Thursday, March 15th 2018

CTS Labs Posts Some Clarifications on AMD "Zen" Vulnerabilities

CTS-Labs the research group behind the AMD "Zen" CPU vulnerabilities, posted an addendum to its public-release of the whitepaper, in an attempt to dispel some of the criticism in their presentation in the absence of technical details (which they shared with AMD and other big tech firms). In their clarification whitepaper, quoted below, they get into slightly more technical details on each of the four vulnerability classes.
Clarification About the Recent Vulnerabilities
[CTS Labs] would like to address the many technical points and misunderstandings with a few technical clarifications about the vulnerabilities. The vulnerabilities described in our site are second-stage vulnerabilities. What this means is that the vulnerabilities are mostly relevant for enterprise networks, organizations and cloud providers.

Computers on enterprise networks occasionally get compromised - whether through phishing attempts, zero-day exploits or employees downloading the wrong file. High-security enterprise networks are equipped to deal with these kinds of "every-day" attacks. They do this by keeping their systems up to date, enabling security features, and employing additional measures such as endpoint security solutions.

The vulnerabilities described in amdflaws.com could give an attacker that has already gained initial foothold into one or more computers in the enterprise a significant advantage against IT and security teams.

The only thing the attacker would need after the initial local compromise is local admin privileges and an affected machine. To clarify misunderstandings - there is no need for physical access, no digital signatures, no additional vulnerability to reflash an unsigned BIOS. Buy a computer from the store, run the exploits as admin - and they will work (on the affected models as described on the site).

Attackers in possession of these vulnerabilities would receive the following additional capabilities:
  • Persistency: Attackers could load malware into the AMD Secure Processor before the CPU starts. From this position they can prevent further BIOS updates and remain hidden from security products. This level of persistency is extreme - even if you reinstall the OS or try to reflash the BIOS - it won't work. The only way to remove the attacker from the chip, would be to start soldering out chips. (we have seen a motherboard that had a socket where you can switch chips - then you could just put a new SPI chip).
  • Stealth: Sitting inside the AMD Secure Processor or the AMD Chipset is, at the moment, outside the reach of virtually all security products. AMD chips could become a safe haven for attackers to operate from.
  • Network Credential Theft: The ability to bypass Microsoft Credentials Guard and steal network credentials, for example credentials left by the IT department on the affected machine. We have a PoC version of mimikatz that works even with Credential Guard enabled. Stealing domain credentials could help attackers to move to higher value targets in the network.
  • Specific AMD Secure Processor features for cloud providers, such as Secure Encrypted Virtualization, could be circumvented or disabled by these vulnerabilities.
What was it tested on?
These are the machines we have tested the vulnerabilities on. On our site, every red circle in the vulnerabilities map represents a working PoC that was tested in our lab.

This is the list of hardware that has been tested in our lab:
  • BIOSTAR B350 GT3 Ryzen Motherboard.
  • GIGABYTE AB350-GAMING 3
  • HP EliteDesk 705 G3 SFF Ryzen Pro machine
  • HP Envy X360 Ryzen Mobile Laptop
  • TYAN B8026T70AV16E8HR EPYC SERVER
  • GIGABYTE MZ31-AR0 EPYC SERVER
RYZENFALL, FALLOUT
Requirements
  • Physical access is not required. An attacker would only need to be able to run an EXE with local admin privileges on the machine.
Impact:
  • Write to SMM memory, leading to code execution in SMM.
  • Reading and/or tampering with Credential Guard VTL-1 memory through the PSP.
  • Ryzenfall-4, which achieves code execution inside the PSP, leads to all the attacker capabilities described above, as well as the capability to tamper with the PSP and its security features.
  • An attacker can use RYZENFALL or FALLOUT to bypass Windows Credential Guard, steal network credentials, and then use these to move laterally through Windows-based enterprise networks
MASTERKEY
Requirements:
  • Physical access is not required. An attacker would only need to be able to run an EXE with local admin privileges on the machine.
  • Wait for reboot.
Impact:
The MASTERKEY set of vulnerabilities enable an attacker to execute unsigned code inside the PSP. Totaling a complete compromise of the Secure Processor. The exploit reflashes the BIOS to take advantage of the vulnerability:
  • On some motherboards - this works out of the box. This is because PSP firmware is often ignored by BIOS signature checks.
  • In other cases - RYZENFALL #1-2 could be used as a prerequisite for MASTERKEY to achieve code execution in SMM and bypass BIOS signature checks made in SMM code.
  • Even if all else fails, we believe using RYZENFALL-4 to write to SPI flash from inside the PSP is probably possible.
CHIMERA
Requirements:
  • Physical access is not required. An attacker would only need to be able to run an EXE with local admin privileges on the machine.
Impact:
The CHIMERA set of vulnerabilities are a set Manufacturer Backdoors left on the AMD Chipset, developed by Taiwanese company ASMedia.
  • This allows for an attacker to inject malicious code into the chip and take over the chipset (Read/Write/Execute).
  • One set of backdoors in implemented in firmware, while the other is implemented in the actual logic gates of the chip (ASIC). Both yield to the same impact.
Source: Safe Firmware
Add your own comment

89 Comments on CTS Labs Posts Some Clarifications on AMD "Zen" Vulnerabilities

#26
the54thvoid
Intoxicated Moderator
If I have admin rights on a PC with an Intel chipset, can I not flash tha BIOS with a malware infected version or do Intel CPU's detect that tampering?
Posted on Reply
#27
OneMoar
There is Always Moar
I mean its not like bios write protect has existed since msdos or anything right ....
totally could't patch this at ring0 either...
or hey lets not allow mounting /uefi as rw in linux

or I don't know maybe just get AMD the month it would have taken to patch this instead of declaring it was unpatchable to short stock
Posted on Reply
#28
dicktracy
There is exactly ZERO evidence to debunk CTS Labs’ claims. Only thing AMD reddit death squad have is defamation of CTS Labs and cut-n-paste green-screen conspiracy picture that has nothing to do with the argument. CTS Lab can be funded by ISIS but the argument still stands until proven otherwise. You can’t have bias like some sites where it’s okay to crap on Intel for security flaws but then suppress the news when it’s the underdog AMD.
Posted on Reply
#29
Steevo
LogitechFanAll the butt-hurt amd girls raging above, so pathetic.

Yes sure, you should criticize the messenger...

Also, how many people are running windows in admin mode even without knowing it? Yeah, a shitload of them!
SO if all it takes is to run an exe file and then it will be sitting low level and even OS reinstall can't flush it out, then it's a huge fucking problem and amd should be balls grilled for it! Anyone who says otherwise is a brainwashed idiot and a fanboi.
First, you would have to have an exploit running to maliciously download the payload, so your system would already be compromised, on top of then you would have to allow all programs to run with administrative privilidge and windows 7/8/10 does NOT allow that out of the box, so a user would have to be savvy enough to turn that functionality on, then be stupid enough to click OK when windows asked if the unrecognized program to run, while not running any form of security software that would immediately interrupt an attempt to write a BIOS.

But I will tell you this, if I had to draw that Venn diagram of someone stupid enough, and just savvy enough I bet your would be in the overlap.
Posted on Reply
#30
thebluebumblebee
So Viceroy is trying to do with CTS what the Democrats did with Fusion GPU and the whole Russian collusion thing. Funny. Is this what he future holds? Manufactured fake info? In the past, companies have tried to do this themselves, like Microsoft did with their FUD campaign against DR DOS. (Win. 3.x ran better for me on DR DOS 6 than MS DOS 5!)
Posted on Reply
#31
ssdpro
I call load of BS on the exploit(s). Wouldn't any system be vulnerable to some DBAG running a malicious executable file with admin rights? I don't understand why AMD is being so quiet about this. No update to their blog post and 3 days now to investigate? AMD's response and handling is so bad I would wonder if the opposite of the speculation is true. Did AMD do this as a false flag then prove it wrong and boost their own stock? It is the worst most ineffective short and pump if not. This is really strange stuff.
Posted on Reply
#32
OneMoar
There is Always Moar
all this crap over cts's credibility was standing BEFORE viceroy chimed in
so yea

and I pretty much covered debucking cts's claims already

bios write protect is usually defaulted to on if its not it can be enabled

this is totally patchable by microsoft at there level via ring0 or kernel patch/fixing the borked driver

a bios update would address all of this

and again if you have administrative access you are already PWN3D everything on the machine is now tainted everything done on the machine is tainted all passwords and logins should be considered compromised

the whole issue is that the bugs in question are presented in such as way as to generate maximum fud/drama and or make amd look bad (which they really don't need any help with)
-
btw intel's ME has been known for a long time to have the same kind of exploites
Posted on Reply
#33
WikiFM
In my humble opinion, you people shouldnt tell TPU staff what news to post or not, they have the right to post whatever they think is relevant, if you dont like it please dont read it, you can always read news somewhere else.
Going back to topic, AMD hasnt confirmed or denied the flaws yet, so this is still relevant.
Posted on Reply
#34
TheoneandonlyMrK
xkm1948No shit, somebody runs something with local admin privilege and my machine is hacked. What was it called? F*ucking common sense?

Just go kill yourself already CTS clowns.
I agree and need say no more though that last bits just not me ,they are clowns though:D

still not good but there's more to come yet imo.
Posted on Reply
#35
ssdpro
WikiFMGoing back to topic, AMD hasnt confirmed or denied the flaws yet, so this is still relevant.
This. I find it very strange AMD has stayed so quiet in last 72 hours. We still only have the STRANGE blog post about "certain of our processors" that doesn't even have a date.
Posted on Reply
#36
sresener
Tpu is a business and have expenses so I agree that they should post articles that draw traffic to there site.
As long as the story is based on valid information. It leaves us the reader the right to make our own judgements on whatever we read.
If they decide to use resources on such an article, well I'm pretty sure they can monitor there web traffic and I bet can make a decision on putting more effort in updating the article.
So why give them a hard time for posting news thats out there. If it bothers you don't read it.

Now My opinion on CTS releasing the information to public to speed up patches is absurd. Not only does AMD have to make patches, they have to make sure there patches are going to work with tons of different hardware configurations. I'm pretty sure this will take time. Pirates or hackers have one goal and one target and I'm pretty sure software compatibility with the hardware isn't a concern.
Now if ALL these vulnerabilities need admin privileges, well to me there has to be an alternative motive for CTS. And if that is the case lets hope they get spanked with some legal action that sticks.
Posted on Reply
#37
FatLeeAdama
I think its very poor form for moderators to hide only posts that are critical of TPU. That's all I see at the moment. I would think feedback would be welcome on what news is posted here. I mean you are only going to alienate your audience with this "low quality" business. I am new around here. There is nothing toxic I see that isn't on any other online forum. Seriously thought this site was better than this....
Posted on Reply
#38
ShurikN
Is TPU going to write another editorial about not getting Navi or whatever launches first...
Posted on Reply
#39
dicktracy
FatLeeAdamaI think its very poor form for moderators to hide only posts that are critical of TPU. That's all I see at the moment. I would think feedback would be welcome on what news is posted here. I mean you are only going to alienate your audience with this "low quality" business. I am new around here. There is nothing toxic I see that isn't on any other online forum. Seriously thought this site was better than this....
It’s a good move to prevent this community from becoming a mirror of AMD subreddit. Just take a good look at Anandtech’s forum where it’s 24/7 AMD circlejerk with no balance of voice.
Posted on Reply
#40
yesyesloud
RejZoRAnd all the "you just flash a BIOS". Motherboards often die when you flash them with official and specifically designed BIOS for the board. And these people make it sound like you can just patch any BIOS easily and make it a persistent threat/backdoor.
^case closed
Posted on Reply
#41
GhostRyder
OneMoarall this crap over cts's credibility was standing BEFORE viceroy chimed in
so yea

and I pretty much covered debucking cts's claims already

bios write protect is usually defaulted to on if its not it can be enabled

this is totally patchable by microsoft at there level via ring0 or kernel patch/fixing the borked driver

a bios update would address all of this

and again if you have administrative access you are already PWN3D everything on the machine is now tainted everything done on the machine is tainted all passwords and logins should be considered compromised

the whole issue is that the bugs in question are presented in such as way as to generate maximum fud/drama and or make amd look bad (which they really don't need any help with)
-
btw intel's ME has been known for a long time to have the same kind of exploites
Great post that sums things up nicely!

I started laughing really hard when I read the exploits, almost fell out of my chair!
Posted on Reply
#42
Cybrnook2002
W1zzardyup i spent most of the day writing this addon, it should be useful for many threads. other staff said "just delete those useless posts", i wanted to at least keep them around to not censor

Edit: this is not enabled yet for the main site post view (in case you were looking for those hidden posts)
Let's get the user "Ignore" feature working main site post view too if you start down that road. :-)
Posted on Reply
#43
thesmokingman
the54thvoidIf I have admin rights on a PC with an Intel chipset, can I not flash tha BIOS with a malware infected version or do Intel CPU's detect that tampering?
Hell yes. This brings up many questions that are not asked by this article so let me try...
By its own statements, CTS Labs tested and developed a proof of concept exploit for Asmedia controllers before it was aware these controllers were incorporated into Ryzen chipsets. Where, then, is the website AsmediaFlaws.com? Where’s the notification to tell Intel motherboard customers that the chips on their motherboards can be similarly backdoored and abused? This isn’t a theoretical; I’m writing this article from an Ivy Bridge-E system powered by an Asus X79-Deluxe motherboard with an Asmedia 1042 controller.
Where is TPU in this?

www.extremetech.com/computing/265695-cts-labs-responds-allegations-bad-faith-amd-security-disclosures-digs-deeper-hole#disqus_thread
Posted on Reply
#44
Xuper
atm on Ryzen system , It's impossible to do flash modded bios without USB Flash, You need to boot USB flash via UEFI Boot setting.
Feel free to read this guide , How to flash Modded Bios (Yep So damn many hard STEP ):

puissanceled.com/vrac/Bios_modding/EN.html

Edit : oh i forgot something ,on my ASUS Prime X370 Pro , i updated Bios but I can't revert back to Old Bios, This does Not allow me ,I don't know it's ASUS or New Version of AMD AGESA 1.0.0.6
Posted on Reply
#45
Thimblewad
I've thought about this a bit and well, I believe that the big corporations should have security things in check (I mean not having an admin mode as a basic user is as easy as a tick in the Active User Directory settings in Windows servers for example, a sysadmin should know his shit), but companies with not so savy IT support (there's a lot of so-called IT guys out there, A LOT) could have huge problems.

Also, most of these still seem to require physicall access so.
Posted on Reply
#46
ShurikN
The thing I dislike the most about this entire situation is that more research and interesting info came from TPU members than editors themselves. As a matter of fact the entirety of cts articles is copy-pasted sensationalism for nothing but clicks. And it looks extremely unprofessional. You're gonna lose readership in the end, and no amount of click-bait articles will help you then.
Edit, quoted wizz by mistake.
Posted on Reply
#47
efikkan
In general terms, if a system really remains persistently compromised across OS installs, is definitely something to take seriously, even if it takes admin privileges to get infected*. That is not to say it's an immediate threat to either consumers, enterprises or cloud providers, and is not nearly worthy the devastating effect implied by the "ryzenfall" nickname.
*) There have been ways to do privilege escalation.

Note: I'm not commenting on the validity of the claimed vulnerabilities by CTS-Labs. I would encourage everyone to remain skeptical and wait for potential evidence.
Posted on Reply
#48
Jism
ShurikNThe thing I dislike the most about this entire situation is that more research and interesting info came from TPU members than editors themselves. As a matter of fact the entirety of cts articles is copy-pasted sensationalism for nothing but clicks. And it looks extremely unprofessional. You're gonna lose readership in the end, and no amount of click-bait articles will help you then.
Edit, quoted wizz by mistake.
Things go so fast these days, it's hard for a writer to keep up with all these trends, posts and whatever.

Every CPU has flaws. Live with it. It's so complex and the focus is more on performance then hardened security.

However it suprises me that the Ryzen pro has these simular flaws, when bios is modded. Ryzen pro is being sold as a 'safer' CPU compared to normal ryzen.
Posted on Reply
#49
ssdpro
ShurikNAs a matter of fact the entirety of cts articles is copy-pasted sensationalism for nothing but clicks. And it looks extremely unprofessional. You're gonna lose readership in the end, and no amount of click-bait articles will help you then.
The problem is AMD hasn't handled it well. AMD has had no comment other than their strange blog post acknowledging the investigation into the claimed vulnerabilities. That post wasn't even written in clear professional terms ("certain of our processors" and doesn't even have a date). Until AMD writes/speaks and either declares the vulnerabilities fake or explains complexity it will continue being a story and TPU needs to cover it. You don't get bona fide debunks from random users named "BiGchiCKens14", you get it from the company.
Posted on Reply
Add your own comment
Apr 26th, 2024 20:31 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts