Skip to main content

AMD is working on fixes for the reported Ryzenfall, MasterKey vulnerabilities

AMD is now developing and staging the deployment of fixes for the vulnerabilities recently discovered in the company’s processors. The news arrives by way of Senior Vice President and Chief Technology Officer Mark Papermaster, who also notes that in order to take advantage of the vulnerabilities, an attacker needs administrative access to the affected PC. At that point, they could use any attack vector to infiltrate the device beyond what was discovered in AMD’s processors. 

According to the schedule, AMD will release a firmware patch through a BIOS update for the MasterKey vulnerability on an unspecified date along with an update to the related secure processor in the “coming weeks.” AMD lists the same schedule for the Ryzenfall and Fallout vulnerabilities along with the associated secure processors. As for the Chimera issue, AMD is currently working with the Promontory chipset manufacturer to release mitigating patches through a BIOS update. 

Recommended Videos

“The security issues identified by the third-party researchers are not related to the AMD ‘Zen’ CPU architecture or the Google Project Zero exploits made public Jan. 3, 2018,” Papermaster states. “Instead, these issues are associated with the firmware managing the embedded security control processor in some of our products (AMD Secure Processor) and the chipset used in some socket AM4 and socket TR4 desktop platforms supporting AMD processors.” 

Get your weekly teardown of the tech behind PC gaming
Check your inbox!

Security researchers recently uncovered a stand-alone set of critical processor vulnerabilities just months after another set of researchers disclosed the Meltdown and Spectre flaws to the public. This time Intel owners could breathe easy, as these exploits were unique to AMD’s processors, including its latest Ryzen chips. 

“The Ryzen chipset, a core system component that AMD outsourced to a Taiwanese chip manufacturer, ASMedia, is currently being shipped with exploitable manufacturer backdoors inside,” reads the whitepaper put out by CTS Labs, the company that discovered the vulnerabilities. “CTS has been researching the security of AMD’s latest Zen processors for the past six months, including EPYC, Ryzen, Ryzen Pro and Ryzen Mobile, and has made concerning discoveries.”

CTS Labs released a letter clarifying some of the technical details of the exploits, in response to some criticism that has been leveled at the security firm regarding the plausibility that these exploits could even be put to use by a malicious actor.

“The vulnerabilities described in our site are second-stage vulnerabilities. What this means is that the vulnerabilities are mostly relevant for enterprise networks, organizations and cloud providers,” CTS Labs said in a statement. “The vulnerabilities described in amdflaws.com could give an attacker that has already gained initial foothold into one or more computers in the enterprise a significant advantage against IT and security teams.”

That’s the real danger here. These exploits are unlikely to be used against you personally, but they pose a significant danger to large systems that handle sensitive data which could make appealing targets for enterprising hackers.

Disclosure dust-up

The announcement itself has generated a fair amount of controversy, as security research firm CTS Labs reportedly did not give AMD the industry-standard 90-day notice before announcing the existence of these exploits to the public.

In response, AMD released a general statement which digs at CTS Lab’s unorthodox means of disclosure. “This company was previously unknown to AMD,” the statement reads, “and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings.”

CTS Labs released its own response to the controversy in the form of a letter penned by Chief Technical Officer Ilia Luk-Zilberman. The letter outlines how CTS Labs first discovered the vulnerabilities, as part of an investigation into chip manufacturer ASMedia’s products. The letter suggests AMD inadvertently allowed the exploits to take root in its products by contracting with ASMedia for the design of Ryzen chipset components.

The speed and ease with which CTS Labs discovered these vulnerabilities, Luk-Zilberman alleges, contributed to the company’s decision to go public with the exploits well ahead of the typical 90-day window offered to companies like AMD when a serious vulnerability is discovered.

“I honestly think it’s hard to believe we’re the only group in the world who has these vulnerabilities, considering who are the actors in the world today, and us being a small group of six researchers,” Luk-Zilberman’s letter continues.

The letter goes on to describe CTS Labs’ opposition to the “responsible disclosure” norms within the cybersecurity industry. For example, when Google’s Project Zero uncovered the Meltdown and Spectre vulnerabilities, Google offered AMD and Intel a 200-day head start to get working on a patch. CTS Labs claims this relationship is bad for customers.

“I think that the current structure of ‘Responsible Disclosure’ has a very serious problem,” Luk-Zilberman said. “The main problem in my eyes with this model is that during these 30/45/90 days, it’s up to the vendor if it wants to alert the customers that there is a problem. And as far as I’ve seen, it is extremely rare that the vendor will come out ahead of time notifying the customers.”

Ryzenfall, Fallout, MasterKey, and Chimera

Before we get into what these vulnerabilities are and how they work, let’s be clear about one thing: There are no patches for these vulnerabilities as of this writing. If you’re compromised, there is not much you can do about it at the moment. If you’re running a Ryzen processor, you’ll just have to be very careful for the next few weeks while we wait for a patch.

Ryzenfall exploit chart
Chart illustrating which products are affected by which vulnerabilities, credit CTS Labs. Image used with permission by copyright holder

“Firmware vulnerabilities such as Masterkey, Ryzenfall, and Fallout take several months to fix. Hardware vulnerabilities such as Chimera cannot be fixed and require a workaround,” CTS Labs reports. “Producing a workaround may be difficult and cause undesired side-effects.”

These vulnerabilities fall into four categories, dubbed Ryzenfall, Fallout, Masterkey, and Chimera. All four lead directly into the secure portion of AMD processors, where sensitive data like passwords and encryption keys are stored, but they achieve their goals in different ways.

“Attackers could use Ryzenfall to bypass Windows Credential Guard, steal network credentials, and then potentially spread through even highly secure Windows corporate network,” CTS Lab reports. “Attackers could use Ryzenfall in conjunction with Masterkey to install persistent malware on the Secure Processor, exposing customers to the risk of covert and long-term industrial espionage.”

The real danger of these vulnerabilities is their pervasive nature. Once someone has wormed their way into the secure processor via Ryzenfall or Masterkey, they are there for good. They can set up camp and spread throughout the network virtually undetected. This is a scary prospect for individuals, but for AMD’s enterprise customers, like Microsoft, it could mean the exposure of very sensitive data to malicious actors on a large scale.

Updated on March 20: Added AMD’s firmware release schedule.

Jayce Wagner
Former Digital Trends Contributor
A staff writer for the Computing section, Jayce covers a little bit of everything -- hardware, gaming, and occasionally VR.
Everyone hates this AMD CPU, but I still use it in my PC
A small form factor build inside the Fractal Terra.

Gamers Nexus called it a "wasted opportunity." Hardware Unboxed declared it a "flop." Even in our own Ryzen 7 9700X review, I said the CPU doesn't have "enough meat on the bone to justify an upgrade." So, why does the Ryzen 7 9700X top the list of the best processors? And more importantly, why am I using one in my personal PC?

I'll do my best to answer these forced questions. The disappointment in the Ryzen 7 9700X isn't truly universal -- no opinions about PC hardware are -- but there's no doubt that it's the outcast in AMD's lineup of Ryzen 9000 CPUs. It's not great for gaming in the face of the Ryzen 7 9800X3D, and you can save $50 to $70 with the Ryzen 7 7700X while getting largely similar productivity performance. But AMD's trusty little Zen 5 octa-core is still at the heart of my high-end gaming PC, and I wouldn't have it any other way.
A flexible little devil

Read more
AMD Ryzen 5 9600X is now almost $50 cheaper than it was two months ago
The AMD Ryzen 5 9600X between two finger tips.

AMD's Zen 5 processors are still fresh out of the oven -- they were only released a little over two months ago. As they struggle to find their footing among some of the best processors, they've been getting discounted regularly ever since, and that certainly helps. Today's deals bring the Ryzen 5 9600X down by nearly $50 when compared to its recommended list price.

The Ryzen 5 9600X is the most budget-friendly chip in the new lineup. It started out with a recommended price (MSRP) of $280, which is $10 less than its predecessor.  That adjustment was nice to see, but the 9600X was still much pricier than the 7600X upon launch, as the Zen 4 chip received numerous price cuts since it first hit the shelves. Right now, it's priced at $225, but I've seen it sell for much less.

Read more
AMD confirms 9000X3D release date — but questions remain
The Ryzen 7 7800X3D installed in a motherboard.

AMD just made a surprise announcement regarding its upcoming processors, but it leaves us with two major questions: What's coming, and how much will it cost? The release date was announced to be November 7, but we're unsure which chips are coming on that date. While details are very scarce, the first listings of the CPU emerged, giving us an idea of the kind of pricing we could expect. We're also seeing more and more benchmarks of the Ryzen 7 9800X3D.

We knew this was coming, but AMD still surprised us. Various reports claimed that AMD would unveil the Ryzen 7 9800X3D on October 25, meaning one day after Intel launches Core Ultra 200-S processors. However, AMD broke the news today (as spotted by Tom's Hardware), but the announcement is more vague than ever. It's unclear which CPUs are coming in particular, as AMD hasn't specified which X3D model will hit the shelves on November 7. The company may still say more on the matter on October 25.

Read more