ltechnologygroup.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.
AMD has fixed, but not yet released BIOS/UEFI/firmware updates for the general public for a security flaw affecting the AMD Secure Processor.
This component, formerly known as AMD PSP (Platform Security Processor), is a chip-on-chip security system, similar to Intel’s much-hated Management Engine (ME).
Just like Intel ME, the AMD Secure Processor is an integrated coprocessor that sits next to the real AMD64 x86 CPU cores and runs a separate operating system tasked with handling various security-related operations.
RCE found in AMD PSP TPM module
Cfir Cohen, a security researcher with the Google Cloud Security Team, says he discovered a vulnerability in the Trusted Platform Module (TPM) of the AMD Secure Processor.
The TPM is a component to store critical system data such as passwords, certificates, and encryption keys, in a secure environment and outside of the more easily accessible AMD cores.
“Through manual static analysis, we’ve found a stack-based overflow in the function EkCheckCurrentCert,” Cohen says. The researcher claims that an attacker could use specially-crafted EK certificates to get remote code execution rights on the AMD Secure Processor, allowing him to compromise its security.
Cohen said that some basic mitigation techniques such as “stack cookies, NX stack, ASLR” were not implemented in AMD’s Secure Processor, making exploitation trivial.
Intel ME uses a similar TPM module, but Cohen did not say if it was affected.
Vulnerability reported to AMD
The Google researcher reported the flaw to AMD in September, and AMD told the researcher in December that they’ve developed a patch and were preparing to roll it out.
Coincidentally, on Reddit [1, 2], some users reported seeing a new option to disable AMD PSP support, but it’s unclear if this new option is related to the patches AMD was preparing to roll out for Cohen’s findings.
Bleeping Computer has reached out to AMD for more information on these patches, if they’re already out, when were they rolled out, and what they consist of.
The option to disable PSP is somewhat unique in the CPU world. For example, Intel has never allowed users to disable its Management Engine secret coprocessor, despite a long list of security flaws that have been reported in the component.
It was only by accident that someone found a way to disable Intel ME, albeit it’s still considered experimental and might damage some systems.
Cohen’s disclosure of the AMD Secure Processor flaw came on the same day fellow Google researchers disclosed details about the Meltdown and Spectre flaws affecting most of the world’s CPUs. AMD has confirmed to be affected only by the Spectre flaw.
Last November, Intel also shipped out updates for several similar Intel ME flaws that allowed attackers to install rootkits and retrieve data from the secure parts of Intel processors.
At L Technology Group, we know technology alone will not protect us from the risks associated with in cyberspace. Hackers, Nation States like Russia and China along with “Bob” in HR opening that email, are all real threats to your organization. Defending against these threats requires a new strategy that incorporates not only technology, but also intelligent personnel who, eats and breaths cybersecurity. Together with proven processes and techniques combines for an advanced next-generation security solution. Since 2008 L Technology Group has develop people, processes and technology to combat the ever changing threat landscape that businesses face day to day.
Call Toll Free (855) 999-6425 for a FREE Consultation from L Technology Group, https://www.ltechnologygroup.com.