require a driver from any specific vendor. The required driver (which is not for an actual hardware device and just provides low-level hardware access) can be easily created by any hacker. Signing the driver, so Windows accepts it, requires a digital signature which is available from various SSL vendors for a few hundred dollars after a fairly standard verification process (requires a company setup with bank account). Alternatively an already existing signed driver from various hardware utilities could be extracted and used for this purpose.
Source: Many Thanks to Earthdog for the tip
Add your own comment

482 Comments on 13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

#376
lexluthermiester
anubis44As for letting this go, well, I own shares of AMD, and I'm not too thrilled with the idea of a website posting bogus allegations that serve to damage AMD's share value as a news item. So no, I'm not going to just 'let it go.'
So you admit you're biased and unable to be objective. If you'd said that to begin with..
Posted on Reply
#377
EarthDog
anubis44Oh, you mean the 'vulnerability' that exists if you:
1) Have the administrator password
2) Are personally at the machine
3) Can flash the BIOS

You mean THAT crazy vulnerability? The one that EVERY computer ever made has? Yeah, that's a really BIG news item. Nobody in tech EVER suspected that you could take control of a computer and install malware on it if you personally flashed the bios with a corrupt one. That was a vulnerability we were talking about in the 1980s, people. It's not NEWS. It's common knowledge. It's like saying: NEWSFLASH! Humans need BLOOD in their bodies or they DIE! Quick! It's an EMERGENCY! We've JUST FIGURED THIS OUT!!! It's not that it isn't true, it's that it's not true that it's some kind of newly discovered vulnerability. It's not NEWS. It's like saying: "Warning! Your car could be stolen if somebody breaks the window and the keys are in the car! Everybody needs to hear this! It's NEWS!!!" No, it isn't news.
But, the allegations are not bogus. You can minimize them if you would like, we get it, you own stock, its in your own vested interest to do so.

Cheers though... I tried to stay out of this thread because as we know, opinions are like assholes and all (everybody has one). I should have tried harder.

We'll let the CVE's and further explanations take care of this noise.
Posted on Reply
#378
ikeke
Explanation for one was, from the video, that you need specific motherboard with OS on bare metal and admin on said combo. They acknowledged in video that it wont work on all motherboards.

Again, once you have admin with possibility to flash bios anything is possible. You have full access on the machine, you can do anything.
Posted on Reply
#380
ikeke
Haven't seen them, cant say.

But thisfar CTS-Labs has not been able to validate their extraordinary claims of, quote:

amdflaws.com/
Am I affected?
Any consumer or organization purchasing AMD Servers, Workstations, or Laptops are affected by these vulnerabilities.


Which, I'd say is as clear of a case of FUD as there ever was.
Posted on Reply
#381
EarthDog
ikekeWhich, I'd say is as clear of a case of FUD as there ever was.
Is it though? I don't think so. They do go on to explain things a bit and we, both, have no idea of the scope of these. I'm just amazed that so many people can call it absolutely BS without flinching and with such little ACTUAL evidence. Oh well, time will tell. ;)
Posted on Reply
#382
ikeke
If they have such extraordinary claims then I'm not buying it after first example. Again, im pointing at the case they made as these being super critical flaws, not at the exploits per se.

For all its worth it could right now boil down to broken BIOS verification mechanism on some OEMs implementation. Now, that is not difficult to fix, I know for fact.

edit: Also, BIOS password in place? Exploit useless.

editx2: and now, this www.anandtech.com/show/12556/amd-confirms-exploits-patched-in-weeks

The salient high-level takeaway from AMD is this:
  1. All the issues can be confirmed on related AMD hardware, but require Admin Access at the metal
  2. All the issues are set to be fixed within weeks, not months, through firmware patches and BIOS updates
  3. No performance impact expected
  4. None of these issues are Zen-specific, but relate to the PSP and ASMedia chipsets.
  5. These are not related to the GPZ exploits earlier this year.
community.amd.com/community/amd-corporate/blog/2018/03/20/initial-amd-technical-assessment-of-cts-labs-research

Someones going to get a call from the law..
www.bloomberg.com/news/articles/2018-03-20/amd-confirms-chip-vulnerability-says-report-exaggerated-danger
Posted on Reply
#383
EarthDog
Certainly much ado about nothing it seems...though all real!
Posted on Reply
#384
bug
ikekeIf they have such extraordinary claims then I'm not buying it after first example. Again, im pointing at the case they made as these being super critical flaws, not at the exploits per se.

For all its worth it could right now boil down to broken BIOS verification mechanism on some OEMs implementation. Now, that is not difficult to fix, I know for fact.

edit: Also, BIOS password in place? Exploit useless.

editx2: and now, this www.anandtech.com/show/12556/amd-confirms-exploits-patched-in-weeks

The salient high-level takeaway from AMD is this:
  1. All the issues can be confirmed on related AMD hardware, but require Admin Access at the metal
  2. All the issues are set to be fixed within weeks, not months, through firmware patches and BIOS updates
  3. No performance impact expected
  4. None of these issues are Zen-specific, but relate to the PSP and ASMedia chipsets.
  5. These are not related to the GPZ exploits earlier this year.
community.amd.com/community/amd-corporate/blog/2018/03/20/initial-amd-technical-assessment-of-cts-labs-research

Someones going to get a call from the law..
www.bloomberg.com/news/articles/2018-03-20/amd-confirms-chip-vulnerability-says-report-exaggerated-danger
#4 could be a bit more troublesome, because everything AMD has released since 2013 includes PSP. Though all should be patchable just the same.
Posted on Reply
#386
R-T-B
ikekeViceroy posting FUD right after amdflaws went public, though, is.
Proof?

I think you and I define "proof" differently.

It's fishy, I'll hand you that.
anubis44Are personally at the machine
Again, not required.
Posted on Reply
#388
lexluthermiester
ikekeI'd call that orchestrated.
And the Meltdown/Spectre wasn't coordinated/orchestrated? Come on, take off the tin-hat..
Posted on Reply
#389
ikeke
What are you talking about? No, really?

Meltdown/Spectre - industry as a whole had months to prepare the fixes, no public disclosure.
"Amdflaws" - 24h notification to AMD since "these are unfixable issues", then amateurish public FUD campaign.
Posted on Reply
#390
lexluthermiester
ikeke"Amdflaws" - 24h notification to AMD
We've been over this. There is huge difference between making a public announcement and full disclosure to the public. CTS did not and has not disclosed the full technical details to the public. They only announced the existence of them. Have you actually read the links you've been posting?
Posted on Reply
#391
ikeke
Neither You or I or anyone but CTS-Labs knows who the details were shared with.

You take their word? Good for you. Thusfar they have less than stellar reputation on being factual.
Posted on Reply
#392
lexluthermiester
ikekeNeither You or I or anyone but CTS-Labs knows who the details were shared with.
It only matters that they did not share it with the general public. You're picking nits again..
ikekeYou take their word? Good for you. Thus far they have less than stellar reputation on being factual.
People make mistakes. It's not the end of the world. Get over it.
Posted on Reply
#393
trparky
OK then, I was wrong. These issues can be fixed and unlike Spectre and Meltdown there's no performance degradation that will be seen when it's fixed.
Posted on Reply
#394
anubis44
lexluthermiesterSo you admit you're biased and unable to be objective. If you'd said that to begin with..
No. I'm not 'admitting' anything. I'm not 'guilty' of something, so admission is the wrong word. I'm merely stating my position on this matter. The fact that I own shares of AMD isn't a source of bias for me in my determination on whether these 'flaws' are a serious problem. I would argue the same thing if somebody had levelled this accusation at Intel-based computers, too.
Posted on Reply
#395
EarthDog
Are you now able to admit they are real at least?
Posted on Reply
#396
John Naylor
As with the Spectre / Meltown scenario, It would be great if at some point we could have a thread focusing on the potential impact of these flaws on users ... Id rather skip having to read thru 100s of brand bashing posts to get any useful information. While it's certainy too early at this point to ascertain the impact of the new Zen flaws, it's been hard to find any instances of actual "typical user" impact of Spectre and Meltdown because of all the "noise".
Posted on Reply
#397
bug
John NaylorAs with the Spectre / Meltown scenario, It would be great if at some point we could have a thread focusing on the potential impact of these flaws on users ... Id rather skip having to read thru 100s of brand bashing posts to get any useful information. While it's certainy too early at this point to ascertain the impact of the new Zen flaws, it's been hard to find any instances of actual "typical user" impact of Spectre and Meltdown because of all the "noise".
All of these require admin rights to exploit.
As a home user, if someone gets into a position to exploit these, you're already royally screwed. But, as CTS Labs have noted, these are more of a danger to organizations where, by phising or other means, someone exploits these to plant almost undetectable malware that can be used to further compromise the organization.
Posted on Reply
#398
lexluthermiester
bugBut, as CTS Labs have noted, these are more of a danger to organizations where, by phising or other means, someone exploits these to plant almost undetectable malware that can be used to further compromise the organization.
Exactly correct. It's a risk that must be taken seriously no matter how difficult it is to accomplish.
anubis44No. I'm not 'admitting' anything.
:kookoo:
Posted on Reply
#399
Veradun
lexluthermiesterExactly correct. It's a risk that must be taken seriously no matter how difficult it is to accomplish.
Yep, correct. If companies are unable to isolate users and they give every employee admin rights on their PCs, well, being exploited is well deserved.
Posted on Reply
#400
las
The danger of these flaws has been exaggerated ALOT.

Spectre and Meltdown are way more serious.
Posted on Reply
Add your own comment
Jan 24th, 2025 01:58 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts