Friday, August 16th 2024

"Sinkclose" Vulnerability Affects Every AMD CPU Dating Back to 2006

A critical security flaw known as "Sinkclose" (CVE-2023-31315) has been identified in all AMD processors dating back to 2006, potentially affecting hundreds of millions of devices worldwide. This vulnerability allows malicious actors to exploit the chip architecture, leading to unauthorized access to sensitive data. Researchers Enrique Nissim and Krzysztof Okupski, researchers from the security firm IOActive, have revealed that the vulnerability can be exploited through various methods, enabling attackers to extract confidential information from affected systems, including passwords and personal data. The issue is especially concerning, given that it is present in all AMD CPUs made in the last 18 years and their widespread use in both consumer and enterprise environments. However, to exploit this vulnerability, an attacker must possess access to system's kernel. Downloading of malware-infused files can trigger it, so general safety measures are recommended.

The Sinkclose method exploits a little-known capability in AMD processors called TClose. This name is a blend of "TClose" and "Sinkhole," with the latter referring to a previous vulnerability found in Intel's System Management Mode in 2015. AMD chips employ a protective mechanism named TSeg, which blocks operating systems from accessing a specific memory area reserved for System Management Mode (SMM), known as System Management Random Access Memory (SMRAM). However, the TClose feature is designed to maintain backward compatibility with older hardware that might use the same memory addresses as SMRAM. It does this by remapping memory when activated. The security experts discovered that they could manipulate this TClose remapping function using only standard operating system permissions. By doing so, they could deceive the SMM into retrieving altered data, enabling them to redirect the processor and run their own instructions with the high-level privileges of SMM. This technique essentially allows attackers to bypass standard security measures and execute malicious code at one of the most privileged levels of the processor, potentially compromising the entire system.
In response to the discovery, AMD has initiated a patching process for its critical chip lines, aiming to mitigate the risks associated with this flaw. The company works closely with hardware manufacturers and software developers to ensure that updates are deployed swiftly and effectively. Enrique Nissim and Krzysztof Okupski agreed not to publish any proof-of-concept code for the vulnerability to ensure that the patches aren't rushed and systems are not getting exploited. AMD already issued patched for most of its models, and you should check out the official website for your specific mitigation firmware update. The enterprise EPYC CPUs and Instinct accelerators have been a first-priority products with patches implemented in May, while consumer desktop/laptop 4000/5000/7000/8000 series CPUs received a fix in August. No fixes are planned for 3000 series Ryzen CPUs. Workstation-grade CPUs have also received an update to mitigate this issue.

Update 08:20 UTC: AMD confirmed that the Ryzen 3000 series "Matisse" processors are getting an update planned for August 20, 2024.
Sources: Wired, AMD
Add your own comment

124 Comments on "Sinkclose" Vulnerability Affects Every AMD CPU Dating Back to 2006

#26
ty_ger
Hecate91No its because something worse is a moot point as if someone attacks at ring 0, the user is already compromised, though either is unlikely unless if the user is clicking on suspicious links.
Unlikely? It happens all the time! You want that driver that no one has any more. Or that program. You are hacking around with some hardware or some software. You get it from the only source you can find. A forum. Discord. Github. Wherever. Someone has the answer to your problem. You want it. It seems like your only option. So you click the buttons when it asks you for permission. And now you are compromised.

This is super common. Not unlikely at all.

Being compromised is one thing. Being compromised, undetectable by antivirus, and still compromised after a drive wipe and reinstall is another thing.

No one understands the definition of worse. lol

One is bad. The other is worse. A lot worse.
Chrispy_Oh, I've been BIOS flashing compromised systems for almost two decades. Rootkits that can survive a disk wipe and OS reinstall have been around since Sony's silly rootkit scandal of 2005 hit mainstream media and even global broadcast TV news. Anyone not considering rootkits is ignorant of basic security vulnerabilities and that means they should hand over the job to someone with a clue; they're unfit to do it themselves.

I barely have a clue, but that's why I hire people whose sole job it is to be on top of this stuff.
According to available information, this is primarily a consumer problem at this point. We're not talking about hiring people and having experts. The most extreme thing most consumers can imagine is wiping their drive and starting over.
Posted on Reply
#27
unwind-protect
ty_gerThis vulnerability would allegedly give them Ring -2 access. That's where you can do lasting damage without detection.
How, specifically?

(not directed at you in particular, it is just a bit unclear. I hope the DefCon talk will clear things up)
Posted on Reply
#28
mb194dc
ty_gerUnlikely? It happens all the time! You want that driver that no one has any more. Or that program. You are hacking around with some hardware or some software. You get it from the only source you can find. A forum. Discord. Github. Wherever. Someone has the answer to your problem. You want it. It seems like your only option. So you click the buttons when it asks you for permission. And now you are compromised.

This is super common. Not unlikely at all.

Being compromised is one thing. Being compromised, undetectable by antivirus, and still compromised after a drive wipe and reinstall is another thing.

No one understands the definition of worse. lol

One is bad. The other is worse. A lot worse.


According to available information, this is primarily a consumer problem at this point. We're not talking about hiring people and having experts. The most extreme thing most consumers can imagine is wiping their drive and starting over.
If the user is this stupid, this exploit is definitely the least of their concerns. They'll be compromised over and over again regardless of if they're running a AMD, Intel or any other CPU.
Posted on Reply
#29
ty_ger
unwind-protectHow, specifically?

(not directed at you in particular, it is just a bit unclear. I hope the DefCon talk will clear things up)
It is alleged. And apparently corroborated by AMD. We don't know the details at this point, because patches are still in development.
mb194dcIf the user is this stupid, this exploit is definitely the least of their concerns. They'll be compromised over and over again regardless of if they're running a AMD, Intel or any other CPU.
What a fantasy world you must live in.


Regardless, one is bad. The other is worse. Detectable by antivirus vs not. Non-persistent vs persistent.

Flippant.


Is this some silly brand loyalist thing?

The question was 'why is this bad/worse?'. And then, when you respond to that answer with 'i don't care because of some other reason', why are you even in this topic?

Nihilist?


When RGB software does this, it's the end of the world with software we should never need to use in the first place (I agree). When it's a native CPU problem, oh, what's the big deal? The world sucks anyway.
Posted on Reply
#30
chrcoluk
FrickWhy would installing programs require admin privilegies? If I launch CMD it does not have that.
Depends where it is installed.

If the binaries are dumped in the user profile path (which is becoming increasingly common) no UAC elevation required. If you want them in Program Files, then you need elevation. The reason for this is Program Files has a security boundary to write to the location which should make it harder to tamper with binaries. User profile folder was originally intended just for data. Programs already installed in Program Files that need to update themselves without elevating get round it via a background service they install.
Posted on Reply
#31
csendesmark
....if only nsa did not ask AMD and Intel to leave loopholes in their CPUs....
Posted on Reply
#32
jpvalverde85
There are Zen2 processors that will get the upgrade (series 4000, mobile series 5300, 5500, 5700, mobile series 3000 is even Zen1+), Zen1 server is supported too (another platform), so the negative for Zen1/Zen2 desktop AM4 even when the BIOS could be updated isn't for validation issues, feels more for planned obsolescence than anything else. Shady.
Posted on Reply
#33
Daven
ty_gerWhat a fantasy world you must live in.
I think you are still not understanding the point others are trying to make but I could be wrong. This exploit is so deep into the computer that other more easier ways are available to take over a computer. Most of those easier ways are blocked from exploitation but vulnerable computers still exist that do not require the Sinkclose exploit. The other commenters are saying that unaware users are more vulnerable to these easier exploits; therefore Sinkclose is more academic right now and just another possible avenue of exploiting a computer and not the end of secure computing as the shock and awe media would have us believe otherwise.
Posted on Reply
#34
ty_ger
I don't think that I am missing the point.

This vulnerability is deeper. Point
The other stuff is normal stuff that happens every day. This is worse, harder to detect, and harder to get rid of. Point

Take an existing Ring 0 exploit. Change it to Ring -2. Why is that worse? If Ring 0 is so bad, why would an attacker want lower? These are hypothetical questions, of course. Answer them, and you have your answer.
Posted on Reply
#35
redeye
so amd processors… PS5, PS4 have AMD processors… and everyone is worried that their system is pwned… but, is it not a good thing?, because now you can jail break your PS5, or PS4 Right?… and it is not fixable… so the Sinkclose vulnerability will allow games to be easily stolen on the PC and PS5… no?.

if not, why is everyone doing the “doom and gloom” posting?
Posted on Reply
#36
NSX05
Stupid of AMD to omit a fix for the Ryzen 3000 series.
Posted on Reply
#37
Easo
VinceroThis would seem to be a vulnerability that is primarily exposed by the exploit needing to be executed by someone/something at the main OS level.
In which case - you have already lost and this vulnerability is not really that critical.
Posted on Reply
#38
Vincero
Yeah, because Intel have never had an SMM security issue... oh, hang on they have... could be worse, with Intel ME you could also have an additional attack vector offering fully fledged in-built remote access across a network even if the OS isn't running...

When you also factor in the employee headcount difference between AMD and Intel, and amount of staff Intel can dedicate to every facet of a product from security to design, it is actually quite amazing these issues crop up so often.
Posted on Reply
#39
Makaveli
mb194dcYes and you need kernel level access to exploit it, i.e installing a compromised driver or something like that.

The concern for your average user is less than zero.

If a threat actor has that kind of access they can do much worse than just this exploit. I guess governments or people running missions critical intelligence or military infrastructure could be concerned. I'd also guess there are zero of these first gen ryzen chips being used in such places anyway.
What about games that install Anti cheat with Kernel level access?
NSX05Stupid of AMD to omit a fix for the Ryzen 3000 series.
A good time to upgrade Zen 3 is cheap and in socket replacement no need for even a windows reinstall.
Posted on Reply
#40
Zendou
MakaveliWhat about games that install Anti cheat with Kernel level access?


Nice trolling.

Team blue still dealing with silicon degradation don't you have something better to do with your time?


A good time to upgrade Zen 3 is cheap and in socket replacement no need for even a windows reinstall.
So whataboutism, whataboutism, and just give the company more money for an additional product they may refuse to update like your current one.

Not the best solutions, but hey it is the internet, you get to try to dunk on people without addressing the spirit of the criticism.
Posted on Reply
#41
Mr. Perfect
AMD Ryzen™ 7000 Series Desktop Processors
ComboAM5PI 1.2.0.1 (2024-08-07)
Time to keep an eye out for BIOS updates with 1.2.0.1. Manufacturers just got 1.2.0.0a out the door with the 9000 series launch.
Posted on Reply
#42
Palindrome
What I'm reading is that I can now force my brother to ditch Zen+ in favour of Zen 3. Hopefully AGESA update ships quickly for my Zen 4 and 3 systems.
Posted on Reply
#43
Chrispy_
ty_gerTake an existing Ring 0 exploit. Change it to Ring -2. Why is that worse? If Ring 0 is so bad, why would an attacker want lower? These are hypothetical questions, of course. Answer them, and you have your answer.
I'm openly aware that I'm somewhere in the Dunning-Kruger valley of despair when it comes to security vulnerabilities, but I don't see how this vulnerability can be exploited unless worse things have already happened to effectively write-off the system entirely.

Let's say someone steals your car, takes it for a joyride and wrecks it. That's the kernel-level exploit.
As they get out of the burning car, they steal the sunglasses you had in the glovebox. That's the higher-privilege exploit that wasn't possible unless they'd already gained access to your car.

Either way, you've lost your sunglasses and the sunglasses are the least of your worries. If their ultimate goal in the first place was to steal your sunglasses then the lock on the glovebox really wasn't the biggest hurdle.
Posted on Reply
#45
R-T-B
mb194dcYes and you need kernel level access to exploit it, i.e installing a compromised driver or something like that.

The concern for your average user is less than zero.

If a threat actor has that kind of access they can do much worse than just this exploit. I guess governments or people running missions critical intelligence or military infrastructure could be concerned. I'd also guess there are zero of these first gen ryzen chips being used in such places anyway.
This, basically. Good summary. I'd also expect 0 performance impact from patching this.
mtosevI hope that the fix won't affect the performance of these chips.
It shouldn't.
ty_gerI don't understand this sort of flippant response. People install malicious software every day via social engineering. This is another exploit that allows slightly malicious software to become very malicious. There is no reason to downplay its potential until it is fixed.
This is also true but at the same time, it is healthy to remind people not to panic.
Posted on Reply
#46
Vincero
MakaveliWhat about games that install Anti cheat with Kernel level access?
They are the worst kind... usually used by companies with crap coding to stop modders/cheaters... what trust can you put in them??
Doesn't help some are of dubious origin.
ZendouSo whataboutism, whataboutism
The point was "what about software that gets installed with ring0 access that you effectively need to trust but with poor / no oversight"
Chrispy_I'm openly aware that I'm somewhere in the Dunning-Kruger valley of despair when it comes to security vulnerabilities, but I don't see how this vulnerability can be exploited unless worse things have already happened to effectively write-off the system entirely.

Let's say someone steals your car, takes it for a joyride and wrecks it. That's the kernel-level exploit.
As they get out of the burning car, they steal the sunglasses you had in the glovebox. That's the higher-privilege exploit that wasn't possible unless they'd already gained access to your car.

Either way, you've lost your sunglasses and the sunglasses are the least of your worries. If their ultimate goal in the first place was to steal your sunglasses then the lock on the glovebox really wasn't the biggest hurdle.
I think the reason why people are concerned is that you have 2 main tiers of system exploit; 1) you loose control of the software but there is limited scope to damage anything else, or 2) you loose control of the software and they can also permanently infect the hardware. This falls in to tier 2.

Again, fanboys and uninformed people will act in an incredulous way when informed that this isn't exactly a new risk itself - remember back when people were finding out about the CIH virus... fun times.
Posted on Reply
#47
R-T-B
Chrispy_Oh, I've been BIOS flashing compromised systems for almost two decades. Rootkits that can survive a disk wipe and OS reinstall have been around since Sony's silly rootkit scandal of 2005 hit mainstream media and even global broadcast TV news. Anyone not considering rootkits is ignorant of basic security vulnerabilities and that means they should hand over the job to someone with a clue; they're unfit to do it themselves.

I barely have a clue, but that's why I hire people whose sole job it is to be on top of this stuff.
Rootkits are not the same as ring -2. They typically cannot survive a reinstall.
Posted on Reply
#48
Vincero
EasoIn which case - you have already lost and this vulnerability is not really that critical.
Its 'critical' in terms of direct impact - its impossible to class it based on risk as everyone works differently. For sure the risk is high of someone inadvertently loading it. For those with locked down devices and effective endpoint security, the risk is probably quite low, but the impact wouldn't be any different if it somehow was triggered.
Posted on Reply
#49
R-T-B
redeyeso amd processors… PS5, PS4 have AMD processors… and everyone is worried that their system is pwned… but, is it not a good thing?, because now you can jail break your PS5, or PS4 Right?… and it is not fixable… so the Sinkclose vulnerability will allow games to be easily stolen on the PC and PS5… no?.

if not, why is everyone doing the “doom and gloom” posting?
There certainly are some fun things you could do with this.

That said, the potential for abuse is worse. Its why "hardware security" is a bad idea encapsulated.
Posted on Reply
#50
Qwerty101
This is getting ridiculous!

AMD and Intel both working against the second hand market and product longevity. Completely by accident of course…….

Intel: Your second hand PC might have a faulty CPU, that starts to fail due to mysterious degradation.

AMD: Your second hand PC might be compromised in a stealth mode, where no clean OS reinstall will help you.
Posted on Reply
Add your own comment
Jan 6th, 2025 08:03 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts