AMD confirms Ryzenfall vulnerabilities, but says they'll be fixed soon via routine BIOS updates Credit: CTS-Labs/YouTube
Security

AMD confirms Ryzenfall vulnerabilities, but says they'll be fixed soon via routine BIOS updates

AMD has acknowledged the Ryzenfall vulnerabilities discovered by CTS-Labs, though the chip company believes the flaws can be patched via BIOS updates issued over the next few weeks.

In a blog post authored by AMD’s chief technical officer, Mark Papermaster, AMD confirmed that the four broad classifications of attacks—Masterkey, Ryzenfall, Fallout, and Chimera—are viable, though they require administrative access to the PC or server in question. Third-party protection, such as Microsoft Windows Credential Guard, also serve to block unauthorized administrative access, Papermaster wrote.

In any event, “any attacker gaining unauthorized administrative access would have a wide range of attacks at their disposal well beyond the exploits identified in this research,” AMD’s Papermaster added.

But AMD also provided the answer to consumers’ most pressing question: What, if anything, needs to be done? For each of the first three classifications of vulnerabilities, AMD said it is working on firmware updates that the company plans to release during the coming weeks. That firmware will be distributed via a BIOS update that the company already planned to release. “No performance impact is expected,” AMD added.

The fourth category of vulnerability, known as Chimera, affected the Promontory chipset, which CTS-Labs said was designed with logic supplied by ASMedia, a third-party vendor. While AMD said patches for that will also be released via a BIOS update, the company said it is working with the Promontory chipset maker on developing the mitigations, rather than supplying its own.

AMD has neither confirmed nor denied whether the attacks can be executed remotely, or require local access. AMD did deny, however, that the attacks have anything to do with Meltdown or Spectre, the two side-channel attacks that rival Intel has worked to patch.

About a week ago, CTS-Labs issued a press release as well as a website outlining the vulnerabilities, which the company provided to AMD less than 24 hours before CTS-Labs went public, AMD said. But CTS-Labs also drew fire over boilerplate copy on its website that implied a potential financial interest in the subjects of its reports. PCWorld attempted to interview CTS executives, but later rescinded that request after CTS-Labs representatives demanded a list of questions in advance, and also forbade us from asking about the timing and the company’s financial motivations.

In the meantime, however, the vulnerabilities were confirmed by two independent researchers, Trail of Bits and Check Point. Both expressed doubts that attackers would be able to exploit the vulnerabilities that CTS-Labs had originally discovered.

What this means to you: For now, everyone can take a deep breath and relax. While AMD did not say specifically when the patches would be released, it sounds like they’ll be coming in the next few weeks. Since it’s unlikely that the vulnerabilities would be weaponized in such a short time, Ryzen PC owners can probably feel confident that their PCs are secure.

IDG Insider

PREVIOUS ARTICLE

«Microsoft shrinks Windows 10's upgrade downtime

NEXT ARTICLE

Best Android Launchers 2018»
author_image
IDG Connect

IDG Connect tackles the tech stories that matter to you

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?