Archive for AMD

AMD Silicon Flaw Found By Security Researchers At Google

Posted in Commentary with tags , on February 4, 2025 by itnerd

Google security researchers have recently discovered CVE-2024-56161, a microprocessor vulnerability that could lead to the loss of Secure Encrypted Virtualization (SEV) protection, and allow an attacker to load malicious code. You can read the research here:

https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w

Google Security Team has identified a security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside a VM) to load malicious microcode patches. We have demonstrated the ability to craft arbitrary malicious microcode patches on Zen 1 through Zen 4 CPUs. The vulnerability is that the CPU uses an insecure hash function in the signature validation for microcode updates. This vulnerability could be used by an adversary to compromise confidential computing workloads protected by the newest version of AMD Secure Encrypted Virtualization, SEV-SNP or to compromise Dynamic Root of Trust Measurement.

And:

Google notified AMD of this vulnerability on September 25, 2024. AMD subsequently provided an embargoed fix to its customers on December 17, 2024. To coordinate with AMD, we made a one-off exception to our standard vulnerability disclosure policy and delayed public disclosure until today, February 3, 2025. This joint disclosure occurs 46 days after AMD shared the fix with its customers and 131 days after Google’s initial report. Due to the deep supply chain, sequence and coordination required to fix this issue, we will not be sharing full details at this time in order to give users time to re-establish trust on their confidential-compute workloads. We will share additional details and tools on March 5, 2025.

Andrew Obadiaru, CISO, Cobalt had this comment:

     “The discovery of this vulnerability, along with the subsequent collaboration between AMD and Google, underscores the importance of responsible vulnerability disclosure. By proactively identifying and addressing the issue before it could be widely exploited. 

This vulnerability, tracked as CVE-2024-56161, highlights ongoing hardware security challenges. While CPU vulnerabilities are not new, they remain difficult to detect due to the complexity of modern processors. Additionally, many organizations, including major manufacturers, often prioritize performance over security when it comes to patching CPUs, as such updates can lead to performance trade-offs. Could this vulnerability be a result of that trade-off?

Organizations must ensure that users promptly apply patches through firmware updates, operating system patches, etc. More importantly, hardware manufacturers should prioritize security at the design stage rather than treating it as an afterthought once vulnerabilities are discovered.”

Gunter Ollmann, CTO, Cobalt adds this:

     “For decades flawed or absent update security validation has been a common threat. Failure to sign patches, updates, firmware, and microcode, etc. and failure to verify the signature and identify tampering have seen countless otherwise secure devices and software to fall victim to targeted attack.

Silicon-level device security is both one of the hardest to master and the most vital. The root of trust starts and ends with the secrets within the silicon layer.

If security fails at the silicon-level than all the layers above (firmware, drivers, software, data storage) are undermined and compromised.”

It’s good that this is being fixed as AMD is seeing a rise in its fortunes in the processor space. Thus it is highly likely that it will be targeted by threat actors looking for weaknesses in their silicon that they can exploit to do their evil deeds.

Whose Chips Are Worse? Intel Or AMD?

Posted in Commentary with tags , on August 11, 2024 by itnerd

This week has had a lot of bad news for Intel and AMD. In both cases, they have bad news about the quality of the chips that they make. Let’s start with AMD and their “Sinkclose” vulnerability:

The Sinkclose vulnerability allows hackers to execute code within the System Management Mode (SMM) of AMD processors, a highly privileged area typically reserved for critical firmware operations. To exploit this flaw, attackers must first gain access to a system’s kernel, which isn’t easy, but it is possible. However, the system must already have been compromised by some other attack. 

Once this access is secured, the Sinkclose vulnerability allows the perpetrators to install bootkit malware that evades detection by standard antivirus tools, remaining nearly invisible within the system and can persist even after the operating system is reinstalled.  

The vulnerability leverages an ambiguous feature in AMD chips known as TClose, which is meant to maintain compatibility with older devices. By manipulating this feature, the researchers were able to redirect the processor to execute their own code at the SMM level. This method is complex but provides attackers with deep and persistent control over the system. 

This is pretty bad. But to be clear, a threat actor needs to already have access to your system to pull off this attacks. But AMD has acknowledged this and has said that they will push out fixes for these soon, if they’re not already out.

Now let’s go over to Intel who has some serious stability issues with their processors:

Alderon Games revealed that it had observed a nearly 100% failure rate of Raptor Lake processors in its own testing. Telemetry from end customers reports thousands of Raptor Lake CPUs crashing in customers’ gaming PCs. Alderon Game’s own development systems utilizing Raptor Lake CPUs also suffer from frequent instability, leading to SSD and memory corruption. On top of this, the studio’s dedicated game servers leveraging Raptor Lake parts experience “constant crashes” to the point where they are taking entire servers down. 

The studio’s benchmarking tools also show failures with Raptor Lake parts, specifically decompression and memory tests unrelated to its Path of Titans game, which the company is developing.

The worst part is that Alderon Gamers has observed CPU deterioration over time, specifically over three to four months. Initially, the chips will work fine but eventually start failing. Microcode, BIOS, and firmware updates have failed to resolve these stability problems for the game studio.

So, unlike AMD who can push out fixes that will address their issues, Intel’s chips will eventually fail. That’s in my mind makes Intel’s issues worse than AMD. And after a lot of inaction from Intel, the company is finally admitting to the issue, which dates back to 2022, and is doing something about it:

Intel has announced that it has found the root cause of the crashing issues plaguing its CPUs. The company will issue a microcode update to address the issues by mid-August, ostensibly ending the long-running saga that began when the first sporadic reports of CPU crashing errors surfaced in December 2022 and grew to a crescendo by the end of 2023. Intel’s response comes after complaints about the issue, which causes PCs to inexplicably crash/BSOD during gaming and other workloads, reached a fever pitch in recent weeks. However, the microcode update will not repair impacted processors. Intel also confirmed a rumored issue with via oxidation in its 7nm node, but said those issues were corrected in 2023 and didn’t contribute to the failures.

Intel’s advisory says an erroneous CPU microcode is the root cause of the incessant instability issues. The microcode caused the CPU to request elevated voltage levels, resulting in the processor operating outside its safe boundaries. Intel is now validating a microcode patch to correct the issues, with its release slated for mid-August. This patch will be distributed through BIOS updates from motherboard OEMs and via Windows updates, so the timing for end-user availability could vary. 

The bug causes irreversible degradation of the impacted processors. We’re told that the microcode patch will not repair processors already experiencing crashes, but it is expected to prevent issues on processors that aren’t currently impacted by the issue. For now, it is unclear if CPUs exposed to excessive voltage have suffered from invisible degradation or damage that hasn’t resulted in crashes yet but could lead to errors or crashes in the future.

Intel advises all customers having issues to seek help from its customer support. Because the microcode update will not repair impacted processors, the company will continue to replace them. Intel has pledged to grant RMAs to all impacted customers.

Here’s another reason why Intel’s issues are worse than AMD’s issues:

Intel’s problems are beginning to catch up in a major way with the chipmaking behemoth. Just a couple of days after the company revealed via a community board post that the cause of 13th Gen “Raptor Lake” and 14th Gen “Raptor Lake Refresh” desktop processor (CPU) instability had been discovered in more chips than first thought, the Abington Cole + Ellery law firm began a class action lawsuit investigation.

The law firm — based in Tulsa, Oklahoma, with a focus on class action litigation — is currently gathering information from users who have experienced issues with the Raptor Lake chips.

And yet another reason:

Intel’s nightmare year continues. Fresh on the heels of laying off 15,000 employees and amidst a class action lawsuit about failing 13th Gen and 14th Gen CPUs, Intel now faces a lawsuit from its shareholders. The lawsuit claims that Intel hid issues that led to the company’s market value dropping $32 billion in one day.

“[The] company’s materially false or misleading statements regarding the business and its manufacturing capabilities inflated its stock price from Jan. 25 to Aug. 1,” claims the suit.

Intel CEO Patrick Gelsinger and CFO David Zinsner are the respondents of the lawsuit, which was filed on Wednesday, August 7, 2024 in San Francisco federal court. According to Reuters, Intel shareholders were blindsided by the fact that Intel’s foundry services are “floundering,” in the words of the shareholders.

So while AMD can fix the issues with their products and eventually move on, Intel is facing so much trouble that it could “end” them. Or at the very least hobble them to such a degree that they are never going to be anywhere near the top of the pile when it comes to chipmaking ever again.

Sucks to be Intel.

AMD Apparently Pwned By RansomHouse…. And It Might Have Been Easy To Do

Posted in Commentary with tags , on June 29, 2022 by itnerd

It seems that chipmaker AMD had been pwned by the ransomware and extortion group RansomHouse:

RansomHouse, a relatively new data-extortion cybercrime group, has announced a major new victim. Today, the group published a new update on its darknet site and are claiming to have breached Advanced Micro Devices (AMD), the large chip manufacturing company.

RansomHouse is claiming to have breached AMD’s network and exfiltrated “more than 450 Gb” of data back in January 2022. The group has also published a data sample as evidence.

And assuming that this happened, it looks like AMD was pwned rather easily. Check this out:

It’s no secret that hackers can easily launch attacks against networks with commonly-used passwords to to gain access. 

According to RansomHouse, this was the case with AMD, which the group claims was using “simple passwords” to protect its network.

An era of high-end technology, progress and top security…there’s so much in these words for the crowds. But it seems those are still just beautiful words when even technology giants like AMD use simple passwords like ‘password’ [others passwords redacted] … to protect their networks from intrusion. It is a shame those are real passwords used by AMD employees, but a bigger shame to AMD Security Department which gets significant financing according to the documents we got our our hands on – all thanks to these passwords.

– RansomHouse group

If that’s true, that’s really embarrsing for AMD.

AMD had this to say when they were asked about this:

On June 27th, we reached out to AMD for comment. AMD provided us with the following statement on June 28th:

AMD is aware of a bad actor claiming to be in possession of stolen data from AMD. An investigation is currently underway.  

-AMD Communications Director

RestorePrivacy is in contact with both AMD and RansomHouse and will update this article with any new information provided to us from either party.

That sounds like to me that this has actually happened. But we may want to wait for a more fulsome confirmation.

Saryu Nayyar, CEO and Founder, Gurucul:

     “In an ironic twist of fate, AMD survived the global chip supply chain crisis during the COVID-19 pandemic only to be victimized by ransomware from a new data extortion group. Doubling down on irony is that AMD staff used “password” as the password for critical network access. How does this still happen in companies with security savvy engineers? It’s beyond comprehension quite frankly. Time to spin all the passwords and clean up security controls. Seriously, it’s time.”

I can’t wait for the full details to come out. Because if these details are fact, a lot of people at AMD have some explaining to do.

UPDATE: Darren Williams, CEO and Founder of BlackFog added this comment:

     “We haven’t yet seen evidence of the attack on AMD, but RansomHouses’ recent attack on the Shoprite Group in South Africa would indicate that they are focused on large organizations with weak security. As with all cyberattacks it really doesn’t matter how the bad actors found their way in, weak passwords or otherwise, if they want to find a way in, they will be successful! What really matters is what data they were able to leave with. Extortion is the focus for cybercriminal gangs and organizations should look to newer technologies like anti data exfiltration to stop them in their tracks and prevent any unauthorized data from being exfiltrated.”

Oh Noes! Seven New Meltdown And Spectre Style CPU Attacks Found!

Posted in Commentary with tags , , on November 14, 2018 by itnerd

A team of nine academics has revealed today seven new CPU attacks. The seven impact AMD, ARM, and Intel CPUs to various degrees:

Two of the seven new attacks are variations of the Meltdown attack, while the other five are variations on the original Spectre attack — two well-known attacks that have been revealed at the start of the year and found to impact CPUs models going back to 1995. Researchers say they’ve discovered the seven new CPU attacks while performing “a sound and extensible systematization of transient execution attacks” — a catch-all term the research team used to describe attacks on the various internal mechanisms that a CPU uses to process data, such as the speculative execution process, the CPU’s internal caches, and other internal execution stages. The research team says they’ve successfully demonstrated all seven attacks with proof-of-concept code. Experiments to confirm six other Meltdown-attacks did not succeed, according to a graph published by researchers.

Well. This isn’t good. It’s a safe bet that people at ARM, AMD, and Intel are scrambling to verify if these attacks are fixable and how fast they can get those fixes out to the public.

Fun times….

A Tour Of The CNE Gaming Garage

Posted in Commentary with tags on August 26, 2018 by itnerd

This weekend AMD invited me to the CNE Gaming Garage at the Canadian National Exhibition in Toronto.

ZdPK3IKqQ4KkEuAOLQizDA

This is place to play and watch video game tournaments, pinball tournaments as well as some tech demos.

7JVwq6s+SgGJp8CMdwn5vw

There were retro video games like Pac Man, Tetris, and Galaga for those of a certain age who remember going to arcades to play video games.

j44oXhlaROWB7VRFtBkx+A

Here’s the pinball tournament in action.

NS88V2CHSHS77evShWiW3Q

You could play (in this case Fortnite) for fun, or sign up for a tournament if you want to take things up to another level.

uKNeXkemQNuGtdyj4VcINw

zRnJ6Oj+S06ZfQFACbJ6RQ

Or you can watch the experts play on the main stage.

R7b2Lsb+SCmG9qI+pYOGiw

9SbGagWPS1a3rHwcNO2ZagBjNQyW%fShavK6ZW23lM2A

A lot of cool looking custom gaming rigs wee on display.

MY4mbYCiR42ydcjabWG2oA

Not to mention some cool VR demos that I tried and found to be very cool.

LKF89YZEQSaeURIM4Tg

Just Dance 2018 was on display. You have to match what the on screen characters are doing to score points.

But the thing that was on display and people did not know was on display was AMD’s FreeSync 2 technology. In short the original FreeSync technology essentially allows a display to vary its refresh rate to match the render rate of a graphics processor, so that, for example, a game running at 54 FPS is displayed at 54 Hz, and when that games bumps up to 63 FPS the display also shifts to 63 Hz. This reduces stuttering and screen tearing compared to monitor operating at a fixed refresh rate, say 60 Hz, displaying a game running at an unmatched render rate like 54 FPS.  FreeSync 2 steps that up by having monitors that have been validated to have the additional features that are required to have FreeSync 2 to work. I played a couple of rounds of Fortnite (badly) and found that the graphics were incredibly smooth and fluid. Clearly it’s worth the investment to get an AMD graphics card and monitor that both support FreeSync 2.

It was a very interesting experience to watch the tournaments and try out the demos at the CNE Gaming Garage, making this a great Sunday. I’d like to thank AMD for the invitation as it was a very eye opening.

 

AMD And Microsoft Kick Out Fixes For Spectre

Posted in Commentary with tags , on April 12, 2018 by itnerd

AMD has begun rolling out microcode updates for its processors affected by the Spectre vulnerability. Specifically variant 2 of Spectre. It has been supplied to PC and motherboard makers to include in upcoming BIOS updates. Which I am going to guess will drop fairly quickly. On top of that, it will cover AMD processors going back to 2011.

You should also note that even with the BIOS update, you will need a patch from Microsoft as well. They’ve released an update in the form of KB4093112, which also includes special OS-level patches for AMD users with regard to the Spectre v2 vulnerability.

Thus, I’d be checking your motherboard manufacturer’s website and Windows Update for these updates.

AMD Comments On Chip Flaws: Nothing To See Here

Posted in Commentary with tags on March 21, 2018 by itnerd

AMD has finally commented on the security flaws in its Epyc, Ryzen, Ryzen Pro, and Ryzen Mobile chips, identified in a frankly dodgy manner by CTS Labs a week ago. In a post on the AMD website on Tuesday, Mark Papermaster, senior VP and CTO of AMD, had this to say. Oh as an aside, if the name sound familiar to frequent readers of this blog, this is why:

It’s important to note that all the issues raised in the research require administrative access to the system, a type of access that effectively grants the user unrestricted access to the system and the right to delete, create or modify any of the folders or files on the computer, as well as change any settings. Any attacker gaining unauthorized administrative access would have a wide range of attacks at their disposal well beyond the exploits identified in this research. Further, all modern operating systems and enterprise-quality hypervisors today have many effective security controls, such as Microsoft Windows Credential Guard in the Windows environment, in place to prevent unauthorized administrative access that would need to be overcome in order to affect these security issues

At least we know these flaws are real now. But in AMD’s opinion you would have to be highly skilled to exploit these flaws. In short, there’s nothing to see here. But they’re still going to fixed via firmware updates that are coming real soon now. No timeframe on those fixes just yet. But it appears to be a measured response. Far more measured than how these bugs were disclosed by CTS Labs, who wasn’t mentioned once in the post. That tells you all you need to know about what AMD thinks of CTS Labs.

 

Linus Torvalds Calls Out CTS Labs Report Of AMD CPU Flaws….. So What Is The Truth About This?

Posted in Commentary with tags on March 15, 2018 by itnerd

Earlier this week I told you about a company called CTS Labs who went public with flaws that are allegedly in AMD CPUs after only giving AMD a day to respond. Then they explained why they went that route yesterday, which left me calling “BS” on their explanation. But now things have gotten real with Linus Torvalds basically calling the company and their report out on Google+. I encourage you to scroll through the entire discussion as it is very interesting, but here’s some screenshots of some highlights involving the man himself in chronological order:

linusLinus1linus2Linus3

Tell us how you really feel Linus.

But in all seriousness, he makes some very good points in ways that only he can make them. Which is entertaining to read. While I didn’t consider the stock manipulation part, I did say this yesterday:

The cynic in me says that this company who nobody had heard of before yesterday was looking for a way to get their name in the news. So when they tripped over this issue…. Assuming that this discovery is accurate of course seeing as AMD hasn’t yet confirmed it…. They went into “beast mode” to create a slick website with equally slick videos to get their message out before speaking to AMD and giving them a day to respond. Of course knowing that they could not respond that quickly. Then when the 24 hours were up, BOOM, you get this. This whole thing sounds really fishy to me.

What makes this whole thing plausible is an investigation by Gamers Nexus which found the following regarding CTS Labs:

  • AMDFlaws.com, was registered mere weeks ago
  • The backgrounds in CTS-Labs videos explaining the flaws and its research appear to be green screens of offices rather than physical locations.
  • They have a disclaimer on their website that suggests that they have an “economic interest” and have made statements to that effect.

None of this is a smoking gun. But it all sounds kind of suspicious.

As for AMD stock, it doesn’t look like it’s changed all that much since this whole affair began. Clearly investors feel that what CTS Labs has to say falls under the category of “nothing to see here, move along”.

But let’s take the other side of the argument. There’s this person who has claimed to have verified that these flaws are real:

Dan Guido is the CEO of a company called Trail Of Bits. They are an IT security firm out of NYC and they do have a reputation that is positive from what I have heard. Thus it would suggest that the flaws are real. But there’s so much “noise” surrounding this rather craptastic disclosure that it is next to impossible to separate fact from fiction. Thus my suggestion is that we all need to take a deep breath and actually determine what the facts really are. It could be CTS Labs is telling the truth. But they delivered it in such a horrible manner that nobody trusts them. The bottom line is that we need to get to the bottom of this sooner rather than later. Because the longer that this sits out there with a lack of facts, the more the “noise” will increase. And that’s not good for anyone.

CTS Labs Explains Why It Gave AMD A Single Day To Respond To Alleged Chip Flaws….. I Don’t Know If I Believe It Though

Posted in Commentary with tags on March 14, 2018 by itnerd

Yesterday I told you about a company called CTS Labs who went public with flaws that are allegedly in AMD CPUs after only giving AMD a day to respond. That bucks the standard of giving a company 90 days to fix an issue before going public. That’s known as Responsible Disclosure. But these guys clearly don’t buy into that and the question I have is why did they simply give AMD a single day to respond. It truly sounds underhanded. We now have answers on that front via Tom’s Hardware where CTS Labs explained why they went that route:

CTS Labs told us that it bucked the industry-standard 90-day response time because, after it discussed the vulnerabilities with manufacturers and other security experts, it came to believe that AMD wouldn’t be able to fix the problems for “many, many months, or even a year.” Instead of waiting a full year to reveal these vulnerabilities, CTS Labs decided to inform the public of its discovery.

That isn’t to say that CTS Labs revealed the problems without checking their veracity. The company told us that it consulted with other security experts and manufacturers about the issue, provided them with proofs of concept and tutorials for exploiting the vulnerabilities, and waited for their responses before preparing the flaws for public disclosure. Trail of Bits CEO Dan Guido confirmed that his company backed up the findings, for example.

I am sorry but I have a huge problem with this explanation. The cynic in me says that this company who nobody had heard of before yesterday was looking for a way to get their name in the news. So when they tripped over this issue…. Assuming that this discovery is accurate of course seeing as AMD hasn’t yet confirmed it…. They went into “beast mode” to create a slick website with equally slick videos to get their message out before speaking to AMD and giving them a day to respond. Of course knowing that they could not respond that quickly. Then when the 24 hours were up, BOOM, you get this. This whole thing sounds really fishy to me. Besides if we assume that none of these flaws were in the wild, there’s little risk to those who own these processors. AMD could look at this, figure out how to address it, and do in a reasonable manner. But now that these flaws are in the wild, AMD likely will have to rush to get something out to address this. Again, assuming that this discovery is accurate. I really don’t get the warm fuzzies from these guys. I want to see how AMD responds to this, and if it’s proven (key word proven) to be false or having a very limited impact, I hope they take appropriate action against CTS Labs.

AMD May Have Chip Flaws Of Its Own

Posted in Commentary with tags on March 13, 2018 by itnerd

A couple of months ago we heard about Meltdown and Spectre. That was bad as it’s affected everyone who runs a PC, Mac, or pretty much anything else. But it’s about to get worse as we now have the following new chip flaws to worry about:

  • RyzenFall
  • MasterKey
  • Fallout
  • Chimera

The flaws, which are 13 vulnerabilities that fall into the above four buckets, were uncovered by a company called CTS Labs who served up a report via a very slick and fancy website and reportedly only gave AMD 24 hours to respond. That’s a bit of a #fail as we don’t know if their findings are actually valid. Here’s one reason why I am personally skeptical. There’s this disclaimer on the website that I linked to above:

Although we have a good faith belief in our analysis and believe it to be objective and unbiased, you are advised that we may have, either directly or indirectly, an economic interest in the performance of the securities of the companies whose products are the subject of our reports. Any other organizations named in this website have not confirmed the accuracy or determined the adequacy of its contents.

We’re expected to look past that and take this group seriously? Uh, my gut feeling is not to. But I will suspend disbelief as AMD is investigating and I am sure that every hacker on Earth is too so that they can leverage these flaws, if they are accurate, for pwnage on an epic scale. But if they aren’t accurate, I hope AMD sues them out of existence.

More to come.