Thursday, March 15th 2018

CTS Labs Posts Some Clarifications on AMD "Zen" Vulnerabilities

CTS-Labs the research group behind the AMD "Zen" CPU vulnerabilities, posted an addendum to its public-release of the whitepaper, in an attempt to dispel some of the criticism in their presentation in the absence of technical details (which they shared with AMD and other big tech firms). In their clarification whitepaper, quoted below, they get into slightly more technical details on each of the four vulnerability classes.
Clarification About the Recent Vulnerabilities
[CTS Labs] would like to address the many technical points and misunderstandings with a few technical clarifications about the vulnerabilities. The vulnerabilities described in our site are second-stage vulnerabilities. What this means is that the vulnerabilities are mostly relevant for enterprise networks, organizations and cloud providers.

Computers on enterprise networks occasionally get compromised - whether through phishing attempts, zero-day exploits or employees downloading the wrong file. High-security enterprise networks are equipped to deal with these kinds of "every-day" attacks. They do this by keeping their systems up to date, enabling security features, and employing additional measures such as endpoint security solutions.

The vulnerabilities described in amdflaws.com could give an attacker that has already gained initial foothold into one or more computers in the enterprise a significant advantage against IT and security teams.

The only thing the attacker would need after the initial local compromise is local admin privileges and an affected machine. To clarify misunderstandings - there is no need for physical access, no digital signatures, no additional vulnerability to reflash an unsigned BIOS. Buy a computer from the store, run the exploits as admin - and they will work (on the affected models as described on the site).

Attackers in possession of these vulnerabilities would receive the following additional capabilities:
  • Persistency: Attackers could load malware into the AMD Secure Processor before the CPU starts. From this position they can prevent further BIOS updates and remain hidden from security products. This level of persistency is extreme - even if you reinstall the OS or try to reflash the BIOS - it won't work. The only way to remove the attacker from the chip, would be to start soldering out chips. (we have seen a motherboard that had a socket where you can switch chips - then you could just put a new SPI chip).
  • Stealth: Sitting inside the AMD Secure Processor or the AMD Chipset is, at the moment, outside the reach of virtually all security products. AMD chips could become a safe haven for attackers to operate from.
  • Network Credential Theft: The ability to bypass Microsoft Credentials Guard and steal network credentials, for example credentials left by the IT department on the affected machine. We have a PoC version of mimikatz that works even with Credential Guard enabled. Stealing domain credentials could help attackers to move to higher value targets in the network.
  • Specific AMD Secure Processor features for cloud providers, such as Secure Encrypted Virtualization, could be circumvented or disabled by these vulnerabilities.
What was it tested on?
These are the machines we have tested the vulnerabilities on. On our site, every red circle in the vulnerabilities map represents a working PoC that was tested in our lab.

This is the list of hardware that has been tested in our lab:
  • BIOSTAR B350 GT3 Ryzen Motherboard.
  • GIGABYTE AB350-GAMING 3
  • HP EliteDesk 705 G3 SFF Ryzen Pro machine
  • HP Envy X360 Ryzen Mobile Laptop
  • TYAN B8026T70AV16E8HR EPYC SERVER
  • GIGABYTE MZ31-AR0 EPYC SERVER
RYZENFALL, FALLOUT
Requirements
  • Physical access is not required. An attacker would only need to be able to run an EXE with local admin privileges on the machine.
Impact:
  • Write to SMM memory, leading to code execution in SMM.
  • Reading and/or tampering with Credential Guard VTL-1 memory through the PSP.
  • Ryzenfall-4, which achieves code execution inside the PSP, leads to all the attacker capabilities described above, as well as the capability to tamper with the PSP and its security features.
  • An attacker can use RYZENFALL or FALLOUT to bypass Windows Credential Guard, steal network credentials, and then use these to move laterally through Windows-based enterprise networks
MASTERKEY
Requirements:
  • Physical access is not required. An attacker would only need to be able to run an EXE with local admin privileges on the machine.
  • Wait for reboot.
Impact:
The MASTERKEY set of vulnerabilities enable an attacker to execute unsigned code inside the PSP. Totaling a complete compromise of the Secure Processor. The exploit reflashes the BIOS to take advantage of the vulnerability:
  • On some motherboards - this works out of the box. This is because PSP firmware is often ignored by BIOS signature checks.
  • In other cases - RYZENFALL #1-2 could be used as a prerequisite for MASTERKEY to achieve code execution in SMM and bypass BIOS signature checks made in SMM code.
  • Even if all else fails, we believe using RYZENFALL-4 to write to SPI flash from inside the PSP is probably possible.
CHIMERA
Requirements:
  • Physical access is not required. An attacker would only need to be able to run an EXE with local admin privileges on the machine.
Impact:
The CHIMERA set of vulnerabilities are a set Manufacturer Backdoors left on the AMD Chipset, developed by Taiwanese company ASMedia.
  • This allows for an attacker to inject malicious code into the chip and take over the chipset (Read/Write/Execute).
  • One set of backdoors in implemented in firmware, while the other is implemented in the actual logic gates of the chip (ASIC). Both yield to the same impact.
Source: Safe Firmware
Add your own comment

89 Comments on CTS Labs Posts Some Clarifications on AMD "Zen" Vulnerabilities

#51
lexluthermiester
owen10578Couldn't you guys at least be more skeptical instead of just regurgitating what CTS says? I guess it brings in clicks huh?
They are reporting news and sharing the known information. Why should they be skeptical at all? Regardless of whether or not CTS is shady or legit, the vulnerabilities in question need to be taken seriously. It would be irresponsible and unprofessional to take this news less than seriously. And if it turns out to be nonsense than they can post that news too. Is that aspect of journalism clear now?
Posted on Reply
#52
WikiFM
mcraygsxNexus Gamers did good job covering this story with their own input on this.

www.gamersnexus.net/industry/3260-assassination-attempt-on-amd-by-viceroy-research-cts-labs
I liked it and I agree that the timing of presenting the news was sharply calculated, since AMD is about to launch Ryzen 2000 series, also very suspicious that CTS was created just after Intel was informed of Meldown, I couldn't but wonder that Intel is implicated. Nexus asked Intel about it, and of course they denied it, what they were expecting, "Yes we are involved" morons!
Anyway they agree that the flaws threat is there, and that it needs further analysis.
Posted on Reply
#53
Hood
Of course the threats are real. Those who suggest it's all BS made up by Intel have not thought it through. Can you imagine the backlash if none of this is verified? It would be terrible. Has anyone forgotten how loudly the AMD fans crowed when Spectre/Meltdown came out? Especially at first, when AMD was saying their CPUs were not affected at all. Intel may have had a hand in the way the news was released so soon, but nothing is proven, and those stating it as a fact are sounding real paranoid. Seems like AMD fans are still suffering from "underdog syndrome", despite their glowing posts about how Ryzen put Intel in it's place.
Posted on Reply
#54
commission3r
LogitechFanAll the butt-hurt amd girls raging above, so pathetic.

Yes sure, you should criticize the messenger...

Also, how many people are running windows in admin mode even without knowing it? Yeah, a shitload of them!
SO if all it takes is to run an exe file and then it will be sitting low level and even OS reinstall can't flush it out, then it's a huge fucking problem and amd should be balls grilled for it! Anyone who says otherwise is a brainwashed idiot and a fanboi.
do you actually use windows?

i ask because anytime you run an exe, you need to click yes it can run
unless of course you've disabled uac
Posted on Reply
#55
evernessince
rtwjunkieIt may be that CTS is trolling, but your assertion is off-base. For TPU to be the only site to not cover this, as you appear to want, would have been a sure way for a site-owner like W1zzard to have their site relegated to a back burner, to be 2nd or 3rd tier. People won’t go to sites that they realize just don’t cover events.
Agreed. I do wish that appropriate caution was displayed in the title / near the top of the article though. The way I read the CTS titles, TPU makes them appear legitimate despite industry wide concensus of the inverse.
ssdproThis. I find it very strange AMD has stayed so quiet in last 72 hours. We still only have the STRANGE blog post about "certain of our processors" that doesn't even have a date.
It takes more than 72 hours for AMD to verify these security claims with complete certainty. There's a reason why it's common practice to give companies 3 months before revealing an exploit / bug. If AMD rushes things and makes an incorrect statement, it gets sued.

We can't all be like CTS labs and post a disclaimer that relieves them of all liability if what they say is actually false.
Posted on Reply
#56
Prince Valiant
lexluthermiesterThey are reporting news and sharing the known information. Why should they be skeptical at all? Regardless of whether or not CTS is shady or legit, the vulnerabilities in question need to be taken seriously. It would be irresponsible and unprofessional to take this news less than seriously. And if it turns out to be nonsense than they can post that news too. Is that aspect of journalism clear now?
Was another news post necessary though? Pin the thing and update as needed.
thesmokingmanHell yes. This brings up many questions that are not asked by this article so let me try...

Where is TPU in this?

www.extremetech.com/computing/265695-cts-labs-responds-allegations-bad-faith-amd-security-disclosures-digs-deeper-hole#disqus_thread
I guess they're not interested, thanks for the link.
Posted on Reply
#57
lexluthermiester
Prince ValiantWas another news post necessary though? Pin the thing and update as needed.
That's one solution, and might work. But the owners, admin's, editors and staff run the site and in ways they find acceptable. Outsiders complaining about aspects of the site that are not related to it's functionality are really not as constructive as people might think.

If there's an article people don't want to read, don't read it. No one is twisting anyone else's arm. Complaining about doesn't help anything.
Posted on Reply
#58
eidairaman1
The Exiled Airman
PerfectWaveSo everyday im hacking my own computer LOL

TPU never wrote anything positive about AMD. Wondering if the staff is payed by Intel, Nvidia and CTS labs.
Easy there man, this is the site that started the hardware mods for radeon cards.

I'm sure deep down most staff want AMD to do something amazing to keep prices down for both Intel and AMD users, aka the consumer no matter the camp wins.
Posted on Reply
#59
xkm1948
Very good read from AnandTech. They had a recorded phone call with these so called CTS experts.

www.anandtech.com/show/12536/our-interesting-call-with-cts-labs


So almost all motherboards that have Asmedia chipsets, including millions of Intel motherboards, are affected by CTS self proclaimed "vuneribility" Really strange why they choose to only target AMD. I wonder.

Also the final part of their conversation is almost comical:

Anandtech: Who do you work for?
CTS: Sorry bruh gotta go.

hahaha
Posted on Reply
#60
jigar2speed
ssdproThis. I find it very strange AMD has stayed so quiet in last 72 hours. We still only have the STRANGE blog post about "certain of our processors" that doesn't even have a date.
Its not strange, its the protocol. They will have to triple confirm before they make any statement about this vulnerabilities.
Posted on Reply
#61
RejZoR
ssdproThe problem is AMD hasn't handled it well. AMD has had no comment other than their strange blog post acknowledging the investigation into the claimed vulnerabilities. That post wasn't even written in clear professional terms ("certain of our processors" and doesn't even have a date). Until AMD writes/speaks and either declares the vulnerabilities fake or explains complexity it will continue being a story and TPU needs to cover it. You don't get bona fide debunks from random users named "BiGchiCKens14", you get it from the company.
CTS whatever idiots gave AMD 24 hours to investigate. That's not enough time for anything, let alone give a statement. Now, compare that to Spectre/Meltdown where Intel had months to deal with it during which time execs sold Intel shares, tried to cover it up until it exploded with outrage from users who found out about it. But people are giving AMD shit for not responding in a one single day. Not to mention this one really isn't as bad of an issue as people make it to be. Spectre and Meltdown were true exploits with privilege escalation issue where non admin could access admin stuff and system. With Ryzen stuff, sure, it's still a valid thing, but to get it working in the first place you have to meet a bunch of rather absurd conditions, of which first one is having admin access.

What I see as an issue is selling of used chips thar are compromised where user had direct access to chip as admin and modified it. That is however a legit concern. Still, I wonder how such CPU would cause a concern in terms of what useful can you actually put into it permanently that would then work in a destination system as a security or privacy risk.
Posted on Reply
#62
thesmokingman
xkm1948Very good read from AnandTech. They had a recorded phone call with these so called CTS experts.

www.anandtech.com/show/12536/our-interesting-call-with-cts-labs


So almost all motherboards that have Asmedia chipsets, including millions of Intel motherboards, are affected by CTS self proclaimed "vuneribility" Really strange why they choose to only target AMD. I wonder.

Also the final part of their conversation is almost comical:

Anandtech: Who do you work for?
CTS: Sorry bruh gotta go.

hahaha
Don't forget this gem.
IC: Can you confirm that money changes hands with Trail of Bits?


(This was publicly confirmed by Dan Guido earlier, stating that they were expecting to look at one test out of curiosity, but 13 came through so they invoiced CTS for the work. Reuters reports that a $16000 payment was made as ToB’s verification fee for third-party vulnerability checking)


YLZ: I would rather not make any comments about money transactions and things of that nature. You are free to ask Trail of Bits.
In context, the first news was predicated on Guido's statements that these are all real exploits. And then $16,000 dollars later CTS now has a pedestal upon which preach their sermon.



And then most comical is their statement that they have 16 years of experience in the field. What field???
IC: Can you elaborate as to why you did not wait for those numbers to come through before going live?


ILO: It’s our first time around. We haven’t – I guess we should have – this really is our first rodeo.
What's even more appalling given the context is that they said that they discovered the ASMedia bugs about a year ago. That is more than ample time to legitimately report their findings. But no they sit on it waiting for the right moment to spank AMD specifically. Why AMD specifically when as they claim the bugs/back doors affect every motherboard that uses said ASMedia chips?
What we found are these backdoors that we have been describing that come built into the chips – there are two sets of backdoors, hardware backdoors and software backdoors, and we implemented clients for those backdoors. The client works on AMD Ryzen machines but it also works on any machine that has these ASMedia chipsets and so quite a few motherboards and other PCs are affected by these vulnerabilities as well.
This shit stinks to high heaven.
Posted on Reply
#63
R0H1T
Fair to say CTS is FoS :laugh:

They've got lots to hide & no real answers to tough/straight questions.
Posted on Reply
#64
Assimilator
I have to say, I'm really liking this anti-s**tposting feature. Being able to read through a thread knowing that all the visible posts are the high-quality ones that actually contribute to the topic at hand, as opposed to having to read every post and discard the contents of the rubbish ones, will really make my life easier. It will also encourage people to post higher quality content if they don't want to get "censored".

At the end of the day, while there is room for abuse of this feature, and it's a slippery slope and a thin red line... TPU would not have had to implement it if certain people didn't keep posting statements that are outright untrue, complete nonsense, or are of the form "LOL company <X> is teh evil because of <FUD>". I'd also encourage you to remember that these are TPU's forums, not yours, and as such they can do whatever they damn well please.

On to the topic at hand...

While I agree that actually exploiting these vulnerabilities is nowhere near as easy as Meltdown/Spectre, the fact of the matter remains that they are still vulnerabilities. Let's say that an attacker builds a phishing email that looks like it's from a motherboard vendor, and sends it to a list of email addresses obtained from one of the hundreds of account dumps online. That email redirects to a phishing website that recommends users to download an EXE from it to "patch" their computer's Ryzen vulnerabilitieis. That EXE, of course, contains code that exploits some, or all, of those vulnerabilities. Users are gonna download that file, run it, say "yes" when prompted by UAC, and boom, they're compromised.

So discarding these as "real" vulnerabilities because they need admin access is shortsighted, because users (as always) are the weakest link in computer security.
Posted on Reply
#65
librin.so.1
They keep mentioning
>Windows Credential Guard
>Windows-based enterprise networks
>Signed driver on Windows (for chimera)

I wonder why they haven't even mentioned Linux, which, when it comes to EPYC line and to a lesser degree, Threadripper line, is basically what any sensible enterprise would be running on those.
The complete lack of mention is really odd. At the very least, they're expected to mention that it's untested, if they haven't touched that bit. But these guys? Nothing.
(Of course there's also OS X, but I am not sure if any current Apple systems have AMD cpus in them at all.)
Posted on Reply
#67
Easo
If the attacker has admin access, he has won the most of the battle already.
Is this a security hole? Yes. Are the huge, screaming names and shitty webpages inciting panic justified. Absolutely not.
Posted on Reply
#68
Chaitanya
lanlaggerI am really sad seing this Low quality posts and attitude from TPU personal !!
let me explain:
Low quality posts from TPU staff - you basically gave free Press (all they ever could wanted) to Stock price manipulators (multiple times - when lot of other tech portals stopped after first news, waiting for some more credible source confirmations).
Low quality attitude from TPU staff - sadly in this case self explanatory :(
Lets not discuss TPU staffs IQ of regurgitating wccftech level news posts and this new bot based censoring system here on this post. If you want create a thread in general discussion forum.

That Anandtechs interview raises more questions than answers. Also people claiming amd fanboys who blasted Intel for spectre/meltdown seem to have amnesia of events that tooks place when those bugs were discovered. Intel, AMD and ARM all had 6 months before bugs were made knowm to general public. Intel was the one who went to notify Chinese and Amazon regarding the security holes to make additional measurements to improve their infrastructre. This Cts is just targetting AMd for Asmedia bugs which are in use with millions of Intel motherboards as well.
Posted on Reply
#69
eidairaman1
The Exiled Airman
ChaitanyaThis Cts is just targetting AMd for Asmedia bugs which are in use with millions of Intel motherboards as well
The way they write sounds more like a smear libel case though, aka a panic mode from a certain company...
Posted on Reply
#70
Chaitanya
eidairaman1The way they write sounds more like a smear libel case though, aka a panic mode from a certain company...
It was very surprising that only AMD was targetted for use of Asmedia chips when those chips are common factor across the industry. Everyday more red flags are going up with regards to this mess.
Posted on Reply
#71
jabbadap
ChaitanyaIt was very surprising that only AMD was targetted for use of Asmedia chips when those chips are common factor across the industry. Everyday more red flags are going up with regards to this mess.
Well they are targeting AM4 Promontory chipset, which is made by ASmedia not by amd itself and it's in every AM4 board. So if that Chimera vulnerability is legit, it will affect all asmedia chipset out there.
Posted on Reply
#72
Chaitanya
jabbadapWell they are targeting AM4 Promontory chipset, which is made by ASmedia not by amd itself and it's in every AM4 board. So if that Chimera vulnerability is legit, it will affect all asmedia chipset out there.
xkm1948Acknowledged all AsMedia based USB chipsets are vulnerable, yet still targeting just one specific company. If there is any concern it should be Intel MoBo which has way higher market share and they got 0 mention. Fishy AF.

CTS can spin this whatever they want. At least this end user is not buying into their BS.

Security experts, including Linus, weighs in on the situation after thr anandtech phone call.

www.realworldtech.com/forum/?threadid=175139&curpostid=175169


Lets see what they say after TPU phone call
Posted on Reply
#73
AsRock
TPU addict
ssdproThe problem is AMD hasn't handled it well. AMD has had no comment other than their strange blog post acknowledging the investigation into the claimed vulnerabilities. That post wasn't even written in clear professional terms ("certain of our processors" and doesn't even have a date). Until AMD writes/speaks and either declares the vulnerabilities fake or explains complexity it will continue being a story and TPU needs to cover it. You don't get bona fide debunks from random users named "BiGchiCKens14", you get it from the company.
You what ?, AMD should not have to say any thing, well except what they have done and that they are looking in to it. AMD did not even have chance to test this out fully yet and i am sure if they had 6 months like Intel did with the last vulnerabilities they would of had much more to say about it. But that was not the case here CTS acted like A holes ( i was thinking of a much more fitting word but ) by giving AMD time to actually test their claims which oddly enough are not willing to prove.

So best thing to do is sit and wait until we get solid proof on the situation, i amd sure AMD will do when the time is right and these things take time which they have not been given..
Posted on Reply
#74
Hood
AsRockSo best thing to do is sit and wait until we get solid proof on the situation, i amd sure AMD will do when the time is right and these things take time which they have not been given..
That's all we can do - but my concern is that in the meantime, all AMD systems may be vulnerable, especially the EPYC servers that are in use now, which could be spreading some of these exploits to other machines as we speak. That's why it was wrong for CTS to not wait a proper amount of time. Now that the exploits have been published, black hat hackers know what to target, and know there's no defense against it (for now).
Posted on Reply
#75
AsRock
TPU addict
HoodThat's all we can do - but my concern is that in the meantime, all AMD systems may be vulnerable, especially the EPYC servers that are in use now, which could be spreading some of these exploits to other machines as we speak. That's why it was wrong for CTS to not wait a proper amount of time. Now that the exploits have been published, black hat hackers know what to target, and know there's no defense against it (for now).
Well that should be on CTS acting irresponsible and should be taken to the cleaners for acting the way they did. Sure AMD need to do some thing and chances are they are doing all they can.

In the end it's not a good place to be in but it's hardly AMD's fault or at least proven. It's a shame AMD cannot get the courts or who ever to get CTS to hand over there findings to get this resolved ASAP. In fact i think the government should step in and force they to do so.
Posted on Reply
Add your own comment
Apr 26th, 2024 20:36 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts