Gulf News

AMD confirms chip vulnerabil­ity

Thirteen potential exploits to be fixed within weeks through software updates

-

Advanced Micro Devices Inc, Intel Corp’s main rival in computer microproce­ssors, said a report earlier this month alleging that its chips have widespread, fundamenta­l vulnerabil­ities greatly exaggerate­d the severity of the threat.

There are 13 potential exploits that will be fixed within weeks through software updates, the chipmaker said Tuesday in a statement. There’s no evidence that of any of those holes has been used for malevolent purposes, and it would be extremely difficult to use any of them to attack computers, the Sunnyvale, California-based company said.

AMD saw reports of unusual trading activity in its stock about a week ago when CTS Labs went public with a report on the flaws and has reported it to the relevant authoritie­s. The chip industry was stung at the beginning of the year when Alphabet Inc’s Google revealed that a flaw in all modern microproce­ssors may allow hackers to steal data such as passwords or encryption keys previously thought to be secure. AMD argued at the time that its chips were less at risk than those from Intel, which dominates the market for computer microproce­ssors.

“It’s important to note that all the issues raised in the research require administra­tive access to the system, a type of access that effectivel­y grants the user unrestrict­ed access to the system,” AMD Chief Technology Officer Mark Papermaste­r said in the statement, referring to the recent report. “Any attacker gaining unauthoris­ed administra­tive access would have a wide range of attacks at their disposal.”

The issue isn’t related to the vulnerabil­ities Google identified in January and isn’t caused by AMD’s Zen architectu­re, a new design that underpins all of its new chips, AMD said in its statement. The chipmaker said that, unlike the more widespread Spectre and Meltdown issues identified in January, software fixes for the currently discovered vulnerabil­ities won’t slow down computers.

On March 12, CTS Labs contacted AMD about the potential exploits. Then the firm went public 24 hours later with its report, according to AMD.

“The vulnerabil­ities we have discovered allow bad actors who infiltrate­d the network to persist in it, surviving computer reboots and re-installati­ons of the operating system, while remaining virtually undetectab­le by most endpoint security solutions,” CTS said in the report. “This allows attackers to engage in persistent virtually undetectab­le espionage, buried deep in the system and executed from AMD’s Secure Processor and chipset.”

CTS estimated that it would take “many months” to address the issue. The researcher didn’t give AMD that amount of time to fix the holes before drawing public attention to them, something that goes against standard practice in these situations.

“I fault CTS Labs for not following industry-standard coordinate­d disclosure procedure,” said Ben Gras, a researcher at Vrije University in Amsterdam who focuses on hardware security flaws. “A widely accepted practice in these situations is to coordinate with the vendor and affected parties during a window of confidenti­ality before publicisin­g security sensitive informatio­n, reducing the impact of the research while still maintainin­g transparen­cy. As it stands, this leads me to believe they are not acting in good faith, and make me interpret other aspects of this report scepticall­y.”

On Wednesday, CTS said it disagreed with AMD’s assessment of the risks posed by the weaknesses and the time frame for patching them. “Our view is that AMD is attempting to downplay the significan­ce of its vulnerabil­ities,” CTS said in a statement.

Newspapers in English

Newspapers from United Arab Emirates