Tuesday, March 13th 2018

13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

Security researchers with Israel-based CTS-Labs, have discovered a thirteen security vulnerabilities for systems based on AMD Zen processors. The thirteen new exploits are broadly classified into four groups based on the similarity in function of the processor that they exploit: "Ryzenfall," "Masterkey," "Fallout," and "Chimera."

The researchers "believe that networks that contain AMD computers are at a considerable risk," and that malware can "survive computer reboots and re-installations of the operating system, while remaining virtually undetectable by most endpoint security solutions," such as antivirus software. They also mention that in their opinion, "the basic nature of some of these vulnerabilities amounts to complete disregard of fundamental security principles. This raises concerning questions regarding security practices, auditing, and quality controls at AMD."
Since this story went up some follow ups were posted:1. "Masterkey": This is an exploit of the Secure Boot feature, which checks if nothing has been tampered with on your machine while it was powered down (i.e. changes in firmware, hardware, or the last software state before shutdown). The Masterkey vulnerability gets around this environment integrity check by using an infected system BIOS, which can be flashed even from within Windows (with administrative privileges). This does not mean that the user has to modify and flash the BIOS manually before becoming vulnerable, the malware can do that on the fly once it is running. Theoretically, Secure Boot should validate the integrity of the BIOS, but apparently this can be bypassed, exploiting bugs in the Secure Processor's metadata parsing. Once the BIOS signature is out of the way, you can put pretty much any ARM Cortex A5 compatible code into the modified BIOS, which will then execute inside the ARM-based Secure Processor - undetectable to any antivirus software running on the main CPU, because the antivirus software running on the CPU has no way to scan inside the Secure Processor.

2. "Ryzenfall" is a class of vulnerabilities targeting Secure Processor, which lets a well-designed malware stash its code into the Secure Processor of a running system, to get executed for the remainder of the system's up-time. Again, this attack requires administrative privileges on the host machine, but can be performed in real-time, on the running system, without modifying the firmware. Secure Processor uses system RAM, in addition to its own in-silicon memory on the processor's die. While this part of memory is fenced off from access by the CPU, bugs exist that can punch holes into that protection. Code running on the Secure Processor has complete access to the system; Microsoft Virtualization-based Security (VBS) can be bypassed and additional malware can be placed into system management storage, where it can't be detected by traditional antivirus software. Windows Defender Credentials Guard, a component that stores and authenticates passwords and other secure functions on the machine, can also be bypassed and the malware can spread over the network to other machines, or the firmware can be modified to exploit "Masterkey", which persists through reboots, undetectable.

3. "Fallout": This class of vulnerabilities affects only AMD EPYC servers. It requires admin privileges like the other exploits, and has similar effects. It enables an attacker to gain access to memory regions like Windows Isolated User Mode / Kernel Mode (VTL1) and Secure Management RAM of the CPU (which are not accessible, even with administrative privileges). Risks are the same as "Ryzenfall", the attack vector is just different.

4. "Chimera": This class of vulnerabilities is an exploitation of the motherboard chipset (e.g. X370 also known as Promontory). AMD outsourced design of their Ryzen chipsets to Taiwanese ASMedia, which is a subsidiary of ASUS. You might know the company from the third-party USB 3.0 and legacy PCI chips on many motherboards. The company has been fined for lax security practices in the past, and numerous issues were found in their earlier controller chips. For the AMD chipset, it looks like they just copy-pasted a lot of code and design, including vulnerabilities. The chipset runs its own code that tells it what to do, and here's the problem: Apparently a backdoor has been implemented that gives any attacker knowing the right passcode full access to the chipset, including arbitrary code execution inside the chipset. This code can now use the system's DMA (direct memory access) engine to read/write system memory, which allows malware injection into the OS. To exploit this attack vector, administrative privileges are required. Whether DMA can access the fenced off memory portions of the Secure Processor, to additionally attack the Secure Processor through this vulnerability, is not fully confirmed, however, the researchers verified it works on a small number of desktop boards. Your keyboard, mouse, network controllers, wired or wireless, are all connected to the chipset, which opens up various other attack mechanisms like keyloggers (that send off their logs by directly accessing the network controller without the CPU/OS ever knowing about these packets), or logging all interesting network traffic, even if its destination is another machine on the same Ethernet segment. As far as we know, the tiny 8-pin serial ROM chip is connected to the CPU on AMD Ryzen platform, not to the chipset or LPCIO controller, so infecting the firmware might not be possible with this approach. A second backdoor was found that is implemented in the physical chip design, so it can't be mitigated by a software update, and the researchers hint at the requirement for a recall.

AMD's Vega GPUs use an implementation of the Secure Processor, too, so it is very likely that Vega is affected in a similar way. An attacker could infect the GPU, and then use DMA to access the rest of the system through the attacks mentioned above.

The researchers have set up the website AMDFlaws.com to chronicle these findings, and to publish detailed whitepapers in the near future.

AMD provided us with the following statement: "We have just received a report from a company called CTS Labs claiming there are potential security vulnerabilities related to certain of our processors. We are actively investigating and analyzing its findings. This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings. At AMD, security is a top priority and we are continually working to ensure the safety of our users as potential new risks arise."

Update March 14 7 AM CET: It seems a lot of readers misunderstand the BIOS flashing part. The requirement is not that the user has to manually flash a different BIOS first before becoming vulnerable. The malware itself will modify/flash the BIOS once it is running on the host system with administrative privileges. Also, the signed driver requirement does not require a driver from any specific vendor. The required driver (which is not for an actual hardware device and just provides low-level hardware access) can be easily created by any hacker. Signing the driver, so Windows accepts it, requires a digital signature which is available from various SSL vendors for a few hundred dollars after a fairly standard verification process (requires a company setup with bank account). Alternatively an already existing signed driver from various hardware utilities could be extracted and used for this purpose.
Source: Many Thanks to Earthdog for the tip
Add your own comment

482 Comments on 13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

#201
GoldenX
What is important is AMD confirming this and how they respond with their fixes. Intel wanted to drag everyone down with their patches, I hope AMD does better than that.
Posted on Reply
#202
evernessince
"In light of CTS’s discoveries, the meteoric rise of AMD’s stock price now appears to be totally unjustified and entirely unsustainable. We believe AMD is worth $0.00 and will have no choice but to file for Chapter 11 (Bankruptcy) in order to effectively deal with the repercussions of recent discoveries."

-Direct quote from Viceroy research

It seems more and more like a smear campaign....
Posted on Reply
#203
lexluthermiester
Vya DomusThat would have been smart of them.
Clever, not smart..
evernessinceIt seems more and more like a smear campaign....
If so it is failing spectacularly. No one is worried. However, that doesn't change the fact that these are tangible and real problems.
Posted on Reply
#204
evernessince
ssdproGuys, we knew AMD was operating on a shoe string budget during Ryzen development. This is not surprising. Even if Intel had a hand in research, that isn't even a crime. Chevy does ads comparing the bed of the F150 with the Silverado steel vs aluminum. It would be negligent to just let AMD market their chips one way when the reality is another. Just analyze it, fix it, and move on. Ryzen is still a great product even if it needs some patches.
Yes but those claims are put in the context of an ad. Context is everything here. In this case these security researchers are posing this as independent findings.

www.gamersnexus.net/industry/3260-assassination-attempt-on-amd-by-viceroy-research-cts-labs
Posted on Reply
#206
qubit
Overclocked quantum bit
OneMoarbtw the folks at cts are known to have some pretty big shares of intel stock .... take that as you will
@btarunr can we get some corrections here or least a link to... wccftech.com/low-down-amd-security-exploit-saga-cts-labs/
I've read that Wccftech article now and the "research" company certainly looks shady as fuck. Definitely looks like they're after a quick buck by trashing AMD's reputation and shares.

In short, I wouldn't let this put me off buying AMD's processors. Frankly, I wouldn't be surprised if Intel is behind this somewhere, just really well hidden.
Posted on Reply
#207
Mussels
Freshwater Moderator
After doing some more reasearch into this (reading all the comments here) its definitely being inflated, the risk to home users is low, and the risk to enterprise/business level is at the point where its a specific targeted attack (needs local admin access, possibly hardware access) so while it does need to be corrected, its certainly not a widescale threat to all ryzen users out there
Posted on Reply
#208
btarunr
Editor & Senior Moderator
OneMoarbtw the folks at cts are known to have some pretty big shares of intel stock .... take that as you will
@btarunr can we get some corrections here or least a link to... wccftech.com/low-down-amd-security-exploit-saga-cts-labs/
I've heard from a semi-credible source that a hackathon is underway, let's see what comes out of that. Unfortunately information from that source isn't credible enough to post.

In the meantime, CTS is also reaching out to the press. We've been contacted, they pointed us in the direction of some "third-parties" who could corroborate their claims. We've attempted contact with those third-parties.

I'd be shocked if AMD's counterattack vector isn't in trying to prove that many of these vulnerabilities exist even with Intel processors, and to prevent a short.
Posted on Reply
#209
OneMoar
There is Always Moar
btarunrFine. I rephrased. Feel better?
too late thats going in my sig/tpumemes folder :p
Posted on Reply
#210
Melvis
This came out 18 days to early :roll:

What a load of crap!
Posted on Reply
#211
InVasMani
Well on the positive side of things if AMD did go to $0's there is no x86 or GPU monopoly to worry about from Intel or Nvidia. We can totally expect tons of innovation out of both.
Posted on Reply
#213
AsRock
TPU addict
CrAsHnBuRnXpWintelfell. Get it?:D
Made me think of the POS WinChip :eek:|, not sure if thats what you were getting at. But you most likey will not see some thing like that as they be to worried about being sued.
qubitI can't believe it. Seems that everything to do with computers has lots of serious security vulnerabilities in it, from Windows, to apps, to WPA2, routers, IoT and now CPUs of either brand.

Looks like computer security is a chimera. :rolleyes: No wonder the exploits keep coming.

EDIT: Ok, reading some of the comments, it seems that the veracity of this report may be in some doubt. Let's hope it's fake, but I'm not holding my breath.
Whole reason ii stopped watching the news, and this seems like it's being treated the same kinda way. Until some thing else takes it's place.
Posted on Reply
#215
GAR
"Israel" Im sure Intel sponsored this research
Posted on Reply
#216
jigar2speed
ssdproGuys, we knew AMD was operating on a shoe string budget during Ryzen development. This is not surprising. Even if Intel had a hand in research, that isn't even a crime. Chevy does ads comparing the bed of the F150 with the Silverado steel vs aluminum. It would be negligent to just let AMD market their chips one way when the reality is another. Just analyze it, fix it, and move on. Ryzen is still a great product even if it needs some patches.
You might want to read the article before posting. This flaws need admin right, with admin right any system is vulnerable.
Posted on Reply
#217
erocker
*
It really does seem to be a hit piece on AMD.

Pretty good video on it:
Posted on Reply
#218
W1zzard
Added this to the article because a lot of people seem to misunderstand:

Update March 14 7 AM CET: It seems a lot of readers misunderstand the BIOS flashing part. The requirement is not that the user has to manually flash a different BIOS first before becoming vulnerable. The malware itself will modify/flash the BIOS once it is running on the host system with administrative privileges. Also, the signed driver requirement does not require a driver from any specific vendor. The required driver (which is not for an actual hardware device and just provides low-level hardware access) can be easily created by any hacker. Signing the driver, so Windows accepts it, requires a digital signature which is available from various SSL vendors for a few hundred dollars after a fairly standard verification process (requires a company setup with bank account). Alternatively an already existing signed driver from various hardware utilities could be extracted and used for this purpose.
Posted on Reply
#219
R-T-B
W1zzardAdded this to the article because a lot of people seem to misunderstand:

Update March 14 7 AM CET: It seems a lot of readers misunderstand the BIOS flashing part. The requirement is not that the user has to manually flash a different BIOS first before becoming vulnerable. The malware itself will modify/flash the BIOS once it is running on the host system with administrative privileges. Also, the signed driver requirement does not require a driver from any specific vendor. The required driver (which is not for an actual hardware device and just provides low-level hardware access) can be easily created by any hacker. Signing the driver, so Windows accepts it, requires a digital signature which is available from various SSL vendors for a few hundred dollars after a fairly standard verification process (requires a company setup with bank account). Alternatively an already existing signed driver from various hardware utilities could be extracted and used for this purpose.
People underestimate how many people capable of doing this are out there, as well.
Posted on Reply
#220
ShurikN
The BIOS mod with the 1337 really is a selling point.
Who made this whitepaper, 12 year olds...
Posted on Reply
#221
InVasMani
It makes me think that Microsoft should just patch the OS itself to prevent all .bios files from being flashed w/o 2-step authentication first to safe guard against these malicious attacks. Something that important should be better guarded against for these kinds of exploits.
Posted on Reply
#222
W1zzard
InVasManiIt makes me think that Microsoft should just patch the OS itself to prevent all .bios files from being flashed w/o 2-step authentication first to safe guard against these malicious attacks. Something that important should be better guarded against for these kinds of exploits.
Can't be done, unless they completely forbid device drivers and manually approve every single one. This will turn Windows into iOS
Posted on Reply
#223
laszlo
and admin rights user don't need vulnerabilities to achieve his agenda/rampage
Posted on Reply
#224
R-T-B
laszloand admin rights user don't need vulnerabilities to achieve his agenda/rampage
They do to survive a detection/reinstall.
Posted on Reply
#225
Vya Domus
GAR"Israel" Im sure Intel sponsored this research
I am usually pretty skeptical about this sort of thing , but this one is buried in so many unusual coincidences and questionable doings it almost looks like it was meant from the get go to look shady as fuck.
Posted on Reply
Add your own comment
Apr 25th, 2024 06:53 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts