Security Flaw in AMD's Secure Chip-On-Chip Processor Disclosed Online

Discussion in 'Tech news' started by silversurfer, Jan 6, 2018.

  1. silversurfer

    silversurfer Malware Tester Silver Member

    AMD has fixed, but not yet released BIOS/UEFI/firmware updates for the general public for a security flaw affecting the AMD Secure Processor.

    This component, formerly known as AMD PSP (Platform Security Processor), is a chip-on-chip security system, similar to Intel's much-hated Management Engine (ME).

    Just like Intel ME, the AMD Secure Processor is an integrated coprocessor that sits next to the real AMD64 x86 CPU cores and runs a separate operating system tasked with handling various security-related operations.

    Cfir Cohen, a security researcher with the Google Cloud Security Team, says he discovered a vulnerability in the Trusted Platform Module (TPM) of the AMD Secure Processor.

    The TPM is a component to store critical system data such as passwords, certificates, and encryption keys, in a secure environment and outside of the more easily accessible AMD cores.

    "Through manual static analysis, we’ve found a stack-based overflow in the function EkCheckCurrentCert," Cohen says. The researcher claims that an attacker could use specially-crafted EK certificates to get remote code execution rights on the AMD Secure Processor, allowing him to compromise its security.

    Source: https://www.bleepingcomputer.com/ne...cure-chip-on-chip-processor-disclosed-online/
     
    daljeet and RGiskardR like this.
  2. Google Adsense

Share This Page