Breaking News

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series TEAMGROUP Launches EXPERT P34F Find My External SSD NIKON RELEASES A NEW SILVER EDITION OF THE Z F FULL-FRAME MIRRORLESS CAMERA JSAUX Showcases Upcoming Switch 2 Ecosystem Solutions Ahead of IFA Berlin 2025 Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

AMD to Fix 13 processors Vulnerabilities Reported by  CTS Labs Research

AMD to Fix 13 processors Vulnerabilities Reported by CTS Labs Research

PC components Mar 20,2018 0

AMD has released the first update regarding the security vulnerabilities involving some AMD products reported by CTS Labs, and the first updates are coming in the following weeks.

The security issues identified by the third-party researchers are not related to the AMD Zen CPU architecture or the Google Project Zero exploits made public Jan. 3, 2018. These issues are associated with the firmware managing the embedded security control processor in some of AMD products (AMD Secure Processor) and the chipset used in some socket AM4 and socket TR4 desktop platforms supporting AMD processors.

AMD has completed its assessment and is in the process of developing and staging the deployment of mitigations. All the issues raised in the research require administrative access to the system, a type of access that effectively grants the user unrestricted access to the system and the right to delete, create or modify any of the folders or files on the computer, as well as change any settings. Any attacker gaining unauthorized administrative access would have a wide range of attacks at their disposal well beyond the exploits identified in this research. Further, all modern operating systems and enterprise-quality hypervisors today have many effective security controls, such as Microsoft Windows Credential Guard in the Windows environment, in place to prevent unauthorized administrative access that would need to be overcome in order to affect these security issues.

The security issues identified are grouped into three major categories. The table below describes the categories, the AMD assessment of impact, and planned actions:

Vulnerability Groups

Problem Description & Method of Exploitation

Potential Impact

Planned AMD Mitigation

MASTERKEY

and

PSP Privilege Escalation

(AMD Secure Processor or "PSP"firmware)

Issue: Attacker who already has compromised the security of a system updates flash to corrupt its contents. AMD Secure Processor (PSP) checks do not detect the corruption.

 

Method: Attacker requires Administrative access

Attacker can circumvent platform security controls. These changes are persistent following a system reboot.

Firmware patch release through BIOS update. No performance impact is expected.

 

AMD is working on PSP firmware updates that we plan to release in the coming weeks.

 

RYZENFALL and FALLOUT

 

(AMD Secure Processor firmware)

 

Issue: Attacker who already has compromised the security of a system writes to AMD Secure Processor registers to exploit vulnerabilities in the interface between x86 and AMD Secure Processor (PSP).

 

Method: Attacker requires Administrative access.

 

Attacker can circumvent platform security controls but is not persistent across reboots.

 

Attacker may install difficult to detect malware in SMM (x86).

 

Firmware patch release through BIOS update. No performance impact is expected.

 

AMD is working on PSP firmware updates that we plan to release in the coming weeks.

Promotory
Chipset

CHIMERA

"Promontory"chipset used in many socket AM4 desktop and socket TR4 high-end desktop (HEDT) platforms.

AMD EPYC server platforms, EPYC and Ryzen Embedded platforms, and AMD Ryzen Mobile FP5 platforms do not use the "Promontory"chipset.

Issue: Attacker who already has compromised the security of a system installs a malicious driver that exposes certain Promontory functions.

 

Method: Attacker requires Administrative access.

Attacker accesses physical memory through the chipset.

 

Attacker installs difficult to detect malware in the chipset but is not persistent across reboots.

Mitigating patches released through BIOS update. No performance impact is expected.

 

AMD is working with the third-party provider that designed and manufactured the "Promontory"chipset on appropriate mitigations.

Mark Papermaster, Senior Vice President and Chief Technology Officer at AMD, promised to provide additional updates on both the company's analysis of these issues and the related mitigation plans in the coming weeks.

Tags: AMD
Previous Post
Facebook to Respond to FTC Questions Over Cambridge Analytica Case
Next Post
Microsoft Announces Project Denali SSD For Cloud-scale Applications

Related Posts

  • IBM and AMD Join Forces to Build the Future of Computing

  • AMD Introduces New Radeon Graphics Cards and Ryzen Threadripper Processors at COMPUTEX 2025

  • AMD Announces Press Conference at COMPUTEX 2025

  • ASUS Republic of Gamers Unveils Crosshair X870E Extreme, Apex Motherboards

  • ASRock gives more information about AMD CPUs and their products

  • ASRock and Asus announce Radeon RX 9070 XT and Radeon RX 9070 Graphics Cards

  • AMD Unveils Radeon RX 9000 Series Graphics Cards

  • ASRock AM5 Motherboards Now Fully Support AMD Ryzen 9 9950X3D & 9900X3D Processors

Latest News

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series
Smartphones

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series

TEAMGROUP Launches EXPERT P34F Find My External SSD
Consumer Electronics

TEAMGROUP Launches EXPERT P34F Find My External SSD

NIKON RELEASES A NEW SILVER EDITION OF THE Z F FULL-FRAME MIRRORLESS CAMERA
Cameras

NIKON RELEASES A NEW SILVER EDITION OF THE Z F FULL-FRAME MIRRORLESS CAMERA

JSAUX Showcases Upcoming Switch 2 Ecosystem Solutions Ahead of IFA Berlin 2025
Gaming

JSAUX Showcases Upcoming Switch 2 Ecosystem Solutions Ahead of IFA Berlin 2025

Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities
Cameras

Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

Noctua NH-D15 G2

Noctua NH-D15 G2

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Soundpeats Pop Clip

Soundpeats Pop Clip

be quiet! Pure Base 501

be quiet! Pure Base 501

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed