{"id":252894,"date":"2024-08-09T16:35:39","date_gmt":"2024-08-09T16:35:39","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/08\/09\/researchers-discover-potentially-catastrophic-exploit-present-in-amd-chips-for-decades\/"},"modified":"2025-06-25T17:12:39","modified_gmt":"2025-06-25T17:12:39","slug":"researchers-discover-potentially-catastrophic-exploit-present-in-amd-chips-for-decades","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/08\/09\/researchers-discover-potentially-catastrophic-exploit-present-in-amd-chips-for-decades\/","title":{"rendered":"Researchers discover potentially catastrophic exploit present in AMD chips for decades"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p>Security researchers have found a vulnerability in AMD processors that has persisted for decades, <a data-i13n=\"cpos:1;pos:1\" href=\"https:\/\/www.wired.com\/story\/amd-chip-sinkclose-flaw\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:according to reporting by Wired;cpos:1;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \"><em><\/em><\/a>. This is a fascinating security flaw because it was found in the firmware of the actual chips and potentially allows malware to deeply infect a computer\u2019s memory.<\/p>\n<p>The flaw was discovered by <a data-i13n=\"cpos:2;pos:1\" href=\"https:\/\/ioactive.com\/event\/def-con-talk-amd-sinkclose-universal-ring-2-privilege-escalation\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:researchers from the security firm IOActive;cpos:2;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \"><\/a>, who are calling the AMD-based vulnerability a \u201cSinkclose&#8221; flaw. This potentially allows hackers to run their own code in the most privileged mode of an AMD processor, System Management Mode. This is typically a protected portion of the firmware. The researchers have also noted that the flaw dates back to at least 2006 and that it impacts nearly every AMD chip.<\/p>\n<div class=\"twitter-tweet-wrapper\" data-embed-anchor=\"e32ad5a2-115e-5267-88fe-f25baeffb710\">\n<blockquote placeholder=\"\" data-theme=\"light\" class=\"twitter-tweet\">\n<p>&#8220;Researchers warn that a bug in AMD\u2019s chips would allow attackers to root into some of the most privileged portions of a computer&#8230;&#8221; New piece from <a href=\"https:\/\/twitter.com\/WIRED?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:@WIRED;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">@WIRED<\/a> featuring research from IOActive Principal Security Consultants, Enrique Nissim &amp; Krzysztof Okupski. <a href=\"https:\/\/t.co\/UuvzC2qyGI\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:https:\/\/t.co\/UuvzC2qyGI;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">https:\/\/t.co\/UuvzC2qyGI<\/a><\/p>\n<p>\u2014 IOActive, Inc (@IOActive) <a href=\"https:\/\/twitter.com\/IOActive\/status\/1821906484135129102?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:August 9, 2024;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">August 9, 2024<\/a><\/p>\n<\/blockquote>\n<\/div>\n<p>That\u2019s the bad news. Now onto some better news. Despite being potentially catastrophic, this issue is unlikely to impact regular people. That\u2019s because in order to make full use of the flaw, hackers would already need deep access to an AMD-based PC or server. That\u2019s a lot of work for a random home PC, phew, but could spell trouble for corporations or other large entities.<\/p>\n<p>This is particularly worrisome for <a data-i13n=\"cpos:3;pos:1\" href=\"https:\/\/www.engadget.com\/the-uks-ministry-of-defence-was-hacked-and-the-country-is-reportedly-blaming-china-121954779.html\" data-ylk=\"slk:governments and the like;cpos:3;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \"><\/a>. In theory, malicious code could burrow itself so deep within the firmware that it would be almost impossible to find. As a matter of fact, the researchers say that the code would likely survive a complete reinstallation of the operating system. The best option for infected computers would be a one-way ticket to the trash heap.<\/p>\n<p>\u201cImagine nation-state hackers or whoever wants to persist on your system. Even if you wipe your drive clean, it&#8217;s still going to be there,\u201d says Krzysztof Okupski from IOActive. \u201cIt&#8217;s going to be nearly undetectable and nearly unpatchable.\u201d<\/p>\n<p>Once successfully implemented, hackers would have full access to both surveil activity and tamper with the infected machine. AMD has acknowledged the issue and says that it has \u201creleased mitigation options\u201d for data center products and Ryzen PC products \u201cwith mitigations for AMD embedded products coming soon.\u201d The company has also published a <a data-i13n=\"cpos:4;pos:1\" href=\"https:\/\/www.amd.com\/en\/resources\/product-security\/bulletin\/amd-sb-7014.html\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:full list of impacted chips;cpos:4;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \"><\/a>.<\/p>\n<p>AMD has also emphasized just how difficult it would be to take advantage of this exploit. It compares using the Sinkclose flaw to accessing a bank\u2019s safe-deposit boxes after already bypassing alarms, guards, vault doors and other security measures. IOActive, however, says that kernel exploits \u2014 the equivalent of plans to get to those metaphorical safe-deposit boxes \u2014 exist readily in the wild. \u201cPeople have kernel exploits right now for all these systems,\u201d the organization told Wired. \u201cThey exist and they&#8217;re available for attackers.\u201d<\/p>\n<p>IOActive has agreed to not publish any proof-of-concept code as AMD gets to work on patches. The researchers have warned that speed is of the essence, saying \u201cif the foundation is broken, then the security for the whole system is broken.\u201d<\/p>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.engadget.com\/cybersecurity\/researchers-discover-potentially-catastrophic-exploit-present-in-amd-chips-for-decades-161541359.html?src=rss\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Security researchers have found a vulnerability in AMD processors that has persisted for decades, . This is a fascinating security flaw because it was<\/p>\n","protected":false},"author":1,"featured_media":252895,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[159],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/252894"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=252894"}],"version-history":[{"count":0,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/252894\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/252895"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=252894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=252894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=252894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}