AMD now has security flaws like Intel’s Spectre and Meltdown show up in a wide range of their processors. 13 critical flaws in AMD Ryzen and EPYC processors mean that attackers can get in and access data, install malware and control the computer with full access to the system. CTS labs in Israel found the vulnerabilities. CTS Labs is a security-based company.
AMD vulnerabilities – Fallout
For AMD, the key vulnerabilities are Fallout (v1, v2, and v3), Chimera (v1 and v2) Ryzenfall (v1, v2, v3 and v4) and Masterkey (v1, v2, and v3). Fallout affects the bootloader and secure processor. This issue allows attackers to get into the SMRAM and Windows Credential Guard, giving attackers the ability to read from and write to the areas. The BIOS flashing protections are bypassed to steal network credentials.
Chimera is two vulnerabilities that come from backdoors put in place by the manufacturer. One hits the firmware inside the chip, and the other gets into the ASIC hardware. Attackers can, therefore, use man-the-middle attacks to hack into Bluetooth and Wi-Fi connections, run arbitrary code and reflash the chip to get malware on the device. Chimera makes it easy to install a keylogger so that an attacker can view all the keystrokes created on the computer.
Ryzenfall exists on the AMD secure OS, attacking Ryzen secure processors. The execution of unauthorized code can run on the secure processor. The installation of malware is made easy for a hacker with this flaw right in the heart of the process. SSM protections that stop unauthorized reflashing the BIOS and attacks to steal data bypassing Windows Credential Guard are possible. This vulnerability means that attackers can hit any computer on the network.
Masterkey is like the other vulnerabilities. Attackers can disable the Firmware Trusted Platform Module and Secure Encrypted Virtualization, inject malware into the processor and steal network credentials. Hackers can combine Masterkey with the other flaws to infect a system and gain control.
The vulnerabilities exist on the EPYC server (Fallout and Masterkey), Ryzen workstation (Chimera, Masterkey, and Ryzenfall), Ryzen Pro (Chimera and Ryzenfall) and Ryzen mobile (Ryzenfall). Oddly, the flaws are in the part that is meant to have the most secure region, the area that stores passwords and encryption keys. Regarding effects on the system, being able to get in and control the protected area can create significant problems for users.