HomeVulnerabilityAMD fixes bug that lets hackers load malicious microcode patches

AMD fixes bug that lets hackers load malicious microcode patches

​AMD has launched mitigation and firmware updates to deal with a high-severity vulnerability that may be exploited to load malicious CPU microcode on unpatched gadgets.

The security flaw (CVE-2024-56161) is attributable to an improper signature verification weak point in AMD’s CPU ROM microcode patch loader.

Attackers with native administrator privileges can exploit this weak point, ensuing within the lack of confidentiality and integrity of a confidential visitor working beneath AMD Safe Encrypted Virtualization-Safe Nested Paging (SEV-SNP).

In keeping with AMD’s improvement sources, SEV isolates company and the hypervisor from each other, and SEV-SNP provides reminiscence integrity safety that creates an remoted execution atmosphere by serving to stop malicious hypervisor-based assaults (e.g., information replay, reminiscence re-mapping, and extra).

AMD now gives mitigation requiring a microcode replace on all affected platforms to dam malicious microcode execution.

Some platforms additionally require a SEV firmware replace for SEV-SNP attestation, with customers having to replace the system BIOS and reboot to allow attestation of the mitigation.

See also  Apache OFBiz patches new important distant code execution flaw

To substantiate that the mitigation has been accurately put in, verify whether or not the microcode model(s) matches the one(s) listed within the desk under.

Code Title Household CPUID
Naples AMD EPYC 7001 Sequence 0x00800F12
Rome AMD EPYC 7002 Sequence 0x00830F10
Milan AMD EPYC 7003 Sequence 0x00A00F11
Milan-X AMD EPYC 7003 Sequence 0x00A00F12
Genoa AMD EPYC 9004 Sequence 0x00A10F11
Genoa-X AMD EPYC 9004 Sequence 0x00A10F12
Bergamo/Siena AMD EPYC 9004 Sequence 0x00AA0F02

“We’ve demonstrated the power to craft arbitrary malicious microcode patches on Zen 1 by Zen 4 CPUs. The vulnerability is that the CPU makes use of an insecure hash perform within the signature validation for microcode updates,” the Google Safety Group mentioned.

“This vulnerability might be utilized by an adversary to compromise confidential computing workloads protected by the most recent model of AMD Safe Encrypted Virtualization, SEV-SNP or to compromise Dynamic Root of Belief Measurement.”

Google security researchers, credited with discovering and reporting this flaw to AMD, have additionally shared a proof-of-concept (PoC) exploit (examined on AMD EPYC and AMD Ryzen 9 CPUs) that reveals how attackers can create arbitrary microcode patches.

See also  Over 1,450 pfSense servers uncovered to RCE assaults through bug chain

Their PoC exploit makes the RDRAND instruction on susceptible AMD Zen processors all the time return 4, which additionally units the carry flag (CF) to 0. This means that the return worth is invalid and ensures the exploit cannot be used “to compromise accurately functioning confidential computing workloads.”

This week, AMD has additionally acquired a report from Li-Chung Chiang at NTU (Nationwide Taiwan College) detailing cache-based side-channel assaults towards Safe Encrypted Virtualization (SEV) that affect information heart (1st Gen to 4th Gen AMD EPYC) and embedded (AMD EPYC 3000/7002/7003/9004) processors.

AMD suggested builders to comply with greatest practices for prime and probe assaults (e.g., constant-time algorithms), keep away from secret-dependent information each time attainable, and comply with the steering concerning Spectre-type assaults.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular