Tuesday, March 13th 2018

13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

Security researchers with Israel-based CTS-Labs, have discovered a thirteen security vulnerabilities for systems based on AMD Zen processors. The thirteen new exploits are broadly classified into four groups based on the similarity in function of the processor that they exploit: "Ryzenfall," "Masterkey," "Fallout," and "Chimera."

The researchers "believe that networks that contain AMD computers are at a considerable risk," and that malware can "survive computer reboots and re-installations of the operating system, while remaining virtually undetectable by most endpoint security solutions," such as antivirus software. They also mention that in their opinion, "the basic nature of some of these vulnerabilities amounts to complete disregard of fundamental security principles. This raises concerning questions regarding security practices, auditing, and quality controls at AMD."
Since this story went up some follow ups were posted:1. "Masterkey": This is an exploit of the Secure Boot feature, which checks if nothing has been tampered with on your machine while it was powered down (i.e. changes in firmware, hardware, or the last software state before shutdown). The Masterkey vulnerability gets around this environment integrity check by using an infected system BIOS, which can be flashed even from within Windows (with administrative privileges). This does not mean that the user has to modify and flash the BIOS manually before becoming vulnerable, the malware can do that on the fly once it is running. Theoretically, Secure Boot should validate the integrity of the BIOS, but apparently this can be bypassed, exploiting bugs in the Secure Processor's metadata parsing. Once the BIOS signature is out of the way, you can put pretty much any ARM Cortex A5 compatible code into the modified BIOS, which will then execute inside the ARM-based Secure Processor - undetectable to any antivirus software running on the main CPU, because the antivirus software running on the CPU has no way to scan inside the Secure Processor.

2. "Ryzenfall" is a class of vulnerabilities targeting Secure Processor, which lets a well-designed malware stash its code into the Secure Processor of a running system, to get executed for the remainder of the system's up-time. Again, this attack requires administrative privileges on the host machine, but can be performed in real-time, on the running system, without modifying the firmware. Secure Processor uses system RAM, in addition to its own in-silicon memory on the processor's die. While this part of memory is fenced off from access by the CPU, bugs exist that can punch holes into that protection. Code running on the Secure Processor has complete access to the system; Microsoft Virtualization-based Security (VBS) can be bypassed and additional malware can be placed into system management storage, where it can't be detected by traditional antivirus software. Windows Defender Credentials Guard, a component that stores and authenticates passwords and other secure functions on the machine, can also be bypassed and the malware can spread over the network to other machines, or the firmware can be modified to exploit "Masterkey", which persists through reboots, undetectable.

3. "Fallout": This class of vulnerabilities affects only AMD EPYC servers. It requires admin privileges like the other exploits, and has similar effects. It enables an attacker to gain access to memory regions like Windows Isolated User Mode / Kernel Mode (VTL1) and Secure Management RAM of the CPU (which are not accessible, even with administrative privileges). Risks are the same as "Ryzenfall", the attack vector is just different.

4. "Chimera": This class of vulnerabilities is an exploitation of the motherboard chipset (e.g. X370 also known as Promontory). AMD outsourced design of their Ryzen chipsets to Taiwanese ASMedia, which is a subsidiary of ASUS. You might know the company from the third-party USB 3.0 and legacy PCI chips on many motherboards. The company has been fined for lax security practices in the past, and numerous issues were found in their earlier controller chips. For the AMD chipset, it looks like they just copy-pasted a lot of code and design, including vulnerabilities. The chipset runs its own code that tells it what to do, and here's the problem: Apparently a backdoor has been implemented that gives any attacker knowing the right passcode full access to the chipset, including arbitrary code execution inside the chipset. This code can now use the system's DMA (direct memory access) engine to read/write system memory, which allows malware injection into the OS. To exploit this attack vector, administrative privileges are required. Whether DMA can access the fenced off memory portions of the Secure Processor, to additionally attack the Secure Processor through this vulnerability, is not fully confirmed, however, the researchers verified it works on a small number of desktop boards. Your keyboard, mouse, network controllers, wired or wireless, are all connected to the chipset, which opens up various other attack mechanisms like keyloggers (that send off their logs by directly accessing the network controller without the CPU/OS ever knowing about these packets), or logging all interesting network traffic, even if its destination is another machine on the same Ethernet segment. As far as we know, the tiny 8-pin serial ROM chip is connected to the CPU on AMD Ryzen platform, not to the chipset or LPCIO controller, so infecting the firmware might not be possible with this approach. A second backdoor was found that is implemented in the physical chip design, so it can't be mitigated by a software update, and the researchers hint at the requirement for a recall.

AMD's Vega GPUs use an implementation of the Secure Processor, too, so it is very likely that Vega is affected in a similar way. An attacker could infect the GPU, and then use DMA to access the rest of the system through the attacks mentioned above.

The researchers have set up the website AMDFlaws.com to chronicle these findings, and to publish detailed whitepapers in the near future.

AMD provided us with the following statement: "We have just received a report from a company called CTS Labs claiming there are potential security vulnerabilities related to certain of our processors. We are actively investigating and analyzing its findings. This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings. At AMD, security is a top priority and we are continually working to ensure the safety of our users as potential new risks arise."

Update March 14 7 AM CET: It seems a lot of readers misunderstand the BIOS flashing part. The requirement is not that the user has to manually flash a different BIOS first before becoming vulnerable. The malware itself will modify/flash the BIOS once it is running on the host system with administrative privileges. Also, the signed driver requirement does not require a driver from any specific vendor. The required driver (which is not for an actual hardware device and just provides low-level hardware access) can be easily created by any hacker. Signing the driver, so Windows accepts it, requires a digital signature which is available from various SSL vendors for a few hundred dollars after a fairly standard verification process (requires a company setup with bank account). Alternatively an already existing signed driver from various hardware utilities could be extracted and used for this purpose.
Source: Many Thanks to Earthdog for the tip
Add your own comment

482 Comments on 13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

#151
lexluthermiester
windwhirlWhat if you could take advantage of a vulnerability in Microsoft IIS or Apache, for example, that gave you admin or SYSTEM level access, and from there go and install the rigged BIOS or whatever you wanted with the OS still in memory?
Oh, that might work. You'd need to both know about such a vulnerability and be sure it hasn't been patched.
Posted on Reply
#152
phill
It's got to be true, it's on the internet... I read that somewhere....

As always, lets see what comes of it....
Posted on Reply
#153
lexluthermiester
AquinusThe fact that AMD wasn't contacted by said security company seems fishy to me considering even with Spectre and Meltdown that Google made sure to contact all parties
But that's the point, this isn't Google. It's a new no-name company trying to make a name for itself and wow the world with it's "mad skillz". Whether or not the company's motivations are dubious does not change the seriousness of the information provided nor the practical and responsible research that must go into verifying and fixing vulnerabilities.
Posted on Reply
#155
Vya Domus
ArbitraryAffectionNothing to see here.
There is , actually. Because it failed miserably. :laugh:
Posted on Reply
#156
1stn00b
And to exploit all of this vulnerabilities u just need :

1. Physical access to the PC
2. Flash a BIOS with injected malware
3. Have Admin account on that PC

SO EZ : >
Posted on Reply
#157
Space Lynx
Astronaut
Vya DomusThere is , actually. Because it failed miserably. :laugh:
Wish I could downvote this, and upvote @1stn00b twice.
Posted on Reply
#158
Vya Domus
lynx29Wish I could downvote this
I am deeply saddened by your remark.
Posted on Reply
#159
thesmokingman
ArbitraryAffectionSome Anti-AMD stock-manipulation BS. Nothing to see here.
Apparently some are eating this up and giddily.
Posted on Reply
#160
windwhirl
thesmokingmanApparently some are eating this up and giddily.
You know, if I didn't care about this potential security problem, and this were a "real-life forum", brick and mortar and all that, I'd totally get me some popcorn and enjoy seeing the fights between AMD-fans, Intel-fans, skeptical people, paranoid people and everyone else. From a safe distance, of course. Maybe set a betting pool too :laugh:
Posted on Reply
#161
wow&wow
No address, no land line, 4 persons in Isral set up in 2017 (after Intel's "Meltdown inside" in June), ..., but just a website ($4.95/month) and a mobile number +1-585-233-0321!

"For the attacks to work, an attacker must first obtain administrator access to a targeted network, Guido said."

For the car thief to steal the car, the car thief must first obtain the car key and access to the car, CommonSense said.
Posted on Reply
#162
EntropyZ
This is so funny. These have little meaning until the exploits can be duplicated plus verified and the vulnerability can be used remotely.

People are making new accounts just to jump in on the fun.

Someone is just mad because AMD is ballin' in desktop/workstation and server. Let the games begin.
Posted on Reply
#163
Jism
windwhirlI've been considering that maybe you could bypass getting physical access and stolen credentials. What if you could take advantage of a vulnerability in Microsoft IIS or Apache, for example, that gave you admin or SYSTEM level access, and from there go and install the rigged BIOS or whatever you wanted with the OS still in memory? Then you could erase all trace of what you did at OS level and do your evil things without anyone taking notice, once the machine reboots. If the attack has a very specific target and people behind it were skilled enough, then there could be other ways to get in and it could be easier for them to do so.

However, I agree that it would be really hard to pull off successfully without physical access in most cases.
It is possible. There are enough servers with outdated configuration and / or software hooked on the net. But for a succesfull bios update you need to restart the system. This will look very odd a server rebooting out of nowhere. Once that happend the payload could be triggered again and you could take over the complete system. Thus with any credentials that might apply on the machine. But this should trigger any admin in the first place, that something is going on.

There are several approaches to a succesfull attack. One of m might simply stick a USB drive into a running server and exploit it's chipset by a handwritten program. Upload your payload and good to go. But even if you 'hack' apache, your still a user, and a user compared to root has different priveledges. None of them as close to flashing a bios lol.
Posted on Reply
#164
Vya Domus
EntropyZThis is so funny. These have little meaning until the exploits can be duplicated and verified and the vulnerability can be used remotely.

People are making new accounts just to jump in on the fun.
More fascinating are the highly technical discussions and debates about said vulnerabilities. The world is full of security experts , no wonder CTS-Labs managed to get their hands on such talents.
Posted on Reply
#165
phanbuey
1stn00bAnd to exploit all of this vulnerabilities u just need :

1. Physical access to the PC
2. Flash a BIOS with injected malware
3. Have Admin account on that PC

SO EZ : >
In other news: Home security panels vulnerable to burglars, once they break into the house and befriend the family dog.
Posted on Reply
#166
thesmokingman
windwhirlYou know, if I didn't care about this potential security problem, and this were a "real-life forum", brick and mortar and all that, I'd totally get me some popcorn and enjoy seeing the fights between AMD-fans, Intel-fans, skeptical people, paranoid people and everyone else. From a safe distance, of course. Maybe set a betting pool too :laugh:
So you're really concerned right? No BS? Take a guess how many articles based their news on these findings?
New York-based cyber security firm Trail of Bits told Reuters that it had verified the findings from CTS, which paid $16,000 for a review of the AMD vulnerabilities.

For the attacks to work, an attacker must first obtain administrator access to a targeted network, Guido said.
www.reuters.com/article/us-cyber-amd/after-short-selling-surge-israeli-firm-says-it-finds-amd-chip-flaw-idUSKCN1GP273
phanbueyIn other news: Home security panels vulnerable to burglars, once they break into the house and befriend the family dog.
Exactly lol!
Posted on Reply
#167
B-Real
CrAsHnBuRnXpTake THAT AMD. I dont wanna hear the fanbois anymore.
Before you say anything, have you seen this?


Or have you checked the YT channel comments are disabled? And the domain name amdflaws.com? :D Correct company. :D Ridiculous really. A sue is on the way for sure. BTW, your next comment made it clear that you are an Intel tard.
trparkyThis has the potential to be even worse than Spectre and Meltdown.
Yes, definitely. :D LOL
bugIt's so funny seeing AMD aficionados going in defense mode :p
No need for that, as this is a complete BS. Wake up and you will see. :)
Posted on Reply
#168
thesmokingman
:roll::roll::roll:

^^Hey I recognize those 3 employees now.

Posted on Reply
#169
Vya Domus
B-RealBefore you say anything, have you seen this?


Or did you check the YT channel comments are disabled? Correct company. :D
Oh come on , don't be so mean. They mean 16 years of experience as in what their brilliant employees have.
Posted on Reply
#170
B-Real
Vya DomusOh come on , don't be so mean. They mean 16 years of experience as in what their brilliant employees have.
Yeppp, just thought that ^^
Posted on Reply
#171
CrAsHnBuRnXp
B-RealBefore you say anything, have you seen this?
Should I? Im not a researcher
Posted on Reply
#172
thesmokingman
Vya DomusOh come on , don't be so mean. They mean 16 years of experience as in what their brilliant employees have.
They implied their company as an entity, not the combined xp of their staff.
Posted on Reply
#173
Divide Overflow
I've just heard that if someone had my car keys and access to my car, they could change the memory positions for my driver's seat! This is an outrage! Where's the whitepaper on this critical exploit?!
Posted on Reply
#174
windwhirl
JismIt is possible. There are enough servers with outdated configuration and / or software hooked on the net. But for a succesfull bios update you need to restart the system. This will look very odd a server rebooting out of nowhere. Once that happend the payload could be triggered again and you could take over the complete system. Thus with any credentials that might apply on the machine. But this should trigger any admin in the first place, that something is going on.

There are several approaches to a succesfull attack. One of m might simply stick a USB drive into a running server and exploit it's chipset by a handwritten program. Upload your payload and good to go. But even if you 'hack' apache, your still a user, and a user compared to root has different priveledges. None of them as close to flashing a bios lol.
Yeah, but two things:
1 - I don't know how server motherboards work, but some desktop ones allow you to update the BIOS/UEFI from within Windows. So, maybe you could do the same on some servers? And would it be mandatory to restart immediately? If not, you could wait until the next scheduled restart, with none the wiser.
2 - Privilege-escalation bugs are common in Windows (every month they fix one of those, at least) and Linux has some too (though I don't know if they are as common as their Windows-counterparts). If patches are not applied, someone could just chain a few exploits together and get in.

However, such an outcome may be avoided, at least for a short time, if the system is inside a VM.
Posted on Reply
#175
thesmokingman
CrAsHnBuRnXpAn

And your insinuation is?
Oh the excruciating irony escapes you!
Posted on Reply
Add your own comment
Jan 23rd, 2025 22:47 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts