AMD confirms Ryzenfall vulnerabilities, promises a fix via routine BIOS updates

AMD Ryzen
Image: AMD



Read More:

21 March 2018 | 0

AMD has acknowledged the Ryzenfall vulnerabilities discovered by CTS-Labs, though the chip company believes the flaws can be patched via BIOS updates issued over the next few weeks.In a blog post authored by AMD’s chief technical officer, Mark Papermaster, the company confirmed that the four broad classifications of attacks – Masterkey, Ryzenfall, Fallout, and Chimera – are viable, though they require administrative access to the PC or server in question. Third-party protection, such as Microsoft Windows Credential Guard, also serve to block unauthorized administrative access, Papermaster wrote.In any event, “any attacker gaining unauthorised administrative access would have a wide range of attacks at their disposal well beyond the exploits identified in this research,” AMD’s Papermaster added.

But AMD also provided the answer to consumers’ most pressing question: What, if anything, needs to be done? For each of the first three classifications of vulnerabilities, AMD said it is working on firmware updates that the company plans to release during the coming weeks. That firmware will be distributed via a BIOS update that the company already planned to release. “No performance impact is expected,” AMD added.

The fourth category of vulnerability, known as Chimera, affected the Promontory chipset, which CTS-Labs said was designed with logic supplied by ASMedia, a third party vendor. While AMD said patches for that will also be released via a BIOS update, the company said it is working with the Promontory chipset maker on developing the mitigations, rather than supplying its own.

AMD has neither confirmed nor denied whether the attacks can be executed remotely, or require local access. AMD did deny, however, that the attacks have anything to do with Meltdown or Spectre, the two side-channel attacks that rival Intel has worked to patch.

About a week ago, CTS-Labs issued a press release as well as a website outlining the vulnerabilities, which the company provided to AMD less than 24 hours before CTS-Labs went public, AMD said. But CTS-Labs also drew fire over boilerplate copy on its website that implied a potential financial interest in the subjects of its reports.

In the meantime, however, the vulnerabilities were confirmed by two independent researchers, Trail of Bits and Check Point. Both expressed doubts that attackers would be able to exploit the vulnerabilities that CTS-Labs had originally discovered.

While AMD did not say specifically when the patches would be released, it sounds like they’ll be coming in the next few weeks. Since it’s unlikely that the vulnerabilities would be weaponised in such a short time, Ryzen PC owners can probably feel confident that their machines are secure.

IDG News Service

Read More:

Comments are closed.

Back to Top ↑