gfxgfx
 
Please login or register.

Login with username, password and session length
 
gfx gfx
gfxgfx
 
Room Address: WinMxWorld.Com Help_BABA1354BABE
 
gfx gfx
gfx
75708 Posts in 13284 Topics by 2659 Members - Latest Member: OnkelMichl October 19, 2018, 01:42:07 am
*
gfx*gfx
gfx
WinMX World :: Forum  |  Discussion  |  WinMx World News  |  AMD Processor Flaw Discovered - Physical Acces Required To Exploit
gfx
gfxgfx
 

Author Topic: AMD Processor Flaw Discovered - Physical Acces Required To Exploit  (Read 504 times)

0 Members and 1 Guest are viewing this topic.

Offline GhostShip

  • Ret. WinMX Special Forces
  • WMW Team
  • *****
This story is really a bit of an anti climax of hype compared to the real Intel disaster.

https://www.theregister.co.uk/2018/01/06/amd_cpu_psp_flaw/
Quote
Cfir Cohen, a security researcher from Google's cloud security team, on Wednesday disclosed a vulnerability in the fTMP of AMD's Platform Security Processor (PSP), which resides on its 64-bit x86 processors and provides administrative functions similar to the Management Engine in Intel chipsets.

Cohen's post described the vulnerability as remote code execution flaw. However, physical access is a prerequisite.

In an email to The Register, Dino Dai Zovi, cofounder and CTO of security biz Capsule8, said the vulnerability isn't quite subject to remote execution "since the crafted certificate that exploits the vulnerability needs to be written to NVRAM, the attacker must already have privileged access to the host or physical access. It would let an attacker bypass secure/trusted boot, which is performed by the TPM."

An AMD spokesperson told The Register that an attacker would first have to gain access to the motherboard and then modify SPI-Flash before the issue could be exploited..


I am wondering why the Google researcher is making the false claim of remote acess given there no such access by default on anyones AMD machine, perhaps he has Intel shares.

Offline Pri

  • MX Hosts
  • *****
  • *****
Re: AMD Processor Flaw Discovered - Physical Acces Required To Exploit
« Reply #1 on: January 07, 2018, 12:53:49 pm »
I think their fear here is that servers using AMD's EPYC could be intercepted on route to customers (which the NSA / CIA are known to do as per the Snowden leaks) and then implant their own firmware. Once that's done they could then remote the servers.

The risk to us as consumers is low, unless you use the services of a company that had their servers tampered with on route to delivery. I also believe the PSP in AMD's systems can be deactivated on some consumer boards since a recent BIOS update.

WinMX World :: Forum  |  Discussion  |  WinMx World News  |  AMD Processor Flaw Discovered - Physical Acces Required To Exploit
 

gfxgfx
gfx
©2005-2018 WinMXWorld.com. All rights reserved.
SMF 2.0.15 | SMF © 2017, Simple Machines
Page created in 0.029 seconds with 18 queries.
Helios Multi © Bloc
gfx
Powered by MySQL Powered by PHP Valid XHTML 1.0! Valid CSS!