Skip to main content

AMD is working on fixes for the reported Ryzenfall, MasterKey vulnerabilities

AMD is now developing and staging the deployment of fixes for the vulnerabilities recently discovered in the company’s processors. The news arrives by way of Senior Vice President and Chief Technology Officer Mark Papermaster, who also notes that in order to take advantage of the vulnerabilities, an attacker needs administrative access to the affected PC. At that point, they could use any attack vector to infiltrate the device beyond what was discovered in AMD’s processors. 

According to the schedule, AMD will release a firmware patch through a BIOS update for the MasterKey vulnerability on an unspecified date along with an update to the related secure processor in the “coming weeks.” AMD lists the same schedule for the Ryzenfall and Fallout vulnerabilities along with the associated secure processors. As for the Chimera issue, AMD is currently working with the Promontory chipset manufacturer to release mitigating patches through a BIOS update. 

Recommended Videos

“The security issues identified by the third-party researchers are not related to the AMD ‘Zen’ CPU architecture or the Google Project Zero exploits made public Jan. 3, 2018,” Papermaster states. “Instead, these issues are associated with the firmware managing the embedded security control processor in some of our products (AMD Secure Processor) and the chipset used in some socket AM4 and socket TR4 desktop platforms supporting AMD processors.” 

Get your weekly teardown of the tech behind PC gaming
Check your inbox!

Security researchers recently uncovered a stand-alone set of critical processor vulnerabilities just months after another set of researchers disclosed the Meltdown and Spectre flaws to the public. This time Intel owners could breathe easy, as these exploits were unique to AMD’s processors, including its latest Ryzen chips. 

“The Ryzen chipset, a core system component that AMD outsourced to a Taiwanese chip manufacturer, ASMedia, is currently being shipped with exploitable manufacturer backdoors inside,” reads the whitepaper put out by CTS Labs, the company that discovered the vulnerabilities. “CTS has been researching the security of AMD’s latest Zen processors for the past six months, including EPYC, Ryzen, Ryzen Pro and Ryzen Mobile, and has made concerning discoveries.”

CTS Labs released a letter clarifying some of the technical details of the exploits, in response to some criticism that has been leveled at the security firm regarding the plausibility that these exploits could even be put to use by a malicious actor.

“The vulnerabilities described in our site are second-stage vulnerabilities. What this means is that the vulnerabilities are mostly relevant for enterprise networks, organizations and cloud providers,” CTS Labs said in a statement. “The vulnerabilities described in amdflaws.com could give an attacker that has already gained initial foothold into one or more computers in the enterprise a significant advantage against IT and security teams.”

That’s the real danger here. These exploits are unlikely to be used against you personally, but they pose a significant danger to large systems that handle sensitive data which could make appealing targets for enterprising hackers.

Disclosure dust-up

The announcement itself has generated a fair amount of controversy, as security research firm CTS Labs reportedly did not give AMD the industry-standard 90-day notice before announcing the existence of these exploits to the public.

In response, AMD released a general statement which digs at CTS Lab’s unorthodox means of disclosure. “This company was previously unknown to AMD,” the statement reads, “and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings.”

CTS Labs released its own response to the controversy in the form of a letter penned by Chief Technical Officer Ilia Luk-Zilberman. The letter outlines how CTS Labs first discovered the vulnerabilities, as part of an investigation into chip manufacturer ASMedia’s products. The letter suggests AMD inadvertently allowed the exploits to take root in its products by contracting with ASMedia for the design of Ryzen chipset components.

The speed and ease with which CTS Labs discovered these vulnerabilities, Luk-Zilberman alleges, contributed to the company’s decision to go public with the exploits well ahead of the typical 90-day window offered to companies like AMD when a serious vulnerability is discovered.

“I honestly think it’s hard to believe we’re the only group in the world who has these vulnerabilities, considering who are the actors in the world today, and us being a small group of six researchers,” Luk-Zilberman’s letter continues.

The letter goes on to describe CTS Labs’ opposition to the “responsible disclosure” norms within the cybersecurity industry. For example, when Google’s Project Zero uncovered the Meltdown and Spectre vulnerabilities, Google offered AMD and Intel a 200-day head start to get working on a patch. CTS Labs claims this relationship is bad for customers.

“I think that the current structure of ‘Responsible Disclosure’ has a very serious problem,” Luk-Zilberman said. “The main problem in my eyes with this model is that during these 30/45/90 days, it’s up to the vendor if it wants to alert the customers that there is a problem. And as far as I’ve seen, it is extremely rare that the vendor will come out ahead of time notifying the customers.”

Ryzenfall, Fallout, MasterKey, and Chimera

Before we get into what these vulnerabilities are and how they work, let’s be clear about one thing: There are no patches for these vulnerabilities as of this writing. If you’re compromised, there is not much you can do about it at the moment. If you’re running a Ryzen processor, you’ll just have to be very careful for the next few weeks while we wait for a patch.

Ryzenfall exploit chart
Chart illustrating which products are affected by which vulnerabilities, credit CTS Labs. Image used with permission by copyright holder

“Firmware vulnerabilities such as Masterkey, Ryzenfall, and Fallout take several months to fix. Hardware vulnerabilities such as Chimera cannot be fixed and require a workaround,” CTS Labs reports. “Producing a workaround may be difficult and cause undesired side-effects.”

These vulnerabilities fall into four categories, dubbed Ryzenfall, Fallout, Masterkey, and Chimera. All four lead directly into the secure portion of AMD processors, where sensitive data like passwords and encryption keys are stored, but they achieve their goals in different ways.

“Attackers could use Ryzenfall to bypass Windows Credential Guard, steal network credentials, and then potentially spread through even highly secure Windows corporate network,” CTS Lab reports. “Attackers could use Ryzenfall in conjunction with Masterkey to install persistent malware on the Secure Processor, exposing customers to the risk of covert and long-term industrial espionage.”

The real danger of these vulnerabilities is their pervasive nature. Once someone has wormed their way into the secure processor via Ryzenfall or Masterkey, they are there for good. They can set up camp and spread throughout the network virtually undetected. This is a scary prospect for individuals, but for AMD’s enterprise customers, like Microsoft, it could mean the exposure of very sensitive data to malicious actors on a large scale.

Updated on March 20: Added AMD’s firmware release schedule.

Jayce Wagner
Former Digital Trends Contributor
A staff writer for the Computing section, Jayce covers a little bit of everything -- hardware, gaming, and occasionally VR.
AMD’s Ryzen 7 9800X3D might show up sooner than expected
AMD CEO holding 3D V-Cache CPU.

AMD might be moving on 3D V-Cache versions of its Ryzen 9000 CPUs faster than expected. According to a leaker on the Chiphell forums, the Ryzen 7 9800X3D, which could be among the best processors when it releases, might arrive as soon as next month.

VideoCardz dug up the news, which started on the Chiphell forums. The leaker goes by the name zhangzhonhao, but VideoCardz notes that they went under a different alias previously, and that they have a long history of leaking company road maps. The forum post claims AMD will release the Ryzen 7 9800X3D at the end of October, while the Ryzen 9 9900X3D and Ryzen 9 9950X3D will arrive later. The leaker suspects they'll show up in early 2025 with "some new features."

Read more
AMD’s Ryzen 9000 series faces disastrous sales post-launch
The Ryzen 9 9950X between someone's fingertips.

AMD’s Ryzen 9000 series is facing a challenging reception in the desktop CPU market. Just over a month since its release, new reports indicate that the Ryzen 9000 series has experienced low sales, making it one of AMD's most disappointing launches since the ill-fated Bulldozer architecture in 2011.

This downturn has significant implications for AMD's fight against Intel, especially given the momentum it gained with its previous Ryzen generations.
Retail struggles and global impact
Retailers across various regions are reporting poor sales numbers for the Ryzen 9000 series. For instance, TechSpot reports that Australian retailers have described this as the worst Ryzen launch since AMD first introduced the brand. Sales were so low that some stores reported single-digit figures for units sold within the first few weeks.

Read more
AMD may have transformed this thin and light laptop into a gaming powerhouse
The Asus Zenbook S 16 sitting on a coffee table.

AMD has a new driver for its latest Ryzen AI 300 processors, and it introduces a feature that could provide a massive performance boost in games. It's called Variable Graphics Memory, or VGM, and it allows the integrated graphics to convert up to 75% of the memory in a system to dedicated graphics memory. This, according to AMD, can not only boost performance in games, but also make some otherwise unplayable titles boot.

The new Ryzen AI 300 processors are mostly found in thin and light laptops, including devices like the Zenbook S 16 that aren't targeted at gamers. In addition to VGM in the new driver, AMD also turned on its Fluid Motion Frames 2 (AFMF 2) feature for Ryzen AI 300 processors. With both features working in tandem, you can see the performance boost on the Zenbook S 16 below.

Read more