• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

Let me know when they confirm or deny all this - that might actually be interesting.
 
This seems like a total fud campaign by intel. Really? Release all this information without giving the company time to react and call yourself security firm. I have never seen any security company publish anything for long period until they have given the company time to patch anything. So it seems like politics here. lol.
 
so tldr you need administrator access to use any of these
and one requires a bios flash from windows which is a risky proceedure

what exactly is new about any of this ? none of these are unpatchable with a bios update ....

also are we not gonna touch on the total amature job they did on their website and disclosure practice

I hate amd as much as the next blue blooded intel user but this whole disclosure stinks of SEC fraud and people with a agenda
cts labs didn't even exist a little over a year ago both of there websites are rife with bad engrish and stock photos and where registered in the last year
 
Let me know when they confirm or deny all this - that might actually be interesting.

So, if any of those exploits are real... you still need admin privileges?

If a malicious actor has already gotten their hands on admin privileges, wouldn't you have bigger problems to worry about?
 
It's so funny seeing AMD aficionados going in defense mode :p
ROFL have you seen a legit reputable company do this to a manufacturer? Really? Give 24 hours notice, and then make a site called amdflaws.com, imagine google doing this. This seems like intel sponsored smear campaign. I bet you if the link is ever discovered it will backfire big time on Intel. I have not seen a company go out of their way and give little to no notice, publish all this and even make a website to bash the product. You have to be dumb to call anyone fanboy, it just sounds like there is a clear intention to hurt amd sales as fast as they can.

so tldr you need administrator access to use any of these
and one requires a bios flash from windows which is a risky proceedure

what exactly is new about any of this ? none of these are unpatchable with a bios update ....

also are we not gonna touch on the total amature job they did on their website and disclosure practice

I hate amd as much as the next blue blooded intel user but this whole disclosure stinks of SEC fraud and people with a agenda
cts labs didn't even exist a little over a year ago both of there websites are rife with bad engrish and stock photos and where registered in the last year

I agree. Haven't bought an AMD CPU for a decade and this makes me go out and buy one lol. Just because it seems like this is very deliberate and this company even set up a site called amdflaws? rofl.
 
I can't believe it. Seems that everything to do with computers has lots of serious security vulnerabilities in it, from Windows, to apps, to WPA2, routers, IoT and now CPUs of either brand.

Looks like computer security is a chimera. :rolleyes: No wonder the exploits keep coming.

EDIT: Ok, reading some of the comments, it seems that the veracity of this report may be in some doubt. Let's hope it's fake, but I'm not holding my breath.
 
Last edited:
I mean, assuming these flaws do exist, they should not require physical access, only admin rights...

...but in the meantime, can everyone turn down the fanboy? It's getting hard to hear.

I can't believe it.

I can.
 
Maybe I could be waiting for some specific file to be transferred to the server? Or maybe I could be a creep and monitor all communications in and out?

Look at Equifax, the guys just sat down and held the doors open for themselves for a few months. What if someone did that with the NSA? Valuable data would definitely go through there, and there would be people very interested in getting it, no matter the cost. If that happened to the Pentagon's network... well, that could be really worrisome.

This is'nt exactly how servers are being hacked. Let me give you an example. Wordpress for instance. Used over 40% in the complete internet today. Very populair and hugeeee database to plugins, themes and what more. Complete businesses rely on a simple wordpress website. It's know that wordpress needs alot of updates and esp. on security level, since it is a very bad product from design actually.

When it comes down to security, wordpress could have a zero day exploit, or one of the plugins, which hackers could download, analyse and write a script for it in order to break into. It's really hard to run through every line of code since most people rely on the functionality of the plugin or theme and just expect the developper to do his homework. Anyway, so lets say a plugin or theme gets hacked, it's a fairly simple task to 'upload' a file to the server, and execute it remotely.

It's called a shell. Now a shell is just a little script packed with all sorts of stuff to discover the server, configuration and even extra's to drop another payload. It's very populair these days. I've seen company's install wordpress under ROOT level (lol) which is screaming for trouble's. If a server has outdated or unpatched software it's just minutes work to pass through any flaws. But the main question is will the server itself be hackable in this case in order to get ROOT rights and start updating biosses.

If you get root in the first place, you dont need this specific exploit anymore since you can do whatever you want with the server.

If i'd sell motherboards on Ebay tomorrow with modified biosses, that already poses a security threat since i could program it to make a call to home. I'd know the user, the IP and i could do anything related to it remote, that's what this exploit is basicly about. But if you overwrite the bios with a latest and brand new one, pretty much as good as that the exploit is gone.

They have a point; there's lots you can do with it, but not as critical as Meltdown or Spectre was.
 
Also, I hear if you let a user take a hammer to AMD processors, they break... unlike Intel.
Nah, it's Intel too. And nvidia
 
From the linked website

" Although we have a good faith belief in our analysis and believe it to be objective and unbiased, you are advised that we may have, either directly or indirectly, an economic interest in the performance of the securities of the companies whose products are the subject of our reports. Any other organizations named in this website have not confirmed the accuracy or determined the adequacy of its contents."

What exactly does "we may have, either directly or indirectly, an economic interest" mean precisely here? Did they make this white paper for free or was it commissioned by Intel?

Also I'm going to wait for another group to verify their claims. They specificly state here that it has only been validated by them.

Eitherway, TPU probably benefits from the clickbait ~ish title. Who cares if the news is true or not. Dumb average Joe lives on sensationalism. Plus increased traffic and attention benefits both those researchers as well as any tech site that publish these without a serious look into the actual issue. More publicity and sweet sweet ad revenue, yay.

See this:

http://science.sciencemag.org/content/359/6380/1094.full

The difference is the paper on fake news is peer reviewed, not some magical claim certain “researchers “ pull out of their ass

That's the problem though, many people absorb just the title. I don't think it's in any tech outlet's best interest when the community here can easily see red flags popping up. This is the reason the whole fake news thing started up, because websites were willing to sacrifice journalistic integrity for clicks.


24 hours to respond.... That's completely unacceptable. Their website comes off as trying to protect the general public but then if you read their disclaimer and that they only gave AMD 24 hours to respond and that they didn't verify their claims with any other group, these are major red flags. That's not even enough time for AMD to validate their claims.

I did some additional research on these guys and they started in 2017 and are pretty small themselves.
 
Last edited:
What is important is AMD confirming this and how they respond with their fixes. Intel wanted to drag everyone down with their patches, I hope AMD does better than that.
 
"In light of CTS’s discoveries, the meteoric rise of AMD’s stock price now appears to be totally unjustified and entirely unsustainable. We believe AMD is worth $0.00 and will have no choice but to file for Chapter 11 (Bankruptcy) in order to effectively deal with the repercussions of recent discoveries."

-Direct quote from Viceroy research

It seems more and more like a smear campaign....
 
Guys, we knew AMD was operating on a shoe string budget during Ryzen development. This is not surprising. Even if Intel had a hand in research, that isn't even a crime. Chevy does ads comparing the bed of the F150 with the Silverado steel vs aluminum. It would be negligent to just let AMD market their chips one way when the reality is another. Just analyze it, fix it, and move on. Ryzen is still a great product even if it needs some patches.

Yes but those claims are put in the context of an ad. Context is everything here. In this case these security researchers are posing this as independent findings.

https://www.gamersnexus.net/industry/3260-assassination-attempt-on-amd-by-viceroy-research-cts-labs
 
btw the folks at cts are known to have some pretty big shares of intel stock .... take that as you will
@btarunr can we get some corrections here or least a link to... https://wccftech.com/low-down-amd-security-exploit-saga-cts-labs/
I've read that Wccftech article now and the "research" company certainly looks shady as fuck. Definitely looks like they're after a quick buck by trashing AMD's reputation and shares.

In short, I wouldn't let this put me off buying AMD's processors. Frankly, I wouldn't be surprised if Intel is behind this somewhere, just really well hidden.
 
After doing some more reasearch into this (reading all the comments here) its definitely being inflated, the risk to home users is low, and the risk to enterprise/business level is at the point where its a specific targeted attack (needs local admin access, possibly hardware access) so while it does need to be corrected, its certainly not a widescale threat to all ryzen users out there
 
btw the folks at cts are known to have some pretty big shares of intel stock .... take that as you will
@btarunr can we get some corrections here or least a link to... https://wccftech.com/low-down-amd-security-exploit-saga-cts-labs/

I've heard from a semi-credible source that a hackathon is underway, let's see what comes out of that. Unfortunately information from that source isn't credible enough to post.

In the meantime, CTS is also reaching out to the press. We've been contacted, they pointed us in the direction of some "third-parties" who could corroborate their claims. We've attempted contact with those third-parties.

I'd be shocked if AMD's counterattack vector isn't in trying to prove that many of these vulnerabilities exist even with Intel processors, and to prevent a short.
 
Low quality post by OneMoar
semi credible anus whatttttt
go home bta you are drunk
 
Low quality post by btarunr
This came out 18 days to early :roll:

What a load of crap!
 
Well on the positive side of things if AMD did go to $0's there is no x86 or GPU monopoly to worry about from Intel or Nvidia. We can totally expect tons of innovation out of both.
 
Back
Top