• Competitor rules

    Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.

Dubious Research Discovers Ryzen vulnerabilites

Turn your computer off and unplug from internet just to be safe.

They will use nano-robots with AI(moar buzzwords) to switch on the computer remotely and hack your collection of Cat pictures via the power lines.

On a more serious note,considering what people like the NSA,etc are up to,it wouldn't surprise me one bit what exotic tech they might have hidden away.
 
I can't even believe this is being debated as anything other than an obvious scam.

FFS.... you're not going to let me plug a USB into your computer and flash the BIOS? no.... so how is this anything other than complete nonsense?
I think he has you on ignore :D

really AMD should release some more proper leaks for ryzen 2, for people to talk about something else :rolleyes:
 
I think he has you on ignore :D

really AMD should release some more proper leaks for ryzen 2, for people to talk about something else :rolleyes:

Real Ryzen leaks that is, meh... not long now anyway. :)

Actually if anything this has drawn more attention to Ryzen, it keeps them in the news and its obvious to anyone but a very few observing this that the whole thing is a fake scam to drive down AMD's stock share price.

Which BTW has not worked.
 
I'm honored ^^^ muhahaha :D

PS: i think if you have than many on ignore then maybe its not them who are the problem?

i'm speaking to myself :O
 
I have multiple people in this thread on ignore :( there are more ignored posts than displayed ones LOL. (EDIT: Well 44 out of 142 posts so not quite accurate).

Almost feel privileged not to be on ignore with those stats - Given we have had some interesting debate in GPU section over the years I must be doing something right :)
 
Almost feel privileged not to be on ignore with those stats - Given we have had some interesting debate in GPU section over the years I must be doing something right :)

You argue the point - don't just take a random keyword, as some do, from my posts and build a whole argument about something I never actually said or implied.
 
You argue the point - don't just take a random keyword, as some do, from my posts and build a whole argument about something I never actually said or implied.

Good to know :D - I have been watching today for any updates but there appears to be a distinct lack of anything new being reported. I really want to be looking at that technical document to see if there is something we are missing.
 
Good to know :D - I have been watching today for any updates but there appears to be a distinct lack of anything new being reported. I really want to be looking at that technical document to see if there is something we are missing.

Check the AMD Reddit megathread on it and the thread on AT forums,if anything is going to pop up,its those two places you should look. In fact it was there where most of the information about the whole scenario was researched.

Edit!!

Here is the Reddit thread:

https://www.reddit.com/r/Amd/comments/845w8e/alleged_amd_zen_security_flaws_megathread/

The mods have merged all info into the OP,so any new updates are being added at the bottom,including any stuff from AMD and CTS-Labs themselves.
 
Good to know :D - I have been watching today for any updates but there appears to be a distinct lack of anything new being reported. I really want to be looking at that technical document to see if there is something we are missing.

I'm sure AMD would like to see those technical documents too but they ain't going to get them.

Their response to this when it arrives should make for interesting reading, i'm sure they are in communication with these people giving them more than enough opportunity to actually explain themselves in a way that is satisfactory.
 
AMD really needs to work on their PR with stuff like this - being straight up with the position they are in with respect to it with regular updates would massively mitigate any fallout.
 
Check the AMD Reddit megathread on it and the thread on AT forums,if anything is going to pop up,its those two places you should look. In fact it was there where most of the information about the whole scenario was researched.

Edit!!

Here is the Reddit thread:

https://www.reddit.com/r/Amd/comments/845w8e/alleged_amd_zen_security_flaws_megathread/

The mods have merged all info into the OP,so any new updates are being added at the bottom,including any stuff from AMD and CTS-Labs themselves.

This is the thread I have been watching, seems to me that if anything more comes out it will be there pretty quickly.

I'm sure AMD would like to see those technical documents too but they ain't going to get them.

You would hope that they already have them, how can they test if they don't know what they are testing? Apparently there are working code examples floating about as well which suggests that there could be something in it.

AMD really needs to work on their PR with stuff like this - being straight up with the position they are in with respect to it with regular updates would massively mitigate any fallout.

I know right, search AMD ryzen vulnerability in google and you could be mistaken into thinking that this is totally confirmed.
 
This is the thread I have been watching, seems to me that if anything more comes out it will be there pretty quickly.

Many websites are quite aware of the weirdness about all this,as their forums and comments sections have people pointing this all out,yet tech sites most have not bothered updating their articles,yet places like CNBC have.
 
You would hope that they already have them, how can they test if they don't know what they are testing? Apparently there are working code examples floating about as well which suggests that there could be something in it.

Right, but given the intent behind this there is no reason for technical documentation to exist, if this was a genuine attempt to bring AMD's attention to security flaws in their CPU's then yes but the actual intention here is as its emerging that they are simply trying to damage AMD's integrity and reputation of competence.

The security flaws are simply no more real than me flashing a hacked BIOS onto Roffs Intel based system, if he allows me access to his home let alone his PC then the responsibility is with him, not Intel.
 
Even if physically at the machine your likely attack vector will be booting into some linux distro via a USB stick or similar then attempting to manipulate the local logins. Possible I guess but its starting to get to the point where you might as well come in and physically swap the machine for one that you have already done the work on. While you are here you may as well swap the hard disk from my machine that is fine into a pre staged machine that isn't...

I guess anything is possible but is this not clutching at straws kind of vulnerabilities?

Just need a gigabyte of ram.

 
PS: :)

As for the apparent "working code example floating around" well this is what they say but we already know we cannot trust anything they say, but lets analyze that, Metldown was the ability to access memory stored data remotely without the need to infect the target PC with anything locally, so how does what they are saying compare in context, well let me put it this way; if you physically install a Trojan onto your computer, no matter what CPU is in it you're in trouble, that's nothing new or anything at all to do with the CPU.
 
AMD really needs to work on their PR with stuff like this - being straight up with the position they are in with respect to it with regular updates would massively mitigate any fallout.

What you mean like their official response quite some time ago.

We have just received a report from a company called CTS Labs claiming there are potential security vulnerabilities related to certain of our processors. We are actively investigating and analyzing its findings. This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings. At AMD, security is a top priority and we are continually working to ensure the safety of our users as potential new risks arise. We will update this blog as news develops.

By the time they have a solid reply the clickbait hype will have long since been dead.
 
CTS-Labs response to all of this:

http://www.tomshardware.com/news/cts-labs-amd-ryzenfall-ryzen-epyc,36660.html

CTS Labs Speaks: Why It Blindsided AMD With Ryzenfall And Other Vulnerabilities
by Nathaniel Mott March 14, 2018 at 8:45 AM

Researchers often reveal new vulnerabilities with flashy websites, clever branding, and a concerted effort to make sure the problems are covered by media outlets (like this one). The newly announced flaws in AMD's Ryzen and EPYC processors are no exception to this rule--in fact, their revelation was even more focused on garnering attention from the public than many other disclosures. It was just missing one thing: time for AMD to respond.
90 Days Vs. 1 Day

We spoke with CTS Labs, the Israel-based company that says it discovered flaws in AMD's Ryzen and EPYC processors to ask why it conducted its disclosure in such a dramatically unorthodox--and many would say unfair--manner.

When researchers discover vulnerabilities in products, they typically give companies 90 days to respond before disclosing their findings to the public. Some flaws are deemed so dangerous that companies are given even longer to respond--Google afforded Intel and AMD some 200 days to fix Meltdown and Spectre before revealing them to the world at large, for example, and other disclosures have been coordinated between victim and researcher.

But CTS Labs offered AMD no such courtesy. It told AMD about the vulnerabilities just 24 hours before they were revealed to the public. That's clearly not long enough for AMD to address the issues, or even possibly for it to notice CTS Labs' message, considering how many bug reports the company receives on a daily basis.

CTS Labs told us that it bucked the industry-standard 90-day response time because, after it discussed the vulnerabilities with manufacturers and other security experts, it came to believe that AMD wouldn't be able to fix the problems for "many, many months, or even a year." Instead of waiting a full year to reveal these vulnerabilities, CTS Labs decided to inform the public of its discovery.

That isn't to say that CTS Labs revealed the problems without checking their veracity. The company told us that it consulted with other security experts and manufacturers about the issue, provided them with proofs of concept and tutorials for exploiting the vulnerabilities, and waited for their responses before preparing the flaws for public disclosure. Trail of Bits CEO Dan Guido confirmed that his company backed up the findings, for example.
To What End And For What Purpose?

Yet it's important to note that the circumstances surrounding the vulnerabilities' disclosure, and the fact that this is a new company, have raised questions about CTS Labs' intentions. It feels like a hit job on AMD, aimed at torpedoing its stock price. That may be unfair to CTS Labs, but optics and decorum are important to perception, and perception is reality for many.

Yaron Luk-Zilberman and Ido Li On, the company's CFO and CEO, respectively, told us they founded CTS Labs in January 2017 to investigate the security of hardware products. These vulnerabilities are their first major discovery.

The disclosure process itself also raised questions. Though we were told AMD, Trail of Bits, and others were given proofs of concept and instructions for how to exploit the vulnerabilities, that information was not released to the general public. Luk-Zilberman and Li On said that was because the flaws are "practical" and "fit well in the different scenarios and stages of a cyber attack." In other words, they don't want to enable those attacks by revealing too much. That, of course, creates a catch-22 of credibility, because with the details under wraps, most of us in the media (not to mention the curious public) can't examine and evaluate the findings and allegations for ourselves. And because CTS Labs is a new company with no track record to speak of, we can't simply give them the benefit of the doubt.

None of that stopped CTS Labs from putting together a dedicated website for the vulnerabilities, shooting videos explaining them, or briefing (a few) members of the media before discussing the flaws with AMD. In fact, Luk-Zilberman and Li On told us that they have yet to hear from AMD despite all the attention their disclosure has garnered from enthusiasts and journalists. (We asked AMD if this is true; we'll update if the company responds to that question.)

CTS Labs' CTO, Ilia Luk-Zilberman, has now posted a letter on the AMDflaws site that says much of what he told us. It's a somewhat curious screed in which he expounds on his distaste for the 90-day response window and his views on why it's not helpful. Partly, he said that he thinks alerting everyone at once (that is, consumers, media, and companies) puts public pressure on the companies to fix the vulnerabilities (it certainly does), and that by doing so without disclosing the actual technical details, no one is actually at risk. But that creates obvious problems, such as causing widespread FUD, and it invites backlash upon the security researchers, all of which he alluded to in the letter. The salient passage reads in part:

This model has a huge problem; how can you convince the public you are telling the truth without the technical details. And we have been paying that price of disbelief in the past 24h. The solution we came up with is a third party validation, like the one we did with Dan from trailofbits. In retrospect, we would have done this with 5 third party validators to remove any doubts. A lesson for next time.

Altogether, it seems that AMD customers may be justified in worrying about these vulnerabilities. If CTS Labs' description of them is accurate, they are remotely exploitable flaws that could allow attackers to install persistent malware in the deepest recesses of a system. That puts consumers at risk, and it could also undermine businesses' secure networks simply because they rely on Ryzen or EPYC processors.

But that brings us back to the curious fact that AMD had little time to respond to these allegations. Even if you take CTS Labs' stated reasoning for ignoring the industry standard 90-day windows at face value, it doesn't seem to make much sense. Because CTS Labs won't release more detailed information about the vulnerabilities to the public--a wise choice, technically, if they are indeed actually easy to exploit--we won't have concrete confirmation of their existence until AMD has had a chance to examine the problem. If CTS Labs did provide all the research it has to AMD, that shouldn't take long. We expect to learn more about the issue over the coming days--and to witness its potential aftermath over the coming weeks, months, and years.
 
What you mean like their official response quite some time ago.

No - something detailing a bit more about their position, what if any action end users can take to mitigate or that they can't recommend such at this time and something a bit more regular in the way of updates even if it is just a very general sense and so on.

The first thing most people are going to want to know is "Am I exposed?" and look to an official source for "reliable" information.

At the moment everything is being dominated by hype and hysteria and it isn't doing AMD's position any good at all - silence in these cases never does anything but hurt a company.
 
Back
Top Bottom