Tuesday, May 2nd 2023

AMD faulTPM Exploit Targets Zen 2 and Zen 3 Processors

Researchers at the Technical University of Berlin have published a paper called "faulTPM: Exposing AMD fTPMs' Deepest Secrets," highlighting AMD's firmware-based Trusted Platform Module (TPM) is susceptible to the new exploit targeting Zen 2 and Zen 3 processors. The faulTPM attack against AMD fTPMs involves utilizing the AMD secure processor's (SP) vulnerability to voltage fault injection attacks. This allows the attacker to extract a chip-unique secret from the targeted CPU, which is then used to derive the storage and integrity keys protecting the fTPM's non-volatile data stored on the BIOS flash chip. The attack consists of a manual parameter determination phase and a brute-force search for a final delay parameter. The first step requires around 30 minutes of manual attention, but it can potentially be automated. The second phase consists of repeated attack attempts to search for the last-to-be-determined parameter and execute the attack's payload.

Once these steps are completed, the attacker can extract any cryptographic material stored or sealed by the fTPM regardless of authentication mechanisms, such as Platform Configuration Register (PCR) validation or passphrases with anti-hammering protection. Interestingly, BitLocker uses TPM as a security measure, and faulTPM compromises the system. Researchers suggested that Zen 2 and Zen 3 CPUs are vulnerable, while Zen 4 wasn't mentioned. The attack requires several hours of physical access, so remote vulnerabilities are not a problem. Below, you can see the $200 system used for this attack and an illustration of the physical connections necessary.

AMD has issued a statement for Tom's Hardware:
AMD SpokespersonAMD is aware of the research report attacking our firmware trusted platform module which appears to leverage related vulnerabilities previously discussed at ACM CCS 2021. This includes attacks carried out through physical means, typically outside the scope of processor architecture security mitigations. We are continually innovating new hardware-based protections in future products to limit the efficacy of these techniques. Specific to this paper, we are working to understand potential new threats and will update our customers and end-users as needed.
The attack is also public with code available on GitHub.
Sources: faulTPM Paper, Tom's Hardware
Add your own comment

21 Comments on AMD faulTPM Exploit Targets Zen 2 and Zen 3 Processors

#1
Solaris17
Super Dainty Moderator


aw damn not me secrets! all this while I was getting coffee now my docs are on github TwT
Posted on Reply
#2
neatfeatguy
So, like a lot of exploits on CPUs (either side, AMD or Intel) you're information is ripe for the taking as long as someone has physical access to your computer and an hour or two of time, with specialty hardware/software?

I better start breaking down my computers everyday and hiding all my hardware to prevent this from ever happening! I'm going to start right now!
Posted on Reply
#3
Crackong
I know a bug is a bug and it is worth fixing.

But this one is just way too impractical to be put on any kind of news article.

If someone can
- Physically access your hardware for a few hours
- Carry in special equipment without being identified as suspicious.
- Have time to identified all the correct soldering points needed on the motherboard
- Have time to solder all the wires onto your motherboard
- Have time doing all the hacks

He must have 100+ more ways to do the same thing with less effort.
Why doing it like this ?
Posted on Reply
#4
Kohl Baas
CrackongI know a bug is a bug and it is worth fixing.

But this one is just way too impractical to be put on any kind of news article.

If someone can
- Physically access your hardware for a few hours
- Carry in special equipment without being identified as suspicious.
- Have time to identified all the correct soldering points needed on the motherboard
- Have time to solder all the wires onto your motherboard
- Have time doing all the hacks

He must have 100+ more ways to do the same thing with less effort.
Why doing it like this ?
My thoughts exactly.

Any system that allows undisturbed physical access to an attacker should be (and probably are) considered compromised beyond saving.
Posted on Reply
#5
Gica
Do we worry about these holes while accessing Google? :kookoo:
"- Ha ha ha! You don't know anything, Google. You're wrong"
- Your mother's husband is where you say. Your father is where I say."
Posted on Reply
#6
TumbleGeorge
It is obvious that these "researchers" are criminals who are only looking to make money through their criminal activities. I hope that justice in the countries where they live will do their duty to society and remove them from the scene.
Posted on Reply
#7
qlum
I wonder if this is applicable to consoles as well?
Posted on Reply
#8
N3utro
CrackongI know a bug is a bug and it is worth fixing.

But this one is just way too impractical to be put on any kind of news article.

If someone can
- Physically access your hardware for a few hours
- Carry in special equipment without being identified as suspicious.
- Have time to identified all the correct soldering points needed on the motherboard
- Have time to solder all the wires onto your motherboard
- Have time doing all the hacks

He must have 100+ more ways to do the same thing with less effort.
Why doing it like this ?
Because enterprise users are loosing their laptops with encrypted data on it all the time, and this is a relatively cheap method to access them.
Posted on Reply
#9
Muser99
N3utroBecause enterprise users are loosing their laptops with encrypted data on it all the time, and this is a relatively cheap method to access them.
Bingo! This is a big issue!
Posted on Reply
#10
fancucker
CrackongI know a bug is a bug and it is worth fixing.

But this one is just way too impractical to be put on any kind of news article.

If someone can
- Physically access your hardware for a few hours
- Carry in special equipment without being identified as suspicious.
- Have time to identified all the correct soldering points needed on the motherboard
- Have time to solder all the wires onto your motherboard
- Have time doing all the hacks

He must have 100+ more ways to do the same thing with less effort.
Why doing it like this ?
Doesn't matter, it's still a massive violation of public trust and could potentially affect server processors as well. AMD needs to pay materially for it and inform consumers so they don't waste hard earned money on their compromised products. Another reminder to stay with Intel, always
Posted on Reply
#11
Crackong
fancuckerAnother reminder to stay with Intel, always
Are you saying Intel platform won't be cracked if given the intruder hardware level access for a few hours with specialized equipment ( with soldering irons) ?

I think even Intel themselves can't be that confident

Posted on Reply
#12
Lionheart
CrackongAre you saying Intel platform won't be cracked if given the intruder hardware level access for a few hours with specialized equipment ( with soldering irons) ?

I think even Intel themselves can't be that confident

Fancucker is a troll, no idea why it's still on this site.
Posted on Reply
#13
W1zzard
CrackongAre you saying Intel platform won't be cracked if given the intruder hardware level access for a few hours with specialized equipment ( with soldering irons) ?
Exactly that is the promise of TPM, otherwise it's a useless technology that creates a false sense of security (TPM is disabled on all my machines btw)
Posted on Reply
#15
chrcoluk
W1zzardExactly that is the promise of TPM, otherwise it's a useless technology that creates a false sense of security (TPM is disabled on all my machines btw)
I keep it enabled for measured boot, but that seems to be the only real benefit from it.
Posted on Reply
#16
Rais
TumbleGeorgeIt is obvious that these "researchers" are criminals who are only looking to make money through their criminal activities. I hope that justice in the countries where they live will do their duty to society and remove them from the scene.
What a huge display of ignorance. If you are indeed a criminal, you don't publish your instruments.
Posted on Reply
#17
TumbleGeorge
Ignorance, but they also educate other criminals in this way. Which, or at least many of them, wouldn't even know there were such vulnerabilities.
Posted on Reply
#18
Rais
TumbleGeorgeIgnorance, but they also educate other criminals in this way. Which, or at least many of them, wouldn't even know there were such vulnerabilities.
Clearly you know nothing on the topic. Without these researchers IT specialist wouldn't be aware about the vulnerabilities and would go blind on their efforts.
Posted on Reply
#19
R0H1T
neatfeatguySo, like a lot of exploits on CPUs (either side, AMD or Intel) you're information is ripe for the taking as long as someone has physical access to your computer and an hour or two of time, with specialty hardware/software?

I better start breaking down my computers everyday and hiding all my hardware to prevent this from ever happening! I'm going to start right now!
You better start hiding that pron anime stash :D
TumbleGeorgeIgnorance, but they also educate other criminals in this way. Which, or at least many of them, wouldn't even know there were such vulnerabilities.
Except most state level actors or even highly sophisticated criminal groups exploit some of them regularly & are well aware of them!
Posted on Reply
#20
Zareek
I find it very interesting that someone or some group spent a lot of money on research to find a hole in AMD hardware security again. Hardware that only represents a tiny portion of all the mobile hardware that is shipped. It's almost like a company has a vested interest in scaring corporations and governments away from AMD products. I wonder if anyone or group has spent as much money doing the same sort of research on far more common Intel based mobile machines.
Posted on Reply
#21
evernessince
fancuckerDoesn't matter, it's still a massive violation of public trust and could potentially affect server processors as well. AMD needs to pay materially for it and inform consumers so they don't waste hard earned money on their compromised products. Another reminder to stay with Intel, always
Intel has 663 known exploits and AMD has 35.

www.cvedetails.com/vulnerability-list.php?vendor_id=238&product_id=&version_id=&page=1&hasexp=0&opdos=0&opec=0&opov=0&opcsrf=0&opgpriv=0&opsqli=0&opxss=0&opdirt=0&opmemc=0&ophttprs=0&opbyp=0&opfileinc=0&opginf=0&cvssscoremin=0&cvssscoremax=0&year=0&month=0&cweid=0&order=3&trc=663&sha=1d6011c41df6dde5f48a4f36352f44c40f918a0a
www.cvedetails.com/vulnerability-list.php?vendor_id=7043&product_id=&version_id=&page=1&hasexp=0&opdos=0&opec=0&opov=0&opcsrf=0&opgpriv=0&opsqli=0&opxss=0&opdirt=0&opmemc=0&ophttprs=0&opbyp=0&opfileinc=0&opginf=0&cvssscoremin=0&cvssscoremax=0&year=0&month=0&cweid=0&order=3&trc=35&sha=5d677a4c9e2eb1367064584d278001d10a4b5a92

Either you jest or you troll, I'm sure your reply that I'll ignore will give readers that happen to pass by a laugh.
Posted on Reply
Add your own comment
May 18th, 2024 07:42 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts