Tuesday, March 13th 2018

13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

Security researchers with Israel-based CTS-Labs, have discovered a thirteen security vulnerabilities for systems based on AMD Zen processors. The thirteen new exploits are broadly classified into four groups based on the similarity in function of the processor that they exploit: "Ryzenfall," "Masterkey," "Fallout," and "Chimera."

The researchers "believe that networks that contain AMD computers are at a considerable risk," and that malware can "survive computer reboots and re-installations of the operating system, while remaining virtually undetectable by most endpoint security solutions," such as antivirus software. They also mention that in their opinion, "the basic nature of some of these vulnerabilities amounts to complete disregard of fundamental security principles. This raises concerning questions regarding security practices, auditing, and quality controls at AMD."
Since this story went up some follow ups were posted:1. "Masterkey": This is an exploit of the Secure Boot feature, which checks if nothing has been tampered with on your machine while it was powered down (i.e. changes in firmware, hardware, or the last software state before shutdown). The Masterkey vulnerability gets around this environment integrity check by using an infected system BIOS, which can be flashed even from within Windows (with administrative privileges). This does not mean that the user has to modify and flash the BIOS manually before becoming vulnerable, the malware can do that on the fly once it is running. Theoretically, Secure Boot should validate the integrity of the BIOS, but apparently this can be bypassed, exploiting bugs in the Secure Processor's metadata parsing. Once the BIOS signature is out of the way, you can put pretty much any ARM Cortex A5 compatible code into the modified BIOS, which will then execute inside the ARM-based Secure Processor - undetectable to any antivirus software running on the main CPU, because the antivirus software running on the CPU has no way to scan inside the Secure Processor.

2. "Ryzenfall" is a class of vulnerabilities targeting Secure Processor, which lets a well-designed malware stash its code into the Secure Processor of a running system, to get executed for the remainder of the system's up-time. Again, this attack requires administrative privileges on the host machine, but can be performed in real-time, on the running system, without modifying the firmware. Secure Processor uses system RAM, in addition to its own in-silicon memory on the processor's die. While this part of memory is fenced off from access by the CPU, bugs exist that can punch holes into that protection. Code running on the Secure Processor has complete access to the system; Microsoft Virtualization-based Security (VBS) can be bypassed and additional malware can be placed into system management storage, where it can't be detected by traditional antivirus software. Windows Defender Credentials Guard, a component that stores and authenticates passwords and other secure functions on the machine, can also be bypassed and the malware can spread over the network to other machines, or the firmware can be modified to exploit "Masterkey", which persists through reboots, undetectable.

3. "Fallout": This class of vulnerabilities affects only AMD EPYC servers. It requires admin privileges like the other exploits, and has similar effects. It enables an attacker to gain access to memory regions like Windows Isolated User Mode / Kernel Mode (VTL1) and Secure Management RAM of the CPU (which are not accessible, even with administrative privileges). Risks are the same as "Ryzenfall", the attack vector is just different.

4. "Chimera": This class of vulnerabilities is an exploitation of the motherboard chipset (e.g. X370 also known as Promontory). AMD outsourced design of their Ryzen chipsets to Taiwanese ASMedia, which is a subsidiary of ASUS. You might know the company from the third-party USB 3.0 and legacy PCI chips on many motherboards. The company has been fined for lax security practices in the past, and numerous issues were found in their earlier controller chips. For the AMD chipset, it looks like they just copy-pasted a lot of code and design, including vulnerabilities. The chipset runs its own code that tells it what to do, and here's the problem: Apparently a backdoor has been implemented that gives any attacker knowing the right passcode full access to the chipset, including arbitrary code execution inside the chipset. This code can now use the system's DMA (direct memory access) engine to read/write system memory, which allows malware injection into the OS. To exploit this attack vector, administrative privileges are required. Whether DMA can access the fenced off memory portions of the Secure Processor, to additionally attack the Secure Processor through this vulnerability, is not fully confirmed, however, the researchers verified it works on a small number of desktop boards. Your keyboard, mouse, network controllers, wired or wireless, are all connected to the chipset, which opens up various other attack mechanisms like keyloggers (that send off their logs by directly accessing the network controller without the CPU/OS ever knowing about these packets), or logging all interesting network traffic, even if its destination is another machine on the same Ethernet segment. As far as we know, the tiny 8-pin serial ROM chip is connected to the CPU on AMD Ryzen platform, not to the chipset or LPCIO controller, so infecting the firmware might not be possible with this approach. A second backdoor was found that is implemented in the physical chip design, so it can't be mitigated by a software update, and the researchers hint at the requirement for a recall.

AMD's Vega GPUs use an implementation of the Secure Processor, too, so it is very likely that Vega is affected in a similar way. An attacker could infect the GPU, and then use DMA to access the rest of the system through the attacks mentioned above.

The researchers have set up the website AMDFlaws.com to chronicle these findings, and to publish detailed whitepapers in the near future.

AMD provided us with the following statement: "We have just received a report from a company called CTS Labs claiming there are potential security vulnerabilities related to certain of our processors. We are actively investigating and analyzing its findings. This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings. At AMD, security is a top priority and we are continually working to ensure the safety of our users as potential new risks arise."

Update March 14 7 AM CET: It seems a lot of readers misunderstand the BIOS flashing part. The requirement is not that the user has to manually flash a different BIOS first before becoming vulnerable. The malware itself will modify/flash the BIOS once it is running on the host system with administrative privileges. Also, the signed driver requirement does not require a driver from any specific vendor. The required driver (which is not for an actual hardware device and just provides low-level hardware access) can be easily created by any hacker. Signing the driver, so Windows accepts it, requires a digital signature which is available from various SSL vendors for a few hundred dollars after a fairly standard verification process (requires a company setup with bank account). Alternatively an already existing signed driver from various hardware utilities could be extracted and used for this purpose.
Source: Many Thanks to Earthdog for the tip
Add your own comment

482 Comments on 13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

#51
the54thvoid
Intoxicated Moderator
So, the first 3 exploits require admin rights.... Okay - panic over, put your pitchforks away and go home people.

The last is hypothesised and not fully verified. It also is ASMedia's fault(?) so if there is any real issue (unlikely), any recall may be at their expense.

Finally, just for some layperson perspective.

The first 3 expoits all need admin rights. Effectively, that means your PC is vulnerable to, well pretty much you. Duh..... Here are some more exploits from the54thvoid's Bug Factory that you may be liable to:

Coffee Hack - If you spill coffee into your PC case - it might not work anymore.
Porn Wrist - Certain websites you visit may give you RSI.
Dark Souls Impact Bug - Playing Dark Souls may result in a broken mouse or keyboard. Or desk. Or bruised knuckles.
Posted on Reply
#52
CrAsHnBuRnXp
Who wants to pool money together and get some AMD stock? :toast:
Posted on Reply
#53
EarthDog
CrAsHnBuRnXpWho wants to pool money together and get some AMD stock? :toast:
Ill bet Viceroy is...
Posted on Reply
#54
Durvelle27
CrAsHnBuRnXpWho wants to pool money together and get some AMD stock? :toast:
I’m down :peace:
Posted on Reply
#55
Fouquin
Hmmm what an interesting connection in the CTS Labs contact page.

www.bevelpr.com/

Why would an infosec research firm have an external marketing department... Or is it the other way around? :)

I can smell the money from here.
Posted on Reply
#56
W1zzard
the54thvoidSo, the first 3 exploits require admin rights.... Okay - panic over, put your pitchforks away and go home people.

The last is hypothesised and not fully verified. It also is ASMedia's fault(?) so if there is any real issue (unlikely), any recall may be at their expense.
They all require admin rights, I'll clarify in the original post.

For the last: what is not fully verified is whether DMA can write into the fenced off memory, the rest like keylogging and sniffing network is confirmed according to the researchers.

Clarified the original post: "To exploit this attack vector, administrative privileges are required. Whether DMA can access the fenced off memory portions of the Secure Processor, to additionally attack the Secure Processor through this vulnerability, is not fully confirmed, however, the researchers verified it works on a small number of desktop boards."
Posted on Reply
#57
EarthDog
Lets assume its true or not....doesnt matter. If you published this data, do you honestly expect them to be able to handle the inquiries? Even if its just BS?

I understand why it looks bad, but, at the same time, it doesnt take much thought to realize its needed (PR company) when releasing this kind of info...
Posted on Reply
#58
Manu_PT
This is really bad! Did you guys read the full disclosure? Good luck with zen+. Is a shame because amd was starting to bring competition
Posted on Reply
#59
efikkan
I really dislike the trend of giving all "major" vulnerabilities nicknames.

The details of these new claims remains to be confirmed by other parties. But it should come as no surprise to anyone that a lot of hardware is riddled with vulnerabilities, since the general mentality in the industry is to deal with security concerns the public is aware of exploits. This problem is a known fact for other hardware, especially networking equipment. Almost every router have known exploits which are never fixed, both cheap consumer gear and high-end enterprise equipment. Most vulnerabilities fall into the categories of carelessness by developers or built-in debugging/support features.

If anything the press should focus on the underlying problem of designing for security rather than making up nicknames and focusing too much on singular edge cases.
Posted on Reply
#60
mtcn77
W1zzardReworked most of the article and added AMD's statement
I read the article. You changed Chimera's status from bios "flashable" to "non-flashable", is that correct?
Posted on Reply
#61
theGryphon
Manu_PTThis is really bad! Did you guys read the full disclosure? Good luck with zen+. Is a shame because amd was starting to bring competition
No it's not as bad as it is flashy. Even if all is true, it's not nearly at the same level of Intel vulnerabilities. Have you read it?
Posted on Reply
#62
john_
Ryzenfall, AMDflaws site, only 24 hours given to AMD.

Many many jokes are coming in my mind about Jews and dollars. I would like to apologize in advance about this.
Posted on Reply
#63
dyonoctis
Wow. amdflaws.com is so well made. The website is clean, looks modern, with interview on green screen, motion design used to explain the flaws. They made a youtube channel just for that. It's not even technical they are explaining what's a cpu and a chipset.
They are checking all the point needed to impress someone who isn't tech-savyy.

That's remind me all of those video to learn how to make to money with a secret that banks and millionaire don't want to share.

Even IF this is end up to be true the effort they made on communication can't hide a malicious intent.
Posted on Reply
#65
W1zzard
mtcn77I read the article. You changed Chimera's status from bios "flashable" to "non-flashable", is that correct?
Chimera allows you to run arbitrary code in the chipset. If the BIOS chip was connected directly to the chipset, then this would enable silent flashing in any system state as long as the chipset has power.

Since the BIOS chip is connected to the CPU on Zen, this is not possible, at least not directly. It's still possible to use DMA to write code into the CPU memory, which then gets executed, which then flashes the ROM.

Edit: I'll research whether the chipset is connected to the SPI bus on which the ROM lives.

Edit: Not connected to the SPI bus, not sure if true for all board models though
Posted on Reply
#66
Chaitanya
W1zzardThey all require admin rights, I'll clarify in the original post.

For the last: what is not fully verified is whether DMA can write into the fenced off memory, the rest like keylogging and sniffing network is confirmed according to the researchers.

Clarified the original post: "To exploit this attack vector, administrative privileges are required. Whether DMA can access the fenced off memory portions of the Secure Processor, to additionally attack the Secure Processor through this vulnerability, is not fully confirmed, however, the researchers verified it works on a small number of desktop boards."
Considering the paper is not peer-reviewed and fishy behaviour of AMD and press being notified at the same time with only 24hr period given to AMD. The article should mention those researchers in double quotes. Also what is with TPU eagerly posting clickbait articles with highly questionable unverified/non peer-reviewed whitepapers shame on you guys for this behaviour.
Posted on Reply
#67
nemesis.ie
Meanwhile, as I type, AMD's share price is INCREASING ...
Posted on Reply
#68
RejZoR
W1zzardSource on that?
"The Masterkey vulnerability gets around this environment integrity check by using an infected system BIOS, which can be flashed even from within Windows (with administrative privileges)."

It means the modification has to be highly specific for a target computer. You can't just flash some BIOS, it has to be for that specific board. Chances of applying this in practice on a mass scale is totally unlikely because there is just too many variables involved starting with endless variants of motherboards. It's still an issue when it comes to a targeted attack of a particular workstation (assuming user has admin rights access to do it). The rest of vulnerabilities are a lot more problematic because you can apply them on large scale.
Posted on Reply
#69
srsbsns
Redflags

1. AMD given 24 hour ransom style notice this was going out. = bad faith.. Spectre and Meltdown were known for months to allow for mitigations to be produced.
2. The company domain was registered in February.
3. There is a disclaimer on the report that says says "you are advised that we may have, either directly or indirectly, an economic interest in the performance of the securities of the companies whose products are the subject of our reports." Looks like they are trying to tank stock to buy it up on the cheap because they expect Ryzen+ to boost AMD's financials.
4. Timing of the release is 1 year exactly from Ryzen release date.
5. Slides/presentation has production quality to deliver maximum impact. This is not the status quo for this type of research.
6. They fail to point out very clearly these alleged vulnerabilities require admin privileges. This is unlike Spectre and Meltdown.

Did I miss any?
Posted on Reply
#70
mtcn77
W1zzardChimera allows you to run arbitrary code in the chipset. If the BIOS chip was connected directly to the chipset, then this would enable silent flashing in any system state as long as the chipset has power.

Since the BIOS chip is connected to the CPU on Zen, this is not possible, at least not directly. It's still possible to use DMA to write code inside the CPU memory, which then gets executed, which then flashes the ROM.

Edit: I'll research whether the chipset is connected to the SPI bus on which the ROM lives.
What I took from the first edition was, you needed that "Masterkey" in order for that to work(system memory addressing to PSP memory still wasn't possible), otherwise the system integrity check would bust it out since it is still blocked from any other vector than Masterkey.
This version is more cryptic, good luck to the readers.
Posted on Reply
#71
TheLostSwede
News Editor
According to what Anandtech has mentioned about these "flaws", not only would you need admin access, but also a signed driver.
As far as I'm aware, it's not very easy to get a signed driver for Windows these days, as Microsoft does a fair amount of testing, especially on drivers from new companies.
I'm also not aware of any other way to get an authentic signed driver that will install without kicking up a major fuss.

Let's wait and see what the fallout (sorry) of this will be, but it's obviously not good news if any of this proves to be true. On the other hand, it seems like a lot of it can be patched in software without causing any performance related issues, since none of these claimed vulnerabilities would affect the system performance as it looks.

Also, why would the CFO of a security company be in a video about security vulnerabilities? That makes no sense at all...
And why do they sound Russian rather than Israeli?

Edit: Also, why would AMD's CPU's have the same security issues as ASMedia's chips? The chipset, sure, but the CPU's, no. The "CEO" claim they found these issues when they were looking into the security of chips made by ASMedia and then somehow found the same "back doors" that they found in ASMedia chips were in AMD's processors. This makes no sense at all.

Also note that the so called whitepaper is located at safefirmware.com, i.e. an entirely different website. Does that mean this is some kind of scam to make money from some kind of alternative UEFI/firmware implementation?


Edit 2: A quick look on LinkedIn shows the Co-Founder at CEO of CTS Labs with a five year gap since his last job, which was for some kind of software cyber security company that is now part of Magic Leap (yes, that company). It makes you wonder how someone like this comes out of nowhere to become the face of something like this.

As to my comment above about sounding Russian, I guess the CFO and one other guy actually speaks Russian, so it might just "colour" their English.
Posted on Reply
#72
W1zzard
mtcn77What I took from the first edition was, you needed that "Masterkey" in order for that to work, otherwise the system integrity check would bust it out since it is still blocked from any other vector than Masterkey.
This version is more cryptic, good luck to the readers.
Yes, you need the masterkey to execute Chimera. The Secure Processor firmware validation or UEFI validation has nothing to do with this attack and can not prevent it.
Posted on Reply
#73
Recus
But AMD/Intel common enemy is Nvidia. Why would Intel publish fake story about AMD?
One thing we know is that NVIDIA has made a lot of enemies over the years. You can easily put AMD, Apple, and Intel on that list. We think that GPP is somewhat the result of those "feuds" with NVIDIA attempting to gain more control over the market as it is seeing its competitors developing products (ie AMD and Intel partnerships on products) that will not be open to NVIDIA.
Posted on Reply
#74
the54thvoid
Intoxicated Moderator
dyonoctisWow. amdflaws.com is so well made. The website is clean, looks modern, with interview on green screen, motion design used to explain the flaws. They made a youtube channel just for that. It's not even technical they are explaining what's a cpu and a chipset.
They are checking all the point needed to impress someone who isn't tech-savyy.

That's remind me all of those video to learn how to make to money with a secret that banks and millionaire don't want to share.

Even IF this is end up to be true the effort they made on communication can't hide a malicious intent.
Yeah, I just had a good look at the website. :roll:

That is 100% marketing. Wow. The techy people here should pay attention to HOW news is delivered, not what the news is. Something normally techy is very bland and difficult for the layperson. The website that is hosting this paper is so damn spangly I want to buy what it's selling. It's actually, frighteningly professionally laid out. As if they had a really good push to make it look great. I mean really great.

I'm not saying Intel had a hand in this but ... no, really, I am.
Posted on Reply
#75
siluro818
I believe the technical term for all this is "pulling something out of one's ass" xD
Posted on Reply
Add your own comment
Apr 26th, 2024 04:05 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts