Windows 10: AMD processors from 2011 to 2019 vulnerable to two new attacks

Discus and support AMD processors from 2011 to 2019 vulnerable to two new attacks in Windows 10 News to solve the problem; Academics disclose new Collide+Probe and Load+Reload attacks on AMD CPUs. AMD processors manufactured between 2011 and 2019 (the time of testing) are... Discussion in 'Windows 10 News' started by Brink, Mar 7, 2020.

  1. Brink Win User

    AMD processors from 2011 to 2019 vulnerable to two new attacks


    Read more: AMD processors from 2011 to 2019 vulnerable to two new attacks | ZDNet

    :)
     
    Brink, Mar 7, 2020
    #1

  2. Intel PCs vulnerable to attack

    It's actually a vulnerability of the x86 platform. It's documented and AMD is using exactly the same platform. So the odds are that AMD is vulnerable too. Then again it doesn't work with Windows, so good luck to you Linux users.
     
    DanTheBanjoman, Mar 7, 2020
    #2
  3. btarunr Win User
    CTS Labs Posts Some Clarifications on AMD "Zen" Vulnerabilities

    CTS-Labs the research group behind the AMD "Zen" CPU vulnerabilities, posted an addendum to its public-release of the whitepaper, in an attempt to dispel some of the criticism in their presentation in the absence of technical details (which they shared with AMD and other big tech firms). In their clarification whitepaper, quoted below, they get into slightly more technical details on each of the four vulnerability classes.


    AMD processors from 2011 to 2019 vulnerable to two new attacks f5pqK0OJlGPM1Xq8_thm.jpg


    Clarification About the Recent Vulnerabilities
    [CTS Labs] would like to address the many technical points and misunderstandings with a few technical clarifications about the vulnerabilities. The vulnerabilities described in our site are second-stage vulnerabilities. What this means is that the vulnerabilities are mostly relevant for enterprise networks, organizations and cloud providers.

    Computers on enterprise networks occasionally get compromised - whether through phishing attempts, zero-day exploits or employees downloading the wrong file. High-security enterprise networks are equipped to deal with these kinds of "every-day" attacks. They do this by keeping their systems up to date, enabling security features, and employing additional measures such as endpoint security solutions.

    The vulnerabilities described in amdflaws.com could give an attacker that has already gained initial foothold into one or more computers in the enterprise a significant advantage against IT and security teams.

    The only thing the attacker would need after the initial local compromise is local admin privileges and an affected machine. To clarify misunderstandings - there is no need for physical access, no digital signatures, no additional vulnerability to reflash an unsigned BIOS. Buy a computer from the store, run the exploits as admin - and they will work (on the affected models as described on the site).

    Attackers in possession of these vulnerabilities would receive the following additional capabilities:
    • Persistency: Attackers could load malware into the AMD Secure Processor before the CPU starts. From this position they can prevent further BIOS updates and remain hidden from security products. This level of persistency is extreme - even if you reinstall the OS or try to reflash the BIOS - it won't work. The only way to remove the attacker from the chip, would be to start soldering out chips. (we have seen a motherboard that had a socket where you can switch chips - then you could just put a new SPI chip).
    • Stealth: Sitting inside the AMD Secure Processor or the AMD Chipset is, at the moment, outside the reach of virtually all security products. AMD chips could become a safe haven for attackers to operate from.
    • Network Credential Theft: The ability to bypass Microsoft Credentials Guard and steal network credentials, for example credentials left by the IT department on the affected machine. We have a PoC version of mimikatz that works even with Credential Guard enabled. Stealing domain credentials could help attackers to move to higher value targets in the network.
    • Specific AMD Secure Processor features for cloud providers, such as Secure Encrypted Virtualization, could be circumvented or disabled by these vulnerabilities.
    What was it tested on?
    These are the machines we have tested the vulnerabilities on. On our site, every red circle in the vulnerabilities map represents a working PoC that was tested in our lab.

    This is the list of hardware that has been tested in our lab:
    • BIOSTAR B350 GT3 Ryzen Motherboard.
    • GIGABYTE AB350-GAMING 3
    • HP EliteDesk 705 G3 SFF Ryzen Pro machine
    • HP Envy X360 Ryzen Mobile Laptop
    • TYAN B8026T70AV16E8HR EPYC SERVER
    • GIGABYTE MZ31-AR0 EPYC SERVER
    RYZENFALL, FALLOUT
    Requirements
    • Physical access is not required. An attacker would only need to be able to run an EXE with local admin privileges on the machine.
    Impact:
    • Write to SMM memory, leading to code execution in SMM.
    • Reading and/or tampering with Credential Guard VTL-1 memory through the PSP.
    • Ryzenfall-4, which achieves code execution inside the PSP, leads to all the attacker capabilities described above, as well as the capability to tamper with the PSP and its security features.
    • An attacker can use RYZENFALL or FALLOUT to bypass Windows Credential Guard, steal network credentials, and then use these to move laterally through Windows-based enterprise networks
    MASTERKEY
    Requirements:
    • Physical access is not required. An attacker would only need to be able to run an EXE with local admin privileges on the machine.
    • Wait for reboot.
    Impact:
    The MASTERKEY set of vulnerabilities enable an attacker to execute unsigned code inside the PSP. Totaling a complete compromise of the Secure Processor. The exploit reflashes the BIOS to take advantage of the vulnerability:
    • On some motherboards - this works out of the box. This is because PSP firmware is often ignored by BIOS signature checks.
    • In other cases - RYZENFALL #1-2 could be used as a prerequisite for MASTERKEY to achieve code execution in SMM and bypass BIOS signature checks made in SMM code.
    • Even if all else fails, we believe using RYZENFALL-4 to write to SPI flash from inside the PSP is probably possible.
    CHIMERA
    Requirements:
    • Physical access is not required. An attacker would only need to be able to run an EXE with local admin privileges on the machine.
    Impact:
    The CHIMERA set of vulnerabilities are a set Manufacturer Backdoors left on the AMD Chipset, developed by Taiwanese company ASMedia.
    • This allows for an attacker to inject malicious code into the chip and take over the chipset (Read/Write/Execute).
    • One set of backdoors in implemented in firmware, while the other is implemented in the actual logic gates of the chip (ASIC). Both yield to the same impact.
     
    btarunr, Mar 7, 2020
    #3
  4. Brink Win User

    AMD processors from 2011 to 2019 vulnerable to two new attacks

    New vulnerability lets attackers sniff or hijack VPN connections

    Read more: New vulnerability lets attackers sniff or hijack VPN connections | ZDNet
     
    Brink, Mar 7, 2020
    #4
Thema:

AMD processors from 2011 to 2019 vulnerable to two new attacks

Loading...
  1. AMD processors from 2011 to 2019 vulnerable to two new attacks - Similar Threads - AMD processors 2011

  2. Replace AMD Processor with an Intel Processor

    in Windows 10 Drivers and Hardware
    Replace AMD Processor with an Intel Processor: I am using an laptop with AMD processor. but I wanted to change the processor only not the laptop. i wanted to add intel Core i5 processor in the place of AMD. But I have heard that AMD cannot be replaced by intel or other processors since the slots are seen to be different....
  3. Introducing new AMD Ryzen Threadripper PRO Processors

    in Windows 10 News
    Introducing new AMD Ryzen Threadripper PRO Processors: [media] Today, AMD (NASDAQ: AMD) announced the new AMD Ryzen Threadripper PRO Processor line-up, with up to 64 cores and unrivalled bandwidth3 built with enterprise-grade AMD PRO technologies. Designed for professional workstations from OEMs and system integrators, AMD...
  4. AMD announces 3 new Ryzen 3000XT processors and AMD B550 chipsest

    in Windows 10 News
    AMD announces 3 new Ryzen 3000XT processors and AMD B550 chipsest: Today, AMD (NASDAQ: AMD) announced three new additions to the 3rd Gen AMD Ryzen™ desktop processor family – the AMD Ryzen™ 9 3900XT, AMD Ryzen™ 7 3800XT and AMD Ryzen™ 5 3600XT processors. Introducing XT branding for the first time to...
  5. From INTEL to AMD processor BSOD problem

    in Windows 10 BSOD Crashes and Debugging
    From INTEL to AMD processor BSOD problem: Hello, I switched to a new motherboard with an amd processor, I was using Intel before. I never got BSOD before on my windows 10 PC. I am getting different BSOD messages such as: IRQL_GT_ZERO_AT_SYSTEM_SERVICE INTERRUPT_EXCEPTION_NOT_HANDLED...
  6. New vulnerability lets attackers sniff or hijack VPN connections

    in Windows 10 News
    New vulnerability lets attackers sniff or hijack VPN connections: Academics have disclosed this week a security flaw impacting Linux, Android, macOS, and other Unix-based operating systems that allows an attacker to sniff, hijack, and tamper with VPN-tunneled connections. The vulnerability -- tracked as CVE-2019-14899 -- resides in the...
  7. AMD Announces New AMD Ryzen Pro 3000 Series Processors

    in Windows 10 News
    AMD Announces New AMD Ryzen Pro 3000 Series Processors: Today, AMD (NASDAQ: AMD) announced the global availability of its new AMD Ryzen™ PRO 3000 Series desktop processor lineup, along with new AMD Ryzen™ PRO processors with Radeon™ Vega Graphics and AMD Athlon™ PRO processors with Radeon™ Vega Graphics. The AMD Ryzen PRO and...
  8. vulnerable double pulsar attack

    in AntiVirus, Firewalls and System Security
    vulnerable double pulsar attack: sir i reinstalled window 8.1 from iso file from microsoft official site now from avast i came to know that windows is affected by vulnerable double pulsar ..............plzzzzzzz helpppppppp...
  9. Intel CPUs Vulnerable to New 'BranchScope' Attack

    in Windows 10 News
    Intel CPUs Vulnerable to New 'BranchScope' Attack: Researchers have discovered a new side-channel attack method that can be launched against devices with Intel processors, and the patches released in response to the Spectre and Meltdown vulnerabilities might not prevent these types of attacks. The new attack, dubbed...
  10. Research shows antivirus products vulnerable to attack

    in Windows 10 News
    Research shows antivirus products vulnerable to attack: A Google researcher has been reporting severe vulnerabilities in security suites from Kaspersky, Trend Micro, MalwareBytes, FireEye, AVG, ESET and now Comodo. Google security researcher Tavis Ormandy has long been a pain to vendors of commercial software with significant...