• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

CTS Labs Posts Some Clarifications on AMD "Zen" Vulnerabilities

Joined
Dec 29, 2010
Messages
3,819 (0.75/day)
Processor AMD 5900x
Motherboard Asus x570 Strix-E
Cooling Hardware Labs
Memory G.Skill 4000c17 2x16gb
Video Card(s) RTX 3090
Storage Sabrent
Display(s) Samsung G9
Case Phanteks 719
Audio Device(s) Fiio K5 Pro
Power Supply EVGA 1000 P2
Mouse Logitech G600
Keyboard Corsair K95
If I have admin rights on a PC with an Intel chipset, can I not flash tha BIOS with a malware infected version or do Intel CPU's detect that tampering?

Hell yes. This brings up many questions that are not asked by this article so let me try...

By its own statements, CTS Labs tested and developed a proof of concept exploit for Asmedia controllers before it was aware these controllers were incorporated into Ryzen chipsets. Where, then, is the website AsmediaFlaws.com? Where’s the notification to tell Intel motherboard customers that the chips on their motherboards can be similarly backdoored and abused? This isn’t a theoretical; I’m writing this article from an Ivy Bridge-E system powered by an Asus X79-Deluxe motherboard with an Asmedia 1042 controller.

Where is TPU in this?

https://www.extremetech.com/computi...ty-disclosures-digs-deeper-hole#disqus_thread
 
Joined
Apr 21, 2010
Messages
578 (0.11/day)
System Name Home PC
Processor Ryzen 5900X
Motherboard Asus Prime X370 Pro
Cooling Thermaltake Contac Silent 12
Memory 2x8gb F4-3200C16-8GVKB - 2x16gb F4-3200C16-16GVK
Video Card(s) XFX RX480 GTR
Storage Samsung SSD Evo 120GB -WD SN580 1TB - Toshiba 2TB HDWT720 - 1TB GIGABYTE GP-GSTFS31100TNTD
Display(s) Cooler Master GA271 and AoC 931wx (19in, 1680x1050)
Case Green Magnum Evo
Power Supply Green 650UK Plus
Mouse Green GM602-RGB ( copy of Aula F810 )
Keyboard Old 12 years FOCUS FK-8100
atm on Ryzen system , It's impossible to do flash modded bios without USB Flash, You need to boot USB flash via UEFI Boot setting.
Feel free to read this guide , How to flash Modded Bios (Yep So damn many hard STEP ):

https://puissanceled.com/vrac/Bios_modding/EN.html

Edit : oh i forgot something ,on my ASUS Prime X370 Pro , i updated Bios but I can't revert back to Old Bios, This does Not allow me ,I don't know it's ASUS or New Version of AMD AGESA 1.0.0.6
 
Last edited:
Joined
Nov 12, 2014
Messages
542 (0.15/day)
Location
Ilirska Bistrica, Slovenia
System Name Thermaltake
Processor AMD Ryzen 5 5800X3D @ 4.60 GHz
Motherboard Gigabyte B550 Aorus Elite V2
Cooling Thermalright Peerless Assassin
Memory 32 GB Crucial Ballistix @ 3600 MHz CL16
Video Card(s) XFX 319 Merc 6800 XT
Storage Kingston 256GB SSD | Kingston 240GB NVMe | Samsung 1TB NVMe | Samsung F3 1TB HDD | Barracuda 2TB HDD
Display(s) 34" ultrawide LG 34GL750B 144hz 1ms | 55" LG UR91 4k@60Hz
Case Phanteks Eclipse P400
Audio Device(s) ALC 1220 120dB SNR HD Audio
Power Supply Thermaltake GF1 850 W - 80 Plus Gold
Mouse Logitech G502 HERO Lightspeed
Keyboard Asus TUF Gaming K3
Software Windows 11 Pro x64
I've thought about this a bit and well, I believe that the big corporations should have security things in check (I mean not having an admin mode as a basic user is as easy as a tick in the Active User Directory settings in Windows servers for example, a sysadmin should know his shit), but companies with not so savy IT support (there's a lot of so-called IT guys out there, A LOT) could have huge problems.

Also, most of these still seem to require physicall access so.
 
Joined
Nov 3, 2013
Messages
2,141 (0.52/day)
Location
Serbia
Processor Ryzen 5600
Motherboard X570 I Aorus Pro
Cooling Deepcool AG400
Memory HyperX Fury 2 x 8GB 3200 CL16
Video Card(s) RX 6700 10GB SWFT 309
Storage SX8200 Pro 512 / NV2 512
Display(s) 24G2U
Case NR200P
Power Supply Ion SFX 650
Mouse G703 (TTC Gold 60M)
Keyboard Keychron V1 (Akko Matcha Green) / Apex m500 (Gateron milky yellow)
Software W10
The thing I dislike the most about this entire situation is that more research and interesting info came from TPU members than editors themselves. As a matter of fact the entirety of cts articles is copy-pasted sensationalism for nothing but clicks. And it looks extremely unprofessional. You're gonna lose readership in the end, and no amount of click-bait articles will help you then.
Edit, quoted wizz by mistake.
 
Joined
Jun 10, 2014
Messages
3,009 (0.78/day)
Processor AMD Ryzen 9 5900X ||| Intel Core i7-3930K
Motherboard ASUS ProArt B550-CREATOR ||| Asus P9X79 WS
Cooling Noctua NH-U14S ||| Be Quiet Pure Rock
Memory Crucial 2 x 16 GB 3200 MHz ||| Corsair 8 x 8 GB 1333 MHz
Video Card(s) MSI GTX 1060 3GB ||| MSI GTX 680 4GB
Storage Samsung 970 PRO 512 GB + 1 TB ||| Intel 545s 512 GB + 256 GB
Display(s) Asus ROG Swift PG278QR 27" ||| Eizo EV2416W 24"
Case Fractal Design Define 7 XL x 2
Audio Device(s) Cambridge Audio DacMagic Plus
Power Supply Seasonic Focus PX-850 x 2
Mouse Razer Abyssus
Keyboard CM Storm QuickFire XT
Software Ubuntu
In general terms, if a system really remains persistently compromised across OS installs, is definitely something to take seriously, even if it takes admin privileges to get infected*. That is not to say it's an immediate threat to either consumers, enterprises or cloud providers, and is not nearly worthy the devastating effect implied by the "ryzenfall" nickname.
*) There have been ways to do privilege escalation.

Note: I'm not commenting on the validity of the claimed vulnerabilities by CTS-Labs. I would encourage everyone to remain skeptical and wait for potential evidence.
 
Joined
Dec 30, 2010
Messages
2,203 (0.43/day)
The thing I dislike the most about this entire situation is that more research and interesting info came from TPU members than editors themselves. As a matter of fact the entirety of cts articles is copy-pasted sensationalism for nothing but clicks. And it looks extremely unprofessional. You're gonna lose readership in the end, and no amount of click-bait articles will help you then.
Edit, quoted wizz by mistake.

Things go so fast these days, it's hard for a writer to keep up with all these trends, posts and whatever.

Every CPU has flaws. Live with it. It's so complex and the focus is more on performance then hardened security.

However it suprises me that the Ryzen pro has these simular flaws, when bios is modded. Ryzen pro is being sold as a 'safer' CPU compared to normal ryzen.
 
Joined
Apr 10, 2013
Messages
302 (0.07/day)
Location
Michigan, USA
Processor AMD 1700X
Motherboard Crosshair VI Hero
Memory F4-3200C14D-16GFX
Video Card(s) GTX 1070
Storage 960 Pro
Display(s) PG279Q
Case HAF X
Power Supply Silencer MK III 850
Mouse Logitech G700s
Keyboard Logitech G105
Software Windows 10
As a matter of fact the entirety of cts articles is copy-pasted sensationalism for nothing but clicks. And it looks extremely unprofessional. You're gonna lose readership in the end, and no amount of click-bait articles will help you then.
The problem is AMD hasn't handled it well. AMD has had no comment other than their strange blog post acknowledging the investigation into the claimed vulnerabilities. That post wasn't even written in clear professional terms ("certain of our processors" and doesn't even have a date). Until AMD writes/speaks and either declares the vulnerabilities fake or explains complexity it will continue being a story and TPU needs to cover it. You don't get bona fide debunks from random users named "BiGchiCKens14", you get it from the company.
 
Joined
Jul 29, 2014
Messages
484 (0.13/day)
Location
Fort Sill, OK
Processor Intel 7700K 5.1Ghz (Intel advised me not to OC this CPU)
Motherboard Asus Maximus IX Code
Cooling Corsair Hydro H115i Platinum
Memory 48GB G.Skill TridentZ DDR4 3200 Dual Channel (2x16 & 2x8)
Video Card(s) nVIDIA Titan XP (Overclocks like a champ but stock performance is enough)
Storage Intel 760p 2280 2TB
Display(s) MSI Optix MPG27CQ Black 27" 1ms 144hz
Case Thermaltake View 71
Power Supply EVGA SuperNova 1000 Platinum2
Mouse Corsair M65 Pro (not recommded, I am on my second mouse with same defect)
Software Windows 10 Enterprise 1803
Benchmark Scores Yes I am Intel fanboy that is my benchmark score.
Joined
Jul 5, 2013
Messages
28,462 (6.77/day)
Couldn't you guys at least be more skeptical instead of just regurgitating what CTS says? I guess it brings in clicks huh?
They are reporting news and sharing the known information. Why should they be skeptical at all? Regardless of whether or not CTS is shady or legit, the vulnerabilities in question need to be taken seriously. It would be irresponsible and unprofessional to take this news less than seriously. And if it turns out to be nonsense than they can post that news too. Is that aspect of journalism clear now?
 
Low quality post by DeathtoGnomes
Joined
Jul 16, 2014
Messages
8,223 (2.15/day)
Location
SE Michigan
System Name Dumbass
Processor AMD Ryzen 7800X3D
Motherboard ASUS TUF gaming B650
Cooling Artic Liquid Freezer 2 - 420mm
Memory G.Skill Sniper 32gb DDR5 6000
Video Card(s) GreenTeam 4070 ti super 16gb
Storage Samsung EVO 500gb & 1Tb, 2tb HDD, 500gb WD Black
Display(s) 1x Nixeus NX_EDG27, 2x Dell S2440L (16:9)
Case Phanteks Enthoo Primo w/8 140mm SP Fans
Audio Device(s) onboard (realtek?) - SPKRS:Logitech Z623 200w 2.1
Power Supply Corsair HX1000i
Mouse Steeseries Esports Wireless
Keyboard Corsair K100
Software windows 10 H
Benchmark Scores https://i.imgur.com/aoz3vWY.jpg?2
They are reporting news and sharing the known information. Why should they be skeptical at all? Regardless of whether or not CTS is shady or legit, the vulnerabilities in question need to be taken seriously. It would be irresponsible and unprofessional to take this news less than seriously. And if it turns out to be nonsense than they can post that news too. Is that aspect of journalism clear now?
Idk, posting fake news because it made front page headlines seems kinda normal since Trump took office. The fact this this whole report could be part of some agenda to drive AMD stock down does not too far fetched either.
 
Joined
Jan 13, 2018
Messages
157 (0.06/day)
System Name N/A
Processor Intel Core i5 3570
Motherboard Gigabyte B75
Cooling Coolermaster Hyper TX3
Memory 12 GB DDR3 1600
Video Card(s) MSI Gaming Z RTX 2060
Storage SSD
Display(s) Samsung 4K HDR 60 Hz TV
Case Eagle Warrior Gaming
Audio Device(s) N/A
Power Supply Coolermaster Elite 460W
Mouse Vorago KM500
Keyboard Vorago KM500
Software Windows 10
Benchmark Scores N/A
Nexus Gamers did good job covering this story with their own input on this.

https://www.gamersnexus.net/industry/3260-assassination-attempt-on-amd-by-viceroy-research-cts-labs
I liked it and I agree that the timing of presenting the news was sharply calculated, since AMD is about to launch Ryzen 2000 series, also very suspicious that CTS was created just after Intel was informed of Meldown, I couldn't but wonder that Intel is implicated. Nexus asked Intel about it, and of course they denied it, what they were expecting, "Yes we are involved" morons!
Anyway they agree that the flaws threat is there, and that it needs further analysis.
 
Joined
Sep 25, 2012
Messages
2,074 (0.46/day)
Location
Jacksonhole Florida
System Name DEVIL'S ABYSS
Processor i7-4790K@4.6 GHz
Motherboard Asus Z97-Deluxe
Cooling Corsair H110 (2 x 140mm)(3 x 140mm case fans)
Memory 16GB Adata XPG V2 2400MHz
Video Card(s) EVGA 780 Ti Classified
Storage Intel 750 Series 400GB (AIC), Plextor M6e 256GB (M.2), 13 TB storage
Display(s) Crossover 27QW (27"@ 2560x1440)
Case Corsair Obsidian 750D Airflow
Audio Device(s) Realtek ALC1150
Power Supply Cooler Master V1000
Mouse Ttsports Talon Blu
Keyboard Logitech G510
Software Windows 10 Pro x64 version 1803
Benchmark Scores Passmark CPU score = 13080
Of course the threats are real. Those who suggest it's all BS made up by Intel have not thought it through. Can you imagine the backlash if none of this is verified? It would be terrible. Has anyone forgotten how loudly the AMD fans crowed when Spectre/Meltdown came out? Especially at first, when AMD was saying their CPUs were not affected at all. Intel may have had a hand in the way the news was released so soon, but nothing is proven, and those stating it as a fact are sounding real paranoid. Seems like AMD fans are still suffering from "underdog syndrome", despite their glowing posts about how Ryzen put Intel in it's place.
 
Joined
Apr 21, 2009
Messages
113 (0.02/day)
System Name littlet
Processor Ryzen 5900X
Motherboard TUF GAMING B550M-PLUS (WI-FI) ZAKU II EDITION
Cooling EK AIO Basic 240
Memory G.Skill Trident Z RGB 4X16GB 3200MHz
Video Card(s) RTX™ A2000 12GB
Storage C: WD_BLACK SN850 1TB
Display(s) ViewSonic VX3276-2K-mhd
Case ASUS Prime AP201
Audio Device(s) Asus Xonar Essence STX II
Power Supply Corsair SF 600
Software Windows
All the butt-hurt amd girls raging above, so pathetic.

Yes sure, you should criticize the messenger...

Also, how many people are running windows in admin mode even without knowing it? Yeah, a shitload of them!
SO if all it takes is to run an exe file and then it will be sitting low level and even OS reinstall can't flush it out, then it's a huge fucking problem and amd should be balls grilled for it! Anyone who says otherwise is a brainwashed idiot and a fanboi.


do you actually use windows?

i ask because anytime you run an exe, you need to click yes it can run
unless of course you've disabled uac
 
Joined
Jul 13, 2016
Messages
3,389 (1.09/day)
Processor Ryzen 7800X3D
Motherboard ASRock X670E Taichi
Cooling Noctua NH-D15 Chromax
Memory 32GB DDR5 6000 CL30
Video Card(s) MSI RTX 4090 Trio
Storage P5800X 1.6TB 4x 15.36TB Micron 9300 Pro 4x WD Black 8TB M.2
Display(s) Acer Predator XB3 27" 240 Hz
Case Thermaltake Core X9
Audio Device(s) JDS Element IV, DCA Aeon II
Power Supply Seasonic Prime Titanium 850w
Mouse PMM P-305
Keyboard Wooting HE60
VR HMD Valve Index
Software Win 10
It may be that CTS is trolling, but your assertion is off-base. For TPU to be the only site to not cover this, as you appear to want, would have been a sure way for a site-owner like W1zzard to have their site relegated to a back burner, to be 2nd or 3rd tier. People won’t go to sites that they realize just don’t cover events.

Agreed. I do wish that appropriate caution was displayed in the title / near the top of the article though. The way I read the CTS titles, TPU makes them appear legitimate despite industry wide concensus of the inverse.

This. I find it very strange AMD has stayed so quiet in last 72 hours. We still only have the STRANGE blog post about "certain of our processors" that doesn't even have a date.

It takes more than 72 hours for AMD to verify these security claims with complete certainty. There's a reason why it's common practice to give companies 3 months before revealing an exploit / bug. If AMD rushes things and makes an incorrect statement, it gets sued.

We can't all be like CTS labs and post a disclaimer that relieves them of all liability if what they say is actually false.
 
Joined
Feb 16, 2017
Messages
494 (0.17/day)
They are reporting news and sharing the known information. Why should they be skeptical at all? Regardless of whether or not CTS is shady or legit, the vulnerabilities in question need to be taken seriously. It would be irresponsible and unprofessional to take this news less than seriously. And if it turns out to be nonsense than they can post that news too. Is that aspect of journalism clear now?
Was another news post necessary though? Pin the thing and update as needed.

Hell yes. This brings up many questions that are not asked by this article so let me try...

Where is TPU in this?

https://www.extremetech.com/computi...ty-disclosures-digs-deeper-hole#disqus_thread
I guess they're not interested, thanks for the link.
 
Last edited:
Joined
Jul 5, 2013
Messages
28,462 (6.77/day)
Was another news post necessary though? Pin the thing and update as needed.
That's one solution, and might work. But the owners, admin's, editors and staff run the site and in ways they find acceptable. Outsiders complaining about aspects of the site that are not related to it's functionality are really not as constructive as people might think.

If there's an article people don't want to read, don't read it. No one is twisting anyone else's arm. Complaining about doesn't help anything.
 

eidairaman1

The Exiled Airman
Joined
Jul 2, 2007
Messages
42,985 (6.72/day)
Location
Republic of Texas (True Patriot)
System Name PCGOD
Processor AMD FX 8350@ 5.0GHz
Motherboard Asus TUF 990FX Sabertooth R2 2901 Bios
Cooling Scythe Ashura, 2×BitFenix 230mm Spectre Pro LED (Blue,Green), 2x BitFenix 140mm Spectre Pro LED
Memory 16 GB Gskill Ripjaws X 2133 (2400 OC, 10-10-12-20-20, 1T, 1.65V)
Video Card(s) AMD Radeon 290 Sapphire Vapor-X
Storage Samsung 840 Pro 256GB, WD Velociraptor 1TB
Display(s) NEC Multisync LCD 1700V (Display Port Adapter)
Case AeroCool Xpredator Evil Blue Edition
Audio Device(s) Creative Labs Sound Blaster ZxR
Power Supply Seasonic 1250 XM2 Series (XP3)
Mouse Roccat Kone XTD
Keyboard Roccat Ryos MK Pro
Software Windows 7 Pro 64
So everyday im hacking my own computer LOL

TPU never wrote anything positive about AMD. Wondering if the staff is payed by Intel, Nvidia and CTS labs.

Easy there man, this is the site that started the hardware mods for radeon cards.

I'm sure deep down most staff want AMD to do something amazing to keep prices down for both Intel and AMD users, aka the consumer no matter the camp wins.
 
Joined
Mar 18, 2008
Messages
5,717 (0.93/day)
System Name Virtual Reality / Bioinformatics
Processor Undead CPU
Motherboard Undead TUF X99
Cooling Noctua NH-D15
Memory GSkill 128GB DDR4-3000
Video Card(s) EVGA RTX 3090 FTW3 Ultra
Storage Samsung 960 Pro 1TB + 860 EVO 2TB + WD Black 5TB
Display(s) 32'' 4K Dell
Case Fractal Design R5
Audio Device(s) BOSE 2.0
Power Supply Seasonic 850watt
Mouse Logitech Master MX
Keyboard Corsair K70 Cherry MX Blue
VR HMD HTC Vive + Oculus Quest 2
Software Windows 10 P
Very good read from AnandTech. They had a recorded phone call with these so called CTS experts.

https://www.anandtech.com/show/12536/our-interesting-call-with-cts-labs


So almost all motherboards that have Asmedia chipsets, including millions of Intel motherboards, are affected by CTS self proclaimed "vuneribility" Really strange why they choose to only target AMD. I wonder.

Also the final part of their conversation is almost comical:

Anandtech: Who do you work for?
CTS: Sorry bruh gotta go.

hahaha
 
Joined
Mar 6, 2012
Messages
569 (0.12/day)
Processor i5 4670K - @ 4.8GHZ core
Motherboard MSI Z87 G43
Cooling Thermalright Ultra-120 *(Modded to fit on this motherboard)
Memory 16GB 2400MHZ
Video Card(s) HD7970 GHZ edition Sapphire
Storage Samsung 120GB 850 EVO & 4X 2TB HDD (Seagate)
Display(s) 42" Panasonice LED TV @120Hz
Case Corsair 200R
Audio Device(s) Xfi Xtreme Music with Hyper X Core
Power Supply Cooler Master 700 Watts
This. I find it very strange AMD has stayed so quiet in last 72 hours. We still only have the STRANGE blog post about "certain of our processors" that doesn't even have a date.
Its not strange, its the protocol. They will have to triple confirm before they make any statement about this vulnerabilities.
 
Joined
Oct 2, 2004
Messages
13,791 (1.86/day)
The problem is AMD hasn't handled it well. AMD has had no comment other than their strange blog post acknowledging the investigation into the claimed vulnerabilities. That post wasn't even written in clear professional terms ("certain of our processors" and doesn't even have a date). Until AMD writes/speaks and either declares the vulnerabilities fake or explains complexity it will continue being a story and TPU needs to cover it. You don't get bona fide debunks from random users named "BiGchiCKens14", you get it from the company.

CTS whatever idiots gave AMD 24 hours to investigate. That's not enough time for anything, let alone give a statement. Now, compare that to Spectre/Meltdown where Intel had months to deal with it during which time execs sold Intel shares, tried to cover it up until it exploded with outrage from users who found out about it. But people are giving AMD shit for not responding in a one single day. Not to mention this one really isn't as bad of an issue as people make it to be. Spectre and Meltdown were true exploits with privilege escalation issue where non admin could access admin stuff and system. With Ryzen stuff, sure, it's still a valid thing, but to get it working in the first place you have to meet a bunch of rather absurd conditions, of which first one is having admin access.

What I see as an issue is selling of used chips thar are compromised where user had direct access to chip as admin and modified it. That is however a legit concern. Still, I wonder how such CPU would cause a concern in terms of what useful can you actually put into it permanently that would then work in a destination system as a security or privacy risk.
 
Joined
Dec 29, 2010
Messages
3,819 (0.75/day)
Processor AMD 5900x
Motherboard Asus x570 Strix-E
Cooling Hardware Labs
Memory G.Skill 4000c17 2x16gb
Video Card(s) RTX 3090
Storage Sabrent
Display(s) Samsung G9
Case Phanteks 719
Audio Device(s) Fiio K5 Pro
Power Supply EVGA 1000 P2
Mouse Logitech G600
Keyboard Corsair K95
Very good read from AnandTech. They had a recorded phone call with these so called CTS experts.

https://www.anandtech.com/show/12536/our-interesting-call-with-cts-labs


So almost all motherboards that have Asmedia chipsets, including millions of Intel motherboards, are affected by CTS self proclaimed "vuneribility" Really strange why they choose to only target AMD. I wonder.

Also the final part of their conversation is almost comical:

Anandtech: Who do you work for?
CTS: Sorry bruh gotta go.

hahaha

Don't forget this gem.

IC: Can you confirm that money changes hands with Trail of Bits?


(This was publicly confirmed by Dan Guido earlier, stating that they were expecting to look at one test out of curiosity, but 13 came through so they invoiced CTS for the work. Reuters reports that a $16000 payment was made as ToB’s verification fee for third-party vulnerability checking)


YLZ: I would rather not make any comments about money transactions and things of that nature. You are free to ask Trail of Bits.

In context, the first news was predicated on Guido's statements that these are all real exploits. And then $16,000 dollars later CTS now has a pedestal upon which preach their sermon.



And then most comical is their statement that they have 16 years of experience in the field. What field???

IC: Can you elaborate as to why you did not wait for those numbers to come through before going live?


ILO: It’s our first time around. We haven’t – I guess we should have – this really is our first rodeo.



What's even more appalling given the context is that they said that they discovered the ASMedia bugs about a year ago. That is more than ample time to legitimately report their findings. But no they sit on it waiting for the right moment to spank AMD specifically. Why AMD specifically when as they claim the bugs/back doors affect every motherboard that uses said ASMedia chips?

What we found are these backdoors that we have been describing that come built into the chips – there are two sets of backdoors, hardware backdoors and software backdoors, and we implemented clients for those backdoors. The client works on AMD Ryzen machines but it also works on any machine that has these ASMedia chipsets and so quite a few motherboards and other PCs are affected by these vulnerabilities as well.

This shit stinks to high heaven.
 
Joined
Apr 12, 2013
Messages
7,579 (1.77/day)
Fair to say CTS is FoS :laugh:

They've got lots to hide & no real answers to tough/straight questions.
 
Joined
Feb 18, 2005
Messages
5,847 (0.80/day)
Location
Ikenai borderline!
System Name Firelance.
Processor Threadripper 3960X
Motherboard ROG Strix TRX40-E Gaming
Cooling IceGem 360 + 6x Arctic Cooling P12
Memory 8x 16GB Patriot Viper DDR4-3200 CL16
Video Card(s) MSI GeForce RTX 4060 Ti Ventus 2X OC
Storage 2TB WD SN850X (boot), 4TB Crucial P3 (data)
Display(s) 3x AOC Q32E2N (32" 2560x1440 75Hz)
Case Enthoo Pro II Server Edition (Closed Panel) + 6 fans
Power Supply Fractal Design Ion+ 2 Platinum 760W
Mouse Logitech G602
Keyboard Razer Pro Type Ultra
Software Windows 10 Professional x64
I have to say, I'm really liking this anti-s**tposting feature. Being able to read through a thread knowing that all the visible posts are the high-quality ones that actually contribute to the topic at hand, as opposed to having to read every post and discard the contents of the rubbish ones, will really make my life easier. It will also encourage people to post higher quality content if they don't want to get "censored".

At the end of the day, while there is room for abuse of this feature, and it's a slippery slope and a thin red line... TPU would not have had to implement it if certain people didn't keep posting statements that are outright untrue, complete nonsense, or are of the form "LOL company <X> is teh evil because of <FUD>". I'd also encourage you to remember that these are TPU's forums, not yours, and as such they can do whatever they damn well please.

On to the topic at hand...

While I agree that actually exploiting these vulnerabilities is nowhere near as easy as Meltdown/Spectre, the fact of the matter remains that they are still vulnerabilities. Let's say that an attacker builds a phishing email that looks like it's from a motherboard vendor, and sends it to a list of email addresses obtained from one of the hundreds of account dumps online. That email redirects to a phishing website that recommends users to download an EXE from it to "patch" their computer's Ryzen vulnerabilitieis. That EXE, of course, contains code that exploits some, or all, of those vulnerabilities. Users are gonna download that file, run it, say "yes" when prompted by UAC, and boom, they're compromised.

So discarding these as "real" vulnerabilities because they need admin access is shortsighted, because users (as always) are the weakest link in computer security.
 
Joined
Jul 23, 2011
Messages
1,586 (0.32/day)
Location
Kaunas, Lithuania
System Name my box
Processor AMD Ryzen 9 5950X
Motherboard ASRock Taichi x470 Ultimate
Cooling NZXT Kraken x72
Memory 2×16GiB @ 3200MHz, some Corsair RGB led meme crap
Video Card(s) AMD [ASUS ROG STRIX] Radeon RX Vega64 [OC Edition]
Storage Samsung 970 Pro && 2× Seagate IronWolf Pro 4TB in Raid 1
Display(s) Asus VG278H + Asus VH226H
Case Fractal Design Define R6 Black TG
Audio Device(s) Using optical S/PDIF output lol
Power Supply Corsair AX1200i
Mouse Razer Naga Epic
Keyboard Keychron Q1
Software Funtoo Linux
Benchmark Scores 217634.24 BogoMIPS
They keep mentioning
>Windows Credential Guard
>Windows-based enterprise networks
>Signed driver on Windows (for chimera)

I wonder why they haven't even mentioned Linux, which, when it comes to EPYC line and to a lesser degree, Threadripper line, is basically what any sensible enterprise would be running on those.
The complete lack of mention is really odd. At the very least, they're expected to mention that it's untested, if they haven't touched that bit. But these guys? Nothing.
(Of course there's also OS X, but I am not sure if any current Apple systems have AMD cpus in them at all.)
 
Low quality post by lanlagger
Joined
Jul 16, 2016
Messages
58 (0.02/day)
System Name "size does matter"
Processor i7-6700k
Motherboard Fatal1ty Gaming Z170 Gaming-ITX
Cooling Scythe big shuriken 2
Memory Crucial Ballistix Sport 8GBx2
Video Card(s) GTX 1080 Ti Turbo (gigabyte blower) got it form 320 eur form ex miner with 2 year warranty left
Storage toshiba q300 pro 512GB (waiting for that samsung 960 pro m.2)
Display(s) 4K Samsung LU28E590DS
Case Silverstone SG13 (you can fit exactly 2 of these in bitfinex Prodigy or Fractal Nano S "m-itx" case)
Power Supply silverstone SFX SX500-LG
Software win 10 pro
I am really sad seing this Low quality posts and attitude from TPU personal !!
let me explain:
Low quality posts from TPU staff - you basically gave free Press (all they ever could wanted) to Stock price manipulators (multiple times - when lot of other tech portals stopped after first news, waiting for some more credible source confirmations).
Low quality attitude from TPU staff - sadly in this case self explanatory :(
 
Top