Monday, May 17th 2021

Two New Security Vulnerabilities to Affect AMD EPYC Processors

AMD processors have been very good at the field of security, on par with its main competitor, Intel. However, from time to time, researchers find new ways of exploiting a security layer and making it vulnerable to all kinds of attacks. Today, we have information that two new research papers are being published at this year's 15th IEEE Workshop on Offensive Technologies (WOOT'21) happening on May 27th. Both papers are impacting AMD processor security, specifically, they show how AMD's Secure Encrypted Virtualization (SEV) is compromised. Researchers from the Technical University of Munich and the University of Lübeck are going to present their papers on CVE-2020-12967 and CVE-2021-26311, respectfully.

While we do not know exact details of these vulnerabilities until papers are presented, we know exactly which processors are affected. As SEV is an enterprise feature, AMD's EPYC lineup is the main target of these two new exploits. AMD says that affected processors are all of the EPYC embedded CPUs and the first, second, and third generation of regular EPYC processors. For third-generation EPYC CPUs, AMD has provided mitigation in SEV-SNP, which can be enabled. For prior generations, the solution is to follow best security practices and try to avoid an exploit.
AMD EPYC Processor
Source: AMD Security
Add your own comment

39 Comments on Two New Security Vulnerabilities to Affect AMD EPYC Processors

#26
1d10t
mtcn77Don't take his snarks personal. In some sense he is right, there is no vulnerability unless we know it...
I never took seriously what was on the internet, especially on open forum :p
Previously we had a discussion with similar topic, point is that security vulnerabilities are important even if they are only "case studies", so that we can decide to disable certain features to minimize impact.
Posted on Reply
#27
lexluthermiester
mtcn77Don't take his snarks personal.
Irony...
1d10tOh, so you're implying that my post are redundant.
More or less. Nothing personal.
Posted on Reply
#28
DeathtoGnomes
lexluthermiesterUnless you're a high profile target, you still have almost completely nothing to worry about.
Absolutely right, but the tinfoil hat comment implies that there is wider spread conspiracy theory that targets everyone buying the chips. :p
1d10twe can decide to disable certain features to minimize impact.
this still assumes there is an active issue to take precautionary measures. if there is no actual problem no protective steps are needed. acting on theories is a waste of time.
Posted on Reply
#29
mtcn77
DeathtoGnomesthis still assumes there is an active issue to take precautionary measures. if there is no actual problem no protective steps are needed. acting on theories is a waste of time.
Yeah, why is security important when the criminals aren't going to gain access to your computer...
lexluthermiesterIrony...
Puns are not ironic, they are on point.
Posted on Reply
#30
zlobby
GeorgeJrI love that 1st sentence.
:D :D :D
Posted on Reply
#31
1d10t
DeathtoGnomesthis still assumes there is an active issue to take precautionary measures. if there is no actual problem no protective steps are needed. acting on theories is a waste of time.
"Security is as good as its weakest point". Barring the door for fear burglar breaking into your home may sound paranoid, but if you do it after theft, you probably shouldn't because there's nothing left. Just a matter of perspective.
Posted on Reply
#33
Imsochobo
CammSomewhat significant, but if you have to compromise the Hypervisor to do it, its really only of concern when running in public cloud and you don't trust the vendor running it to secure the hypervisor.
and it's a feature that is new with 2nd or 3rd gen epyc cpu's, did not exist prior to it.
Intel doesn't have it, or maybe icelake-x brought it, either way it's really fresh so we were mostly fine before, but as said it's a selling point for cloud vendors "we cannot snoop anymore" or wait, we can by using these cve's.

time will tell, but this should tell people what it's about
Posted on Reply
#34
voltage
well, I suppose if arm and intel can have vulnerability, why not amd. join in the fun amd!
Posted on Reply
#35
Makaveli
Since all 3 generations use the same socket, this will be a good way to get them to upgrade to a Milan chip so they can enable SEV-SNP.
Posted on Reply
#36
Tardian
voltagewell, I suppose if arm and intel can have vulnerability, why not amd. join in the fun amd!
fun: fugged up nightmare?
Posted on Reply
#37
DeathtoGnomes
1d10t"Security is as good as its weakest point". Barring the door for fear burglar breaking into your home may sound paranoid, but if you do it after theft, you probably shouldn't because there's nothing left. Just a matter of perspective.
True enough, you cant fix something if you dont know what to look for, so the process waits on the white paper.
mtcn77Yeah, why is security important when the criminals aren't going to gain access to your computer..
this is out of context of what I was replying to.
Posted on Reply
#38
z1n0x
BorisDGNow since AMD are catching up with market share, I won't be surprised if they ended having more vulnerabilities than Intel. LUL
MakaveliSince all 3 generations use the same socket, this will be a good way to get them to upgrade to a Milan chip so they can enable SEV-SNP.
These vulnerabilities are quite profitable. ;)
Posted on Reply
#39
Redwoodz
I'm just here to say the first sentence is not only misleading it is patently FALSE. Amazed this is still going on from a supposed professional site.

The truth
"The exploits mentioned in both papers require a malicious administrator to have access in order to compromise the server hypervisor."
So you need admin priv to make system insecure...lmao

From the original- " While our approach is also applicable to traditional virtualization environments, its severity significantly increases with the attacker model of SEV-ES."
LMAO! How can it be more severe if you already have admin privelidge? TOTAL BS

Here's a list of Intel Xeon cpu's that are vulnerable as well.
ark.intel.com/content/www/us/en/ark/search/featurefilter.html?productType=873&2_VTX=true
Posted on Reply
Add your own comment
Aug 16th, 2024 02:03 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts