Tuesday, March 13th 2018

13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

Security researchers with Israel-based CTS-Labs, have discovered a thirteen security vulnerabilities for systems based on AMD Zen processors. The thirteen new exploits are broadly classified into four groups based on the similarity in function of the processor that they exploit: "Ryzenfall," "Masterkey," "Fallout," and "Chimera."

The researchers "believe that networks that contain AMD computers are at a considerable risk," and that malware can "survive computer reboots and re-installations of the operating system, while remaining virtually undetectable by most endpoint security solutions," such as antivirus software. They also mention that in their opinion, "the basic nature of some of these vulnerabilities amounts to complete disregard of fundamental security principles. This raises concerning questions regarding security practices, auditing, and quality controls at AMD."
Since this story went up some follow ups were posted:1. "Masterkey": This is an exploit of the Secure Boot feature, which checks if nothing has been tampered with on your machine while it was powered down (i.e. changes in firmware, hardware, or the last software state before shutdown). The Masterkey vulnerability gets around this environment integrity check by using an infected system BIOS, which can be flashed even from within Windows (with administrative privileges). This does not mean that the user has to modify and flash the BIOS manually before becoming vulnerable, the malware can do that on the fly once it is running. Theoretically, Secure Boot should validate the integrity of the BIOS, but apparently this can be bypassed, exploiting bugs in the Secure Processor's metadata parsing. Once the BIOS signature is out of the way, you can put pretty much any ARM Cortex A5 compatible code into the modified BIOS, which will then execute inside the ARM-based Secure Processor - undetectable to any antivirus software running on the main CPU, because the antivirus software running on the CPU has no way to scan inside the Secure Processor.

2. "Ryzenfall" is a class of vulnerabilities targeting Secure Processor, which lets a well-designed malware stash its code into the Secure Processor of a running system, to get executed for the remainder of the system's up-time. Again, this attack requires administrative privileges on the host machine, but can be performed in real-time, on the running system, without modifying the firmware. Secure Processor uses system RAM, in addition to its own in-silicon memory on the processor's die. While this part of memory is fenced off from access by the CPU, bugs exist that can punch holes into that protection. Code running on the Secure Processor has complete access to the system; Microsoft Virtualization-based Security (VBS) can be bypassed and additional malware can be placed into system management storage, where it can't be detected by traditional antivirus software. Windows Defender Credentials Guard, a component that stores and authenticates passwords and other secure functions on the machine, can also be bypassed and the malware can spread over the network to other machines, or the firmware can be modified to exploit "Masterkey", which persists through reboots, undetectable.

3. "Fallout": This class of vulnerabilities affects only AMD EPYC servers. It requires admin privileges like the other exploits, and has similar effects. It enables an attacker to gain access to memory regions like Windows Isolated User Mode / Kernel Mode (VTL1) and Secure Management RAM of the CPU (which are not accessible, even with administrative privileges). Risks are the same as "Ryzenfall", the attack vector is just different.

4. "Chimera": This class of vulnerabilities is an exploitation of the motherboard chipset (e.g. X370 also known as Promontory). AMD outsourced design of their Ryzen chipsets to Taiwanese ASMedia, which is a subsidiary of ASUS. You might know the company from the third-party USB 3.0 and legacy PCI chips on many motherboards. The company has been fined for lax security practices in the past, and numerous issues were found in their earlier controller chips. For the AMD chipset, it looks like they just copy-pasted a lot of code and design, including vulnerabilities. The chipset runs its own code that tells it what to do, and here's the problem: Apparently a backdoor has been implemented that gives any attacker knowing the right passcode full access to the chipset, including arbitrary code execution inside the chipset. This code can now use the system's DMA (direct memory access) engine to read/write system memory, which allows malware injection into the OS. To exploit this attack vector, administrative privileges are required. Whether DMA can access the fenced off memory portions of the Secure Processor, to additionally attack the Secure Processor through this vulnerability, is not fully confirmed, however, the researchers verified it works on a small number of desktop boards. Your keyboard, mouse, network controllers, wired or wireless, are all connected to the chipset, which opens up various other attack mechanisms like keyloggers (that send off their logs by directly accessing the network controller without the CPU/OS ever knowing about these packets), or logging all interesting network traffic, even if its destination is another machine on the same Ethernet segment. As far as we know, the tiny 8-pin serial ROM chip is connected to the CPU on AMD Ryzen platform, not to the chipset or LPCIO controller, so infecting the firmware might not be possible with this approach. A second backdoor was found that is implemented in the physical chip design, so it can't be mitigated by a software update, and the researchers hint at the requirement for a recall.

AMD's Vega GPUs use an implementation of the Secure Processor, too, so it is very likely that Vega is affected in a similar way. An attacker could infect the GPU, and then use DMA to access the rest of the system through the attacks mentioned above.

The researchers have set up the website AMDFlaws.com to chronicle these findings, and to publish detailed whitepapers in the near future.

AMD provided us with the following statement: "We have just received a report from a company called CTS Labs claiming there are potential security vulnerabilities related to certain of our processors. We are actively investigating and analyzing its findings. This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings. At AMD, security is a top priority and we are continually working to ensure the safety of our users as potential new risks arise."

Update March 14 7 AM CET: It seems a lot of readers misunderstand the BIOS flashing part. The requirement is not that the user has to manually flash a different BIOS first before becoming vulnerable. The malware itself will modify/flash the BIOS once it is running on the host system with administrative privileges. Also, the signed driver requirement does not require a driver from any specific vendor. The required driver (which is not for an actual hardware device and just provides low-level hardware access) can be easily created by any hacker. Signing the driver, so Windows accepts it, requires a digital signature which is available from various SSL vendors for a few hundred dollars after a fairly standard verification process (requires a company setup with bank account). Alternatively an already existing signed driver from various hardware utilities could be extracted and used for this purpose.
Source: Many Thanks to Earthdog for the tip
Add your own comment

482 Comments on 13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

#401
bug
lasThe danger of these flaws has been exaggerated ALOT.

Spectre and Meltdown are way more serious.
How so? They may not require admin rights, but still in most cases the data you can sniff will be garbage.
Vulnerabilities are vulnerabilities. Just because you and I can't figure out how to exploit them doesn't make them less dangerous. Patch them and move on.

Also, I wonder who exaggerated these "A LOT" since very few parties actually had a chance to examine them properly. CTS Labs? We've already established they have little credibility, so I wouldn't put much weight on their assessment of how serious these are. And I'm not aware of anyone else saying these were serious flaws.
Posted on Reply
#402
lexluthermiester
bugAnd I'm not aware of anyone else saying these were serious vulnerabilities.
Let's be fair, AMD themselves have said this with their actions.
www.techpowerup.com/242550/initial-amd-technical-assessment-of-cts-labs-research
lexluthermiesterWhen the company effected by these problems commits resources to releasing full bios revisions for said problems, they are automatically qualified as serious.
So AMD themselves have validated them and are taking these vulnerabilities seriously enough to release fixes for them.
Posted on Reply
#403
bug
lexluthermiesterLet's be fair, AMD themselves have said this with their actions.
www.techpowerup.com/242550/initial-amd-technical-assessment-of-cts-labs-research
In case I wasn't clear before, any security vulnerability should be taken seriously. It's just that in this context I haven't understood where the "end of the world is drawing near" assessment came from in the first place. Therefore, I'm not getting the "these aren't as serious as previously thought" reasoning now.

I've been looking at these with the caution any person looks at an unknown quantity. Now that the quantity is known, I/we can relax.
Posted on Reply
#405
hat
Enthusiast
bugIn case I wasn't clear before, any security vulnerability should be taken seriously. It's just that in this context I haven't understood where the "end of the world is drawing near" assessment came from in the first place. Therefore, I'm not getting the "these aren't as serious as previously thought" reasoning now.

I've been looking at these with the caution any person looks at an unknown quantity. Now that the quantity is known, I/we can relax.
You really think so? I agree these flaws would be very hard to actually use, but imagine if somebody managed to pull it off at your bank, or anywhere else where you have sensitive information...
Posted on Reply
#406
ikeke
I dont think organizations with sensitive information should have InfoSec holes that allow for such vulnerabilities to be used, unless bad actor/insider user can deploy them.
Posted on Reply
#407
r9
At first take on CTS Labs I was thinking that provable somebody cough*intel* payed them to do it why else.
But if you think about it this is what they do, and you can't buy exposure like this.
Posted on Reply
#408
bug
r9At first take on CTS Labs I was thinking that provable somebody cough*intel* payed them to do it why else.
But if you think about it this is what they do, and you can't buy exposure like this.
Yes, that's probably why they rushed disclosing all this. Even bad publicity is publicity and CTS Labs went from no-name to world famous. But I really, really hope they don't handle further discoveries like they did.
Posted on Reply
#409
mtcn77
Cambridge Analytica is world famous, too. Guess, this is a good thing?
Posted on Reply
#410
ikeke
I dont think that being in InfoSec/auditing business and having this clusterf*ck in resume will give you any credits in the future.

(oh, we found this issue while looking at this non-related thing, hmm, looks like something that could be sold to stockmarket for quick buck, ta-daaa, profit. Also, we don't know how to inform parties of our findings, hehe, no worries, happens, whoops...)

edit:In another news, Viceroy unmasked.

www.moneyweb.co.za/in-depth/investigations/viceroy-unmasked/

This all stinks to high heaven. They all look to be a front for someone else.
Posted on Reply
#411
bug
ikekeI dont think that being in InfoSec/auditing business and having this clusterf*ck in resume will give you any credits in the future.

(oh, we found this issue while looking at this non-related thing, hmm, looks like something that could be sold to stockmarket for quick buck, ta-daaa, profit. Also, we don't know how to inform parties of our findings, hehe, no worries, happens, whoops...)
Yeah, well, they're into the business of finding issues and they found them. When they'll be in the business of making friends, they'll hire a PR company.
Posted on Reply
#412
ikeke
I don't think they have anything to do with the original findings. This looks more and more like an orchestrated stunt by someone else.
Posted on Reply
#413
Veradun
bugYeah, well, they're into the business of finding issues and they found them. When they'll be in the business of making friends, they'll hire a PR company.
The funny part is they hired one.
Posted on Reply
#414
bug
ikekeI don't think they have anything to do with the original findings. This looks more and more like an orchestrated stunt by someone else.
Do you have anything to back that up, other than "you don't think"?
Posted on Reply
#415
ikeke
Nope, just the looks of it and available information about involved parties, it stinks.
Posted on Reply
#417
EarthDog
Zzzzzzzzz*snore*zzzzzzzzzzzzz

Will someone tag me when conclusive info comes out intel was behind this, please? Much appreciated (not expecting a notification either). We all know everything around the very real and blown out of proportion security flaws sucked. But until something conclusive comes out about intel, this is all a rehash of day 1...400+ posts ago. Boooooooring.
Posted on Reply
#418
ikeke
lexluthermiesterCredible citation that is not. Looks like a hit-piece and a rather flimsy one. FUD, plain and simple.
y u troll?

This sheds some light onto Viceroy who were the first to react, and like CTSLabs they look to be amateurs who push information without credentials for analysis they claim to have done themselves.
Posted on Reply
#419
bug
ikekey u troll?

This sheds some light onto Viceroy who were the first to react, and like CTSLabs they look to be amateurs who push information without credentials for analysis they claim to have done themselves.
Well, you also push the claim CTS Labs did not uncover the vulnerabilities without evidence. What does that tell us?

Also, of your 150+ posts here, only 5 or so are not on this or the "CTS-Labs Posts Ryzen Windows Credential Guard Bypass Proof-of-concept Video" thread. If I were you, I'd stay away from trolling references.
Posted on Reply
#420
ikeke
So?

Only those who wrote certain amount of posts over certain threads have the right to express their thoughts? :/

OK.

And btw, which part of my thoughts on this specific topic would fall into trolling category?

In Internet slang, a troll (/troʊl, trɒl/) is a person who sows discord on the Internet by starting quarrels or upsetting people, by posting inflammatory,[1] extraneous, or off-topic messages in an online community (such as a newsgroup, forum, chat room, or blog) with the intent of provoking readers into an emotional response[2] or of otherwise disrupting normal, on-topic discussion,[3]often for the troll's amusement
Posted on Reply
#421
lexluthermiester
bugAlso, of your 150+ posts here, only 5 or so are not on this or the "CTS-Labs Posts Ryzen Windows Credential Guard Bypass Proof-of-concept Video" thread.
@ikeke
I've made a similar observation. You seem to be deliberately posting FUD comments. And we've been over this next one, lack of objectivity. You seem hell bent on smearing CTS who's claims have been proven to have merit, by AMD themselves. Your actions here seem to clearly show that you are acting with an agenda in a troll like fashion. The only thing that is making your comments tolerable, for me at least, is that you seem to be conducting yourself in a mostly civilized manner.
Posted on Reply
#422
ikeke
lexluthermiesterYou seem hell bent on smearing CTS who's claims have been proven to have merit, by AMD themselves.
CTSLabs assessment of the issues impact/scope has been overturned by independent reviewer they themselves hired. Amd assessment for fixes availability was estimated as weeks-to-month.

And they (CTSLabs) stopped broadcasting, silence speaks volumes in this case.
Posted on Reply
#423
lexluthermiester
ikekeCTSLabs assessment of the issues impact/scope has been overturned by independent reviewer they themselves hired. Amd assessment for fixes availability was estimated as weeks-to-month. And they (CTSLabs) stopped broadcasting, silence speaks volumes in this case.
This is a perfect example of your FUD and dancing around the facts. AMD has confirmed the findings of CTS. They downplayed it a bit, naturally, but they confirmed it all none-the-less.
You also danced completely around the other points made without confirmation or denial.

Seriously, you're not and haven't added anything of value to the conversation. Let it go.
Posted on Reply
#424
EarthDog
ikekeAnd they (CTSLabs) stopped broadcasting, silence speaks volumes in this case.
What are they supposed to be saying during this time?

They gave their information out (in the most questionable manner possible), AMD confirmed all the issues are real and will be fixing it in 'weeks not months'. CTS replied to that and said they don't believe it will take weeks, but months (part of what they said initially). Only time will tell who is right on this. As I said before, this is just rehashing what we already know. Nothing new... Zzzzzzzzzzzzzzzzzzzzzzz*snore*zzzzzzzzzzzzzz wait wut? Nothing new? Zzzzzzzzzzzzzzzzzz*snore*zzzzzzzzzzzzzzzzzzz.

Anyway, AMD responded about 2 weeks ago right? We'll expect to see some roll outs soon if they are correct.


Unsubscribing to this spinning amusement park ride... someone tag me when..........................

1. Intel is PROVEN CONCLUSIVELY to be behind this...
2. When AMD fixes everything.


mmmmmmmmmmmmmkay?
Posted on Reply
#425
ikeke
Sigh.
@EarthDog
Where. In. Any. Of. My. Posts. Have. I. Said. Intel?
@lexluthermiester
And AMD confirmed the vulnerabilities, where have I argued that. You, though, conveniently dance around the issues of impact assessment. Which, in case of vulnerabilities is quite important, well actually the most important. CTSLabs failed spectacularly in theirs.

Tinfoil hats and trolling, guys.
Posted on Reply
Add your own comment
Feb 3rd, 2025 03:34 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts