• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

CTS-Labs Releases Masterkey Exploit Proof-of-Concept Video

Joined
Nov 13, 2007
Messages
10,772 (1.73/day)
Location
Austin Texas
System Name stress-less
Processor 9800X3D @ 5.42GHZ
Motherboard MSI PRO B650M-A Wifi
Cooling Thermalright Phantom Spirit EVO
Memory 64GB DDR5 6000 CL30-36-36-76
Video Card(s) RTX 4090 FE
Storage 2TB WD SN850, 4TB WD SN850X
Display(s) Alienware 32" 4k 240hz OLED
Case Jonsbo Z20
Audio Device(s) Yes
Power Supply Corsair SF750
Mouse DeathadderV2 X Hyperspeed
Keyboard 65% HE Keyboard
Software Windows 11
Benchmark Scores They're pretty good, nothing crazy.
So, Windows Server on baremetal with admin access and s*itty security and intimate knowledge of hardware to be targeted.

Yes, this will affect almost a marginal percent of Epyc installations.
Right?
Isn't it much easier and more reliable to install a rootkit to the MBR?

I'm still not convinced any hacker would consider this worth the effort...
 
D

Deleted member 67555

Guest
I think CTS labs and it's employees should be black listed from any future endeavours.
 
Joined
Feb 14, 2012
Messages
2,355 (0.50/day)
System Name msdos
Processor 8086
Motherboard mainboard
Cooling passive
Memory 640KB + 384KB extended
Video Card(s) EGA
Storage 5.25"
Display(s) 80x25
Case plastic
Audio Device(s) modchip
Power Supply 45 watts
Mouse serial
Keyboard yes
Software disk commander
Benchmark Scores still running
ny privileged program (even from within Windows), can flash your system BIOS

On topic, I've long wondered why motherboards don't have a jumper to enable/disable firmware write. [Other than $$$ for a single jumper.]
 
Joined
Mar 7, 2011
Messages
4,564 (0.91/day)
I cannot paraphrase the excellent Anandtech article but I would recommend you read it.

It involves a detailed phone conversation transcript and Anandtech's critique of the knowledge gleamed. It does not deny the exploit but it clearly finds CTS to be 'financially motivated'.

https://www.anandtech.com/show/12536/our-interesting-call-with-cts-labs
Its not just Anandtech, yesterday Gamersnexus also posted video about CTS avoiding/diverting answering questions(video was deleted from my comment by moderator). This whole ordeal is becoming more and more fishy as time is passing by.
 
Joined
Jun 10, 2014
Messages
2,987 (0.78/day)
Processor AMD Ryzen 9 5900X ||| Intel Core i7-3930K
Motherboard ASUS ProArt B550-CREATOR ||| Asus P9X79 WS
Cooling Noctua NH-U14S ||| Be Quiet Pure Rock
Memory Crucial 2 x 16 GB 3200 MHz ||| Corsair 8 x 8 GB 1333 MHz
Video Card(s) MSI GTX 1060 3GB ||| MSI GTX 680 4GB
Storage Samsung 970 PRO 512 GB + 1 TB ||| Intel 545s 512 GB + 256 GB
Display(s) Asus ROG Swift PG278QR 27" ||| Eizo EV2416W 24"
Case Fractal Design Define 7 XL x 2
Audio Device(s) Cambridge Audio DacMagic Plus
Power Supply Seasonic Focus PX-850 x 2
Mouse Razer Abyssus
Keyboard CM Storm QuickFire XT
Software Ubuntu
Requiring local access to run the BIOS exploit makes it a local exploit. Most operating systems can control everything remotely.
If I log in to a server with pre-known credentials and shred its files, the shredding itself is not a remote exploit.
However, if I am able to do remote unauthenticated actions on a system, that's a remote exploit.

Being able to bypass BIOS signatures by itself is a local exploit which many would categorize as a secondary exploit. If confirmed, it's certainly serious, but nowhere near damning for AMD. But combine this with one or two other exploits, and you can execute an attack on a system.

Judging by the video, either the verification of BIOS signatures have to be defective, or the attacker is in possession of the signing key. (assuming the video is genuine)
Proper BIOS verification would require a correctly implemented public/private cryptography.
 
Joined
Feb 19, 2009
Messages
1,162 (0.20/day)
Location
I live in Norway
Processor R9 5800x3d | R7 3900X | 4800H | 2x Xeon gold 6142
Motherboard Asrock X570M | AB350M Pro 4 | Asus Tuf A15
Cooling Air | Air | duh laptop
Memory 64gb G.skill SniperX @3600 CL16 | 128gb | 32GB | 192gb
Video Card(s) RTX 4080 |Quadro P5000 | RTX2060M
Storage Many drives
Display(s) AW3423dwf.
Case Jonsbo D41
Power Supply Corsair RM850x
Mouse g502 Lightspeed
Keyboard G913 tkl
Software win11, proxmox
So riddle me this:
This exploit can override Administrator/Supervisor passwords in the UEFI if set beforehand?
Usually, even from Windows, you need that in order to flash it. This seems that from the get-go, there will be no password, however I'm not finding this hurdle being mentioned as a portential mitigation for the MASTERKEY exploit too.

We've implemented a password on our computers because our INTEL computers are also viable to this hack.
that prevention again is easy to get around if you have the hardware in front of you, but each security step is just making it less attractive but it never prevents as there will always be a security hole.
 
Joined
Feb 22, 2017
Messages
26 (0.01/day)
...and more importantly, survive reinstalls undetected.

That's the crux of it.

Yes, this is more an enterprise targeted scenario than an enduser one, but don't deny it is a problem. That makes you part of what? Certainly not the solution.

And? Can't Intel ME malware survive reinstalls? This should be as easily (or difficultly) fixed as Intel ME, and much harder to exploit. Yet this shady research seems to get more coverage that Intel ME.
 

bug

Joined
May 22, 2015
Messages
13,786 (3.96/day)
Processor Intel i5-12600k
Motherboard Asus H670 TUF
Cooling Arctic Freezer 34
Memory 2x16GB DDR4 3600 G.Skill Ripjaws V
Video Card(s) EVGA GTX 1060 SC
Storage 500GB Samsung 970 EVO, 500GB Samsung 850 EVO, 1TB Crucial MX300 and 2TB Crucial MX500
Display(s) Dell U3219Q + HP ZR24w
Case Raijintek Thetis
Audio Device(s) Audioquest Dragonfly Red :D
Power Supply Seasonic 620W M12
Mouse Logitech G502 Proteus Core
Keyboard G.Skill KM780R
Software Arch Linux + Win10
I cannot paraphrase the excellent Anandtech article but I would recommend you read it.

It involves a detailed phone conversation transcript and Anandtech's critique of the knowledge gleamed. It does not deny the exploit but it clearly finds CTS to be 'financially motivated'.

https://www.anandtech.com/show/12536/our-interesting-call-with-cts-labs
Not that argument again. Google pays hackers to find exploits in their browser. Does that make exploits less risky?
 
Joined
Feb 5, 2016
Messages
171 (0.05/day)
Location
Sthlm
System Name Vamos
Processor Ryzen 5 3600
Motherboard Gigabyte B450 I Aorus Pro WiFi
Cooling Dark Rock Slim
Memory 2x8GB XPG 3600MHz
Video Card(s) RX 5700 XT PowerColor
Storage WD SN550 1TB, Seagate 2TB HDD
Display(s) AOC CQ32G1
Case Jonsbo V8
Audio Device(s) Logitech G633, Presonus E3.5
Power Supply Fractal Design Ion SFX-L 650W Gold
Mouse Logitech G502
Keyboard Logitech G513 Carbon
Software Win 10 Home
It doesn't appear anyone has profited from any short selling of any meaningful volume. AMD stock has been relatively unchanged over the last week at a lower than normal volume. It is definitely possible it was long term financially motivated. It reminds people AMD put recent products together on a shoe string budget and leaves people wondering if these vulnerabilities are real and how many vulnerabilities lay in waiting. Also, "financially motivated" sometimes signals discrediting or minimizing and it shouldn't. Every step a company makes is financially motivated. If you held to that theory AMD marketing would be minimized since it is "financially motivated". I remind everyone 7 days later AMD has only acknowledged these vulnerabilities and hasn't discredited or explained how low risk they are. That is way too long for a professional company to manage PR.
Remind us how many months Intel had before spectre and meltdown became public? And even then they had no response for how many days? Plus they even released whole new gen of CPUs knowing they were vulnerable to spectre and meltdown.
 
Joined
Aug 20, 2007
Messages
21,476 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
And? Can't Intel ME malware survive reinstalls? This should be as easily (or difficultly) fixed as Intel ME, and much harder to exploit. Yet this shady research seems to get more coverage that Intel ME.

Personally, I think the reason it's getting more coverage is the user response. Love it or hate it users have been enthusiastically replying. There is no technical reason either one is worse... yet anyways.
 

W1zzard

Administrator
Staff member
Joined
May 14, 2004
Messages
27,850 (3.71/day)
Processor Ryzen 7 5700X
Memory 48 GB
Video Card(s) RTX 4080
Storage 2x HDD RAID 1, 3x M.2 NVMe
Display(s) 30" 2560x1600 + 19" 1280x1024
Software Windows 10 64-bit
On topic, I've long wondered why motherboards don't have a jumper to enable/disable firmware write. [Other than $$$ for a single jumper.]
This is no longer viable since modern BIOSes, in particular UEFI use the BIOS flash to store some data.
 
Joined
Sep 15, 2007
Messages
3,946 (0.63/day)
Location
Police/Nanny State of America
Processor OCed 5800X3D
Motherboard Asucks C6H
Cooling Air
Memory 32GB
Video Card(s) OCed 6800XT
Storage NVMees
Display(s) 32" Dull curved 1440
Case Freebie glass idk
Audio Device(s) Sennheiser
Power Supply Don't even remember
...and more importantly, survive reinstalls undetected.

That's the crux of it.

Yes, this is more an enterprise targeted scenario than an enduser one, but don't deny it is a problem. That makes you part of what? Certainly not the solution.

You can definitely do this on Intel, too....it's a hit piece they won't give up.

Anyone defending this crap makes them a shill, whether they have the brains to know it or not.
 
Joined
Apr 16, 2010
Messages
3,600 (0.67/day)
Location
Portugal
System Name LenovoⓇ ThinkPad™ T430
Processor IntelⓇ Core™ i5-3210M processor (2 cores, 2.50GHz, 3MB cache), Intel Turbo Boost™ 2.0 (3.10GHz), HT™
Motherboard Lenovo 2344 (Mobile Intel QM77 Express Chipset)
Cooling Single-pipe heatsink + Delta fan
Memory 2x 8GB KingstonⓇ HyperX™ Impact 2133MHz DDR3L SO-DIMM
Video Card(s) Intel HD Graphics™ 4000 (GPU clk: 1100MHz, vRAM clk: 1066MHz)
Storage SamsungⓇ 860 EVO mSATA (250GB) + 850 EVO (500GB) SATA
Display(s) 14.0" (355mm) HD (1366x768) color, anti-glare, LED backlight, 200 nits, 16:9 aspect ratio, 300:1 co
Case ThinkPad Roll Cage (one-piece magnesium frame)
Audio Device(s) HD Audio, RealtekⓇ ALC3202 codec, DolbyⓇ Advanced Audio™ v2 / stereo speakers, 1W x 2
Power Supply ThinkPad 65W AC Adapter + ThinkPad Battery 70++ (9-cell)
Mouse TrackPointⓇ pointing device + UltraNav™, wide touchpad below keyboard + ThinkLight™
Keyboard 6-row, 84-key, ThinkVantage button, spill-resistant, multimedia Fn keys, LED backlight (PT Layout)
Software MicrosoftⓇ WindowsⓇ 10 x86-64 (22H2)
On topic, I've long wondered why motherboards don't have a jumper to enable/disable firmware write. [Other than $$$ for a single jumper.]
Well, UEFI needs to have a write state for Secure Boot stuff (and some other stuff). You do have software "locks" in the form of options to prevent flashing.
We've implemented a password on our computers because our INTEL computers are also viable to this hack.
that prevention again is easy to get around if you have the hardware in front of you, but each security step is just making it less attractive but it never prevents as there will always be a security hole.
Right, but considering this one, the hole seems to be only there if the hardware isn't secured with a password to begin with.
 
Joined
May 6, 2012
Messages
184 (0.04/day)
Location
Estonia
System Name Steamy
Processor Ryzen 7 2700X
Motherboard Asrock AB350M-Pro4
Cooling Wraith Prism
Memory 2x8GB HX429C15PB3AK2/16
Video Card(s) R9 290X WC
Storage 960Evo 500GB nvme
Case Fractal Design Define Mini C
Power Supply Seasonic SS-660XP2
Software Windows 10 Pro
Benchmark Scores http://hwbot.org/user/kinski/ http://valid.x86.fr/qfxqhj https://goo.gl/uWkw7n
https://community.amd.com/community...amd-technical-assessment-of-cts-labs-research

https://www.anandtech.com/show/12556/amd-confirms-exploits-patched-in-weeks
The salient high-level takeaway from AMD is this:

  1. All the issues can be confirmed on related AMD hardware, but require Admin Access at the metal
  2. All the issues are set to be fixed within weeks, not months, through firmware patches and BIOS updates
  3. No performance impact expected
  4. None of these issues are Zen-specific, but relate to the PSP and ASMedia chipsets.
  5. These are not related to the GPZ exploits earlier this year.

Can we now, please, have big banners with FUD written on them ?
 
Joined
Apr 18, 2015
Messages
234 (0.07/day)
SO what did they prove, that you can load a bios from remote with Admin?

You can do this on any PC and consequences can be just as bad as updating a firmware for the security processor.

https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/

Quote from the above:
"There is no immediate risk of exploitation of these vulnerabilities for most users. Even if the full details were published today, attackers would need to invest significant development efforts to build attack tools that utilize these vulnerabilities. This level of effort is beyond the reach of most attackers (see https://www.usenix.org/system/files/1401_08-12_mickens.pdf, Figure 1) "
 
Last edited:
Joined
Aug 20, 2007
Messages
21,476 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Can we now, please, have big banners with FUD written on them ?

Did we do that with the Intel ME issues?

No? Then no, sorry.

SO what did they prove, that you can load a bios from remote with Admin?

You can do this on any PC.

You aren't supposed to be able to replace ME and PSP bios areas. They are signed.

Seriously, quit fanboying out of the woodwork to defend AMD and call anything against it "FUD." This is rather sickening and I LIKE AMD.
 
Joined
May 6, 2012
Messages
184 (0.04/day)
Location
Estonia
System Name Steamy
Processor Ryzen 7 2700X
Motherboard Asrock AB350M-Pro4
Cooling Wraith Prism
Memory 2x8GB HX429C15PB3AK2/16
Video Card(s) R9 290X WC
Storage 960Evo 500GB nvme
Case Fractal Design Define Mini C
Power Supply Seasonic SS-660XP2
Software Windows 10 Pro
Benchmark Scores http://hwbot.org/user/kinski/ http://valid.x86.fr/qfxqhj https://goo.gl/uWkw7n
I meant that figuratively.

An update to article.

The FUD was FUD all along.
 

bug

Joined
May 22, 2015
Messages
13,786 (3.96/day)
Processor Intel i5-12600k
Motherboard Asus H670 TUF
Cooling Arctic Freezer 34
Memory 2x16GB DDR4 3600 G.Skill Ripjaws V
Video Card(s) EVGA GTX 1060 SC
Storage 500GB Samsung 970 EVO, 500GB Samsung 850 EVO, 1TB Crucial MX300 and 2TB Crucial MX500
Display(s) Dell U3219Q + HP ZR24w
Case Raijintek Thetis
Audio Device(s) Audioquest Dragonfly Red :D
Power Supply Seasonic 620W M12
Mouse Logitech G502 Proteus Core
Keyboard G.Skill KM780R
Software Arch Linux + Win10
You can definitely do this on Intel, too....it's a hit piece they won't give up.

Anyone defending this crap makes them a shill, whether they have the brains to know it or not.
Fair enough.
What do we call those that dismiss this before other experts weigh in*? Clairvoyants maybe?

*A handful of them have and declared the vulerabilities real.
 
Joined
May 6, 2012
Messages
184 (0.04/day)
Location
Estonia
System Name Steamy
Processor Ryzen 7 2700X
Motherboard Asrock AB350M-Pro4
Cooling Wraith Prism
Memory 2x8GB HX429C15PB3AK2/16
Video Card(s) R9 290X WC
Storage 960Evo 500GB nvme
Case Fractal Design Define Mini C
Power Supply Seasonic SS-660XP2
Software Windows 10 Pro
Benchmark Scores http://hwbot.org/user/kinski/ http://valid.x86.fr/qfxqhj https://goo.gl/uWkw7n
Joined
Sep 15, 2007
Messages
3,946 (0.63/day)
Location
Police/Nanny State of America
Processor OCed 5800X3D
Motherboard Asucks C6H
Cooling Air
Memory 32GB
Video Card(s) OCed 6800XT
Storage NVMees
Display(s) 32" Dull curved 1440
Case Freebie glass idk
Audio Device(s) Sennheiser
Power Supply Don't even remember
Fair enough.
What do we call those that dismiss this before other experts weigh in*? Clairvoyants maybe?

*A handful of them have and declared the vulerabilities real.

It can be dismissed, b/c it's NOT s serious threat. This should have been reported to AMD and ASmedia as per normal procedure and let them fix it. Instead, it was made into an opinion piece attacking AMD for market manipulation by idiots funded by an unknown source.
 

bug

Joined
May 22, 2015
Messages
13,786 (3.96/day)
Processor Intel i5-12600k
Motherboard Asus H670 TUF
Cooling Arctic Freezer 34
Memory 2x16GB DDR4 3600 G.Skill Ripjaws V
Video Card(s) EVGA GTX 1060 SC
Storage 500GB Samsung 970 EVO, 500GB Samsung 850 EVO, 1TB Crucial MX300 and 2TB Crucial MX500
Display(s) Dell U3219Q + HP ZR24w
Case Raijintek Thetis
Audio Device(s) Audioquest Dragonfly Red :D
Power Supply Seasonic 620W M12
Mouse Logitech G502 Proteus Core
Keyboard G.Skill KM780R
Software Arch Linux + Win10
It can be dismissed, b/c it's NOT s serious threat. This should have been reported to AMD and ASmedia as per normal procedure and let them fix it. Instead, it was made into an opinion piece attacking AMD for market manipulation by idiots funded by an unknown source.
But what do you know? It's real: https://community.amd.com/community...amd-technical-assessment-of-cts-labs-research

It's true that they require admin access first (we already knew that), but the problem is they're a vector to installing further backdoors.
Problem reported, problem (soon to be) solved. I hope we can all move along now.
 
Joined
May 6, 2012
Messages
184 (0.04/day)
Location
Estonia
System Name Steamy
Processor Ryzen 7 2700X
Motherboard Asrock AB350M-Pro4
Cooling Wraith Prism
Memory 2x8GB HX429C15PB3AK2/16
Video Card(s) R9 290X WC
Storage 960Evo 500GB nvme
Case Fractal Design Define Mini C
Power Supply Seasonic SS-660XP2
Software Windows 10 Pro
Benchmark Scores http://hwbot.org/user/kinski/ http://valid.x86.fr/qfxqhj https://goo.gl/uWkw7n
It's a threat, but the impact was incorrect and possible usage very limited. Assessment that fixing is impossible or will take very long time didnt hold aswell.

As such it's nothing but FUD based on how it was represented.

Vector for installing backdoors on systems where you have unsupervised access and OS is on baremetal and where you have admin and where BIOS flash is allowed. I can install a lot of backdoors on such system. No exploits needed, actually.
 

bug

Joined
May 22, 2015
Messages
13,786 (3.96/day)
Processor Intel i5-12600k
Motherboard Asus H670 TUF
Cooling Arctic Freezer 34
Memory 2x16GB DDR4 3600 G.Skill Ripjaws V
Video Card(s) EVGA GTX 1060 SC
Storage 500GB Samsung 970 EVO, 500GB Samsung 850 EVO, 1TB Crucial MX300 and 2TB Crucial MX500
Display(s) Dell U3219Q + HP ZR24w
Case Raijintek Thetis
Audio Device(s) Audioquest Dragonfly Red :D
Power Supply Seasonic 620W M12
Mouse Logitech G502 Proteus Core
Keyboard G.Skill KM780R
Software Arch Linux + Win10
It's a threat, but the impact was incorrect and possible usage very limited. Assessment that fixing is impossible or will take very long time didnt hold aswell.

As such it's nothing but FUD based on how it was represented.

Vector for installing backdoors on systems where you have unsupervised access and OS is on baremetal and where you have admin and where BIOS flash is allowed. I can install a lot of backdoors on such system. No exploits needed, actually.
At this point I'm not sure if you can't or won't understand why these issues are real. Not sev 1 real, but not something that could live on your system unpatched either.
 
Joined
May 6, 2012
Messages
184 (0.04/day)
Location
Estonia
System Name Steamy
Processor Ryzen 7 2700X
Motherboard Asrock AB350M-Pro4
Cooling Wraith Prism
Memory 2x8GB HX429C15PB3AK2/16
Video Card(s) R9 290X WC
Storage 960Evo 500GB nvme
Case Fractal Design Define Mini C
Power Supply Seasonic SS-660XP2
Software Windows 10 Pro
Benchmark Scores http://hwbot.org/user/kinski/ http://valid.x86.fr/qfxqhj https://goo.gl/uWkw7n
Which part of "it's a threat" specifically did you found difficult to understand?
 

bug

Joined
May 22, 2015
Messages
13,786 (3.96/day)
Processor Intel i5-12600k
Motherboard Asus H670 TUF
Cooling Arctic Freezer 34
Memory 2x16GB DDR4 3600 G.Skill Ripjaws V
Video Card(s) EVGA GTX 1060 SC
Storage 500GB Samsung 970 EVO, 500GB Samsung 850 EVO, 1TB Crucial MX300 and 2TB Crucial MX500
Display(s) Dell U3219Q + HP ZR24w
Case Raijintek Thetis
Audio Device(s) Audioquest Dragonfly Red :D
Power Supply Seasonic 620W M12
Mouse Logitech G502 Proteus Core
Keyboard G.Skill KM780R
Software Arch Linux + Win10
Which part of "it's a threat" specifically did you found difficult to understand?
The part where you put "it's a threat" and "it's nothing but FUD" in the same post.

Edit: also, no BIOS flash needed, read the latest update on the original article.
 
Top