Wednesday, March 14th 2018

CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code

CTS Labs, the Israel-based IT security research company behind Tuesday's explosive AMD Ryzen security vulnerabilities report, responded to questions posed by TechPowerUp. One of the biggest of these, which is also on the minds of skeptics, is the ominous lack of proof-of-concept code or binaries being part of their initial public report (in contrast to the Meltdown/Spectre reports that went into technical details about the exploit). CTS Labs stated to TechPowerUp that it has sent AMD, along with other big tech companies a "complete research package," which includes "full technical write-ups about the vulnerabilities," "functional proof-of-concept exploit code," and "instructions on how to reproduce each vulnerability." It stated that besides AMD, the research package was sent to Microsoft, HP, Dell, Symantec, FireEye, and Cisco Systems, to help them develop patches and mitigation.

An unwritten yet generally accepted practice in the IT security industry upon discovery of such vulnerabilities, is for researchers to give companies in question at least 90 days to design a software patch, harden infrastructure, or implement other mitigation. 90 days is in stark contrast to the 24 hours AMD got from CTS Labs. CTS Labs confirmed to TechPowerUp that it indeed shared its research package with AMD (and the other companies) just 24 hours prior to making its report public, but urged those disgruntled with this decision to look at the situation objectively. "If you look at the situation in the following way: right now the public knows about the vulnerabilities and their implications, AMD is fully informed and developing patches, and major security companies are also informed and working on mitigation."
This is in contrast to the unintentional consequence of keeping Meltdown/Spectre away from the public domain for over half a year, allowing Intel's senior executives to dump company stock, and for big cloud computing providers to harden their infrastructure, giving themselves a competitive advantage over smaller providers. But unlike with Meltdown/Spectre, these vulnerabilities aren't industry-wide (i.e. they don't affect Intel), placing AMD at a disadvantage in both the stock markets, and in the retail markets.

CTS Labs, through the sequence of its actions, has attempted to shift the burden of proof from itself to AMD, which is extremely uncommon in the IT security industry. With the lack of proof-of-concept of these vulnerabilities in the public domain, an environment of fear, uncertainty, and doubt (FUD) is being developed, with AMD being occupied with testing its chips for these vulnerabilities, and still far away from releasing patches, if the vulnerabilities are real. This places anyone with a shorting position against AMD stock at a distinct advantage. The strategy of AMD investor relations and corporate communications should now be to allay many of those fears among people without access to the proof-of-concept, and to ask investors to refrain from giving in to FUD.
Add your own comment

93 Comments on CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code

#26
Kaotik
FleuriousAlso, regardless of their excuse, 24hrs notice before going public was a stupid decision.
Yes and no, it was the only way they could get real attention and affect AMD stocks with this (in cooperation with Viceroy Research), since any other approach would have led to the industry and other security firms ripping this P.O.S. apart
Posted on Reply
#28
Chaitanya
KaotikYes, but you still need to get that admin access to do the BIOS update/modification and at that point your system is already compromised, no matter whose CPU or chipset or whatever is in there. Also, since they blame it on American Megatrends making things easy, it should apply to any system with their BIOS?
Blaming asmedia as well. Language used in the so called whitepaper is quite scathing. They might be going under soon with bunch of lawsuits.
Posted on Reply
#29
Kaotik
ChaitanyaBlaming asmedia as well. Language used in the so called whitepaper is quite scathing. They might be going under soon with bunch of lawsuits.
Pretty sure the company was founded to be a scapegoat for Viceroy Researchs shorting practices, so they're not probably too worried about that
Posted on Reply
#30
Shihab
RejZoRStill, when you have admin access, does it really matter at that point anymore?
newtekie1How do you think pretty much all other malware infects systems? How do you think ransomware works? I'll give you a hint: Admin Level Code.
Privilege elevation exploits.
And that's assuming such tricks were needed. Malware that rely on admin/root privs can be less of a worry for enterprise machines maintained by an IT dept who know their job, but your average joe and jane would click the yes on the UAC prompt before the background finishes dimming.
UAC itself wasn't particularly that resilient, if I remembered correctly.
Posted on Reply
#31
FordGT90Concept
"I go fast!1!11!1!"
btarunr...but urged those disgruntled with this decision to look at the situation objectively. "If you look at the situation in the following way: right now the public knows about the vulnerabilities and their implications, AMD is fully informed and developing patches, and major security companies are also informed and working on mitigation."
AMD has to rush to fix it as hackers rush to exploit it. Not a good situation. And yes, that's the objective look at it.

Looking at the broader picture "objectively": NVIDIA and AMD don't have a presence in Israel, Intel has a significant presence in Israel.
Posted on Reply
#32
Prince Valiant
This is in contrast to the unintentional consequence of keeping Meltdown/Spectre away from the public domain for over half a year, allowing Intel's senior executives to dump company stock, and for big cloud computing providers to harden their infrastructure, giving themselves a competitive advantage over smaller providers. But unlike with Meltdown/Spectre, these vulnerabilities aren't industry-wide (i.e. they don't affect Intel), placing AMD at a disadvantage in both the stock markets, and in the retail markets.
I'd rather let a few executives distance themselves than potentially seeing a company get ruined by a dubious claim.
Posted on Reply
#33
OneMoar
There is Always Moar
I don't know that it stinks of intel but it sure does stink of amature stupidity and agenda (not that those are mutually exclusive )
Posted on Reply
#35
FordGT90Concept
"I go fast!1!11!1!"
It could totally be a company created with Intel funding to disseminate vulnerabilities found in their competitors' hardware. Just look at how the last two days panned out and the language on their website: everything was orchestrated to inflict maximum damage on AMD for financial gain.
Posted on Reply
#36
srsbsns
W1zzardPhysical access is not required, just admin privileges
The real vulnerability right there. What if I told you there is a vulnerability in the wild that allows anyone to do anything to a system no matter the OS. Its called the login/password.


Are these really vulnerabilities ? If I have admin credentials I can flash the bios of my video card. Does that make my video card vulnerable?
Posted on Reply
#37
john_
I think we have a little fire here with too much smoke. There where many vulnerabilities in Intel's Management Engine lately, but I haven't seen anyone coming out and saying that Intel's valuation is $0. Even after Meltdown and Spectre. Maybe Intel started this project "Find vulnerabilities in AMD software" secretly and then co operated with Viceroy (Intel executives making money throught stock market manipulation? I am probably wrong here! ) to make the biggest possibly impact with whatever they would find, with the help of both tech and financial press. I think this kind of attacks between companies could become more often in the future.
Posted on Reply
#38
Vya Domus
Yep , they sent out detailed technical papers to major companies making sure the mission critical systems these companies sell are in total safety.

...and also to this bloke a week prior : twitter.com/dguido

"I initially responded to their request out of curiosity -- "Hey, do you want to see our new processor bugs before we release them?" "hell yes I do" -- but after their asks continued to grow billed them our week rate for the work."

:laugh:
Posted on Reply
#39
etayorius
These guys seem to have done this in very bad faith to hurt AMD. They even claim AMD should file for bankruptcy. It speaks a lot about their agenda.
Posted on Reply
#40
RejZoR
W1zzardPhysical access and admin access are two vastly different things. Every malware gets onto PCs through admin access, tons of computers get infected every day, so this is not a non-issue.
The difference here is that the malware can be hidden in a way that's undetectable from security software and persists through reboot, and OS reinstall, which means "buy a new computer" for 99% of the population.


No
That's not true entirely and given you're a programmer, you probably know this. Malware gets on PC via actual vulnerability/exploit, usually via privilege escalation exploitation. Meaning you basically force malware into secured system without admin rights by giving it more rights "unofficially" via a security hole/flaw. Once you do that, you're basically on the same security level as people managing those systems officially. And when you have that kind of access, you can install things on system the normal way and chances are, in 99% of cases, no one would notice anything. You don't even need a flawed CPU or anything else. It's very likely you could actually leave an entry in programs and Features panel and admins probably wouldn't notice it.
Posted on Reply
#41
OneMoar
There is Always Moar
on the upside nobody will ever work with these guys ever again*
and there careers are officially over

*assuming AMD doesn't sue them into the ground first
Posted on Reply
#42
W1zzard
RejZoRusually via privilege escalation exploitation
I would say "usually" it's people just clicking "accept" in the UAC prompt because they want whatever they downloaded to run?
RejZoRand chances are, in 99% of cases, no one would notice anything.
How do antivirus companies make billions then? Your point is a fair one though, if the malware doesn't do anything that hurts me, then why bother protecting or fighting against it? Technically not "mal"ware then anymore :)
xkm1948some other tech news such as GamerNexus point out those so called security claims can be executed to ANY machine.
Not sure what you are talking about, but are you saying they claim that you can execute attacks against the AMD Secure Processor on systems that don't have an AMD Secure Processor?
Posted on Reply
#43
OneMoar
There is Always Moar
this whole thing is barely deserving of a 'several bugs found in amd chipset firmware'
and honestly my opinion is if these clowns can find it then its probably already been in the wild for awhile

these guys are security researchers like 12 year olds, on a gokart at the daytona 500 pretending are racecar drivers
Posted on Reply
#44
the54thvoid
Super Intoxicated Moderator
W1zzardNot sure what you are talking about, but are you saying they claim that you can execute attacks against the AMD Secure Processor on systems that don't have an AMD Secure Processor?
I think the inference is more along the line that to be open to attack, you need to have gained those admin rights. Point being, any malware that has admin rights can pretty much ruin your system. The fact AMD has the Secure Processor flaws according to CTS Labs, is redundant when you need to first exploit the PC in the first place. That exploit, in itself means the PC has been severely compromised. From that point of view, with admin rights, I can flash a bios anyway. I can wipe data, format drives etc etc etc. These AMD specific security flaws require you to 'hand the keys over' to the initial exploit. Therefore, the attack vector required to initiate these flaws is the problem, not the flaws.
I think ANY CPU is vulnerbale to a host of problems once admin right is exploited and those exploits precede the CTS-Lab claims.
Posted on Reply
#45
Vya Domus
xkm1948I am starting to question whether several tech sites that are so eagerly promoting these stories received any incentives for doing so. This is beyond just click bait titles.
Oh come on , don't look so surprised. Everyone will write about every single turd they'll find that has anything to do with something popular. Not that I blame them , that's their job.
Posted on Reply
#46
Kaotik
W1zzardNot sure what you are talking about, but are you saying they claim that you can execute attacks against the AMD Secure Processor on systems that don't have an AMD Secure Processor?
I think he's saying that when you have admin privileges on a system it doesn't matter what CPU or whatever is inside, you have pretty much free hands to do anything regardless, be it AMD Secure Processor, Intel ME or whatever. When someone gets root access, you're already compromised.
Posted on Reply
#47
EarthDog
This was mentioned in the first article already, their sending them the code...

...curious why that tidbit made another news post personally.
xkm1948I am starting to question whether several tech sites that are so eagerly promoting these stories received any incentives for doing so. This is beyond just click bait titles. TPU's Facebook account is even worse. Paid to promote agenda?

Come on, deliberately ignoring their white paper said they have potential "financial interest in said company" Also ignoring that multiple users, as well as some other tech news such as GamerNexus point out those so called security claims can be executed to ANY machine.

My BS meter is ticking to the max.
I think a fundamental lack of knowledge is the biggest issue with tech sites, and especially members (me included). I mean I see people here and everywhere who can't troubleshoot their way out of a wet paper bag suddenly has all the answers here??? LULZ.

Also, delivery of the message on several tech sites was abhorrent. Many sites would rather get clicks than to take a bit of time and investigate. I don't think anyone was paid to do so. But it is a bit telling that the amdflaws website has listed several tech sites and each and every one, was direct about the issue being real not once questioning the validity of it. In the other shitstorm thread, I linked a more sourced and measured take in hopes to bring reason to the insanity that set in.
Vya DomusOh come on , don't look so surprised. Everyone will write about every single turd they'll find that has anything to do with something popular. Not that I blame them , that's their job.
There is something, scratch that, A LOT to be said for journalistic integrity...
Posted on Reply
#48
OneMoar
There is Always Moar
I am out can we stop giving this train wreck anymore coverage now
Posted on Reply
#49
dorsetknob
"YOUR RMA REQUEST IS CON-REFUSED"
Intel Bean Counter Office Meeting
1st Bean Counter " Hey I Have an Idea on Making some Money"
Rest of Team " tell us then"
1st Bean Counter " We Get our People in an Associated security Company to Release a Story about a bunch of AMD CPU Vulnerability's and watch their Stock Price Drop like a stone when its low we buy and then sell when it recovers as we know it will.
Rest of team shout "Great plan lets do it "
then a lone Voice Squeeks from the Back of the room

"Is that not Insider Trading ???"

"Definitely Not says" 1st Bean Counter
"Its Not our Stock and so its not Insider trading" >>>>>:):):)
Posted on Reply
#50
dicktracy
OneMoarI am out can we stop giving this train wreck anymore coverage now
The AMD defense force doesn’t have a single evidence to debunk their findings. It may be fake it may be real. But let’s hide this because it hurts mah favorite brand.
Posted on Reply
Add your own comment
Dec 22nd, 2024 08:58 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts