Skip to main content

AMD is working on fixes for the reported Ryzenfall, MasterKey vulnerabilities

AMD is now developing and staging the deployment of fixes for the vulnerabilities recently discovered in the company’s processors. The news arrives by way of Senior Vice President and Chief Technology Officer Mark Papermaster, who also notes that in order to take advantage of the vulnerabilities, an attacker needs administrative access to the affected PC. At that point, they could use any attack vector to infiltrate the device beyond what was discovered in AMD’s processors. 

According to the schedule, AMD will release a firmware patch through a BIOS update for the MasterKey vulnerability on an unspecified date along with an update to the related secure processor in the “coming weeks.” AMD lists the same schedule for the Ryzenfall and Fallout vulnerabilities along with the associated secure processors. As for the Chimera issue, AMD is currently working with the Promontory chipset manufacturer to release mitigating patches through a BIOS update. 

“The security issues identified by the third-party researchers are not related to the AMD ‘Zen’ CPU architecture or the Google Project Zero exploits made public Jan. 3, 2018,” Papermaster states. “Instead, these issues are associated with the firmware managing the embedded security control processor in some of our products (AMD Secure Processor) and the chipset used in some socket AM4 and socket TR4 desktop platforms supporting AMD processors.” 

Get your weekly teardown of the tech behind PC gaming
Check your inbox!

Security researchers recently uncovered a stand-alone set of critical processor vulnerabilities just months after another set of researchers disclosed the Meltdown and Spectre flaws to the public. This time Intel owners could breathe easy, as these exploits were unique to AMD’s processors, including its latest Ryzen chips. 

“The Ryzen chipset, a core system component that AMD outsourced to a Taiwanese chip manufacturer, ASMedia, is currently being shipped with exploitable manufacturer backdoors inside,” reads the whitepaper put out by CTS Labs, the company that discovered the vulnerabilities. “CTS has been researching the security of AMD’s latest Zen processors for the past six months, including EPYC, Ryzen, Ryzen Pro and Ryzen Mobile, and has made concerning discoveries.”

CTS Labs released a letter clarifying some of the technical details of the exploits, in response to some criticism that has been leveled at the security firm regarding the plausibility that these exploits could even be put to use by a malicious actor.

“The vulnerabilities described in our site are second-stage vulnerabilities. What this means is that the vulnerabilities are mostly relevant for enterprise networks, organizations and cloud providers,” CTS Labs said in a statement. “The vulnerabilities described in amdflaws.com could give an attacker that has already gained initial foothold into one or more computers in the enterprise a significant advantage against IT and security teams.”

That’s the real danger here. These exploits are unlikely to be used against you personally, but they pose a significant danger to large systems that handle sensitive data which could make appealing targets for enterprising hackers.

Disclosure dust-up

The announcement itself has generated a fair amount of controversy, as security research firm CTS Labs reportedly did not give AMD the industry-standard 90-day notice before announcing the existence of these exploits to the public.

In response, AMD released a general statement which digs at CTS Lab’s unorthodox means of disclosure. “This company was previously unknown to AMD,” the statement reads, “and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings.”

CTS Labs released its own response to the controversy in the form of a letter penned by Chief Technical Officer Ilia Luk-Zilberman. The letter outlines how CTS Labs first discovered the vulnerabilities, as part of an investigation into chip manufacturer ASMedia’s products. The letter suggests AMD inadvertently allowed the exploits to take root in its products by contracting with ASMedia for the design of Ryzen chipset components.

The speed and ease with which CTS Labs discovered these vulnerabilities, Luk-Zilberman alleges, contributed to the company’s decision to go public with the exploits well ahead of the typical 90-day window offered to companies like AMD when a serious vulnerability is discovered.

“I honestly think it’s hard to believe we’re the only group in the world who has these vulnerabilities, considering who are the actors in the world today, and us being a small group of six researchers,” Luk-Zilberman’s letter continues.

The letter goes on to describe CTS Labs’ opposition to the “responsible disclosure” norms within the cybersecurity industry. For example, when Google’s Project Zero uncovered the Meltdown and Spectre vulnerabilities, Google offered AMD and Intel a 200-day head start to get working on a patch. CTS Labs claims this relationship is bad for customers.

“I think that the current structure of ‘Responsible Disclosure’ has a very serious problem,” Luk-Zilberman said. “The main problem in my eyes with this model is that during these 30/45/90 days, it’s up to the vendor if it wants to alert the customers that there is a problem. And as far as I’ve seen, it is extremely rare that the vendor will come out ahead of time notifying the customers.”

Ryzenfall, Fallout, MasterKey, and Chimera

Before we get into what these vulnerabilities are and how they work, let’s be clear about one thing: There are no patches for these vulnerabilities as of this writing. If you’re compromised, there is not much you can do about it at the moment. If you’re running a Ryzen processor, you’ll just have to be very careful for the next few weeks while we wait for a patch.

Ryzenfall exploit chart
Chart illustrating which products are affected by which vulnerabilities, credit CTS Labs. Image used with permission by copyright holder

“Firmware vulnerabilities such as Masterkey, Ryzenfall, and Fallout take several months to fix. Hardware vulnerabilities such as Chimera cannot be fixed and require a workaround,” CTS Labs reports. “Producing a workaround may be difficult and cause undesired side-effects.”

These vulnerabilities fall into four categories, dubbed Ryzenfall, Fallout, Masterkey, and Chimera. All four lead directly into the secure portion of AMD processors, where sensitive data like passwords and encryption keys are stored, but they achieve their goals in different ways.

“Attackers could use Ryzenfall to bypass Windows Credential Guard, steal network credentials, and then potentially spread through even highly secure Windows corporate network,” CTS Lab reports. “Attackers could use Ryzenfall in conjunction with Masterkey to install persistent malware on the Secure Processor, exposing customers to the risk of covert and long-term industrial espionage.”

The real danger of these vulnerabilities is their pervasive nature. Once someone has wormed their way into the secure processor via Ryzenfall or Masterkey, they are there for good. They can set up camp and spread throughout the network virtually undetected. This is a scary prospect for individuals, but for AMD’s enterprise customers, like Microsoft, it could mean the exposure of very sensitive data to malicious actors on a large scale.

Updated on March 20: Added AMD’s firmware release schedule.

Jayce Wagner
Former Digital Trends Contributor
A staff writer for the Computing section, Jayce covers a little bit of everything -- hardware, gaming, and occasionally VR.
New reports indicate AMD’s Ryzen 5000 processors may be failing at a high rate
amd ryzen 5 2400g 3 2200g processors hands on review imageamd and

If you've been among the few fortunate enough to get your hands on AMD's newly launched Ryzen 5000 series processors, you may think that the headache is over. We're learning that may not be the case, as there are reports that Team Red's new CPUs have a high failure rate.

Gamers who have upgraded to this family of processors will want to hang on to their receipts and packaging in the event of a Ryzen meltdown, as dealing with a return could be easier than having to navigate the manufacturer's warranty process for an exchange.

Read more
All AMD processors since 2011 have had a security vulnerability
Fingers holding an AMD Ryzen 9 3900X.

Coming on the heels of recent news that there is an unfixable vulnerability in Intel processors from the last five years, security researchers have identified a vulnerability in AMD processors from the last nine years as well.

A paper by researchers from the Graz University of Technology, first reported on by Tom's Hardware, describes two attacks, Collide+Probe and Load+Reload, which are a subset of the "Take A Way" vulnerability and are based on a Spectre attack. The vulnerability is found in all AMD processes released between 2011 and 2019, including the Zen microarchitecture.

Read more