<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Intel hardware trust is lost again?</title>
	<atom:link href="http://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 15 Apr 2026 08:46:24 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Nicki</title>
		<link>https://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/comment-page-1/#comment-1780254</link>
		<dc:creator><![CDATA[Nicki]]></dc:creator>
		<pubDate>Thu, 15 Sep 2022 08:43:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185857#comment-1780254</guid>
		<description><![CDATA[it could defeat hardware-based encryption and DRM protections. The flaw exists at the hardware level of modern Intel processors released in the last five years]]></description>
		<content:encoded><![CDATA[<p>it could defeat hardware-based encryption and DRM protections. The flaw exists at the hardware level of modern Intel processors released in the last five years</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/comment-page-1/#comment-1724795</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 Sep 2021 06:35:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185857#comment-1724795</guid>
		<description><![CDATA[AMD Chipset Driver Vulnerability Can Allow Hackers to Obtain Sensitive Data
https://www.securityweek.com/amd-chipset-driver-vulnerability-can-allow-hackers-obtain-sensitive-data

Chipmaker AMD has patched a driver vulnerability that could allow an attacker to obtain sensitive information from the targeted system.

The flaw, tracked as ​​CVE-2021-26333 and classified by AMD as medium severity, affects the company’s Platform Security Processor (PSP) chipset driver, which is used by several graphics cards and processors.

According to AMD, which described it as an information disclosure issue, an attacker who has low privileges on the targeted system can “send requests to the driver resulting in a potential data leak from uninitialized physical pages.”

AMD has advised users to update the PSP driver to version 5.17.0.0 through Windows Update or update the Chipset Driver to version 3.08.17.735.

Kyriakos Economou, co-founder of cybersecurity research and development company ZeroPeril, has been credited for discovering the vulnerability. In a technical advisory detailing the findings, the researcher noted that attacks are possible due to information disclosure and memory leakage bugs.

https://zeroperil.co.uk/wp-content/uploads/2021/09/AMD_PSP_Vulnerability_Report.pdf]]></description>
		<content:encoded><![CDATA[<p>AMD Chipset Driver Vulnerability Can Allow Hackers to Obtain Sensitive Data<br />
<a href="https://www.securityweek.com/amd-chipset-driver-vulnerability-can-allow-hackers-obtain-sensitive-data" rel="nofollow">https://www.securityweek.com/amd-chipset-driver-vulnerability-can-allow-hackers-obtain-sensitive-data</a></p>
<p>Chipmaker AMD has patched a driver vulnerability that could allow an attacker to obtain sensitive information from the targeted system.</p>
<p>The flaw, tracked as ​​CVE-2021-26333 and classified by AMD as medium severity, affects the company’s Platform Security Processor (PSP) chipset driver, which is used by several graphics cards and processors.</p>
<p>According to AMD, which described it as an information disclosure issue, an attacker who has low privileges on the targeted system can “send requests to the driver resulting in a potential data leak from uninitialized physical pages.”</p>
<p>AMD has advised users to update the PSP driver to version 5.17.0.0 through Windows Update or update the Chipset Driver to version 3.08.17.735.</p>
<p>Kyriakos Economou, co-founder of cybersecurity research and development company ZeroPeril, has been credited for discovering the vulnerability. In a technical advisory detailing the findings, the researcher noted that attacks are possible due to information disclosure and memory leakage bugs.</p>
<p><a href="https://zeroperil.co.uk/wp-content/uploads/2021/09/AMD_PSP_Vulnerability_Report.pdf" rel="nofollow">https://zeroperil.co.uk/wp-content/uploads/2021/09/AMD_PSP_Vulnerability_Report.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/comment-page-1/#comment-1704958</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 Mar 2021 08:06:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185857#comment-1704958</guid>
		<description><![CDATA[Spectre exploits in the &quot;wild&quot;
https://dustri.org/b/spectre-exploits-in-the-wild.html
Someone was silly enough to upload a working spectre (CVE-2017-5753)
exploit for Linux (there is also a Windows one with symbols that I
didn&#039;t look at.) on VirusTotal last month, so here is my quick Sunday
afternoon lazy analysis.. In my lab, on a vulnerable Fedora, the
exploit is successfully dumping /etc/shadow in a couple of minutes.
Interestingly, there are checks to detect SMAP and abort if it&#039;s
present. I didn&#039;t manage to understand why the exploit was failing in
its presence.. Also
https://therecord.media/first-fully-weaponized-spectre-exploit-discovered-online/
&quot;But while Voisin did not want to name the exploit author, several
people were not as shy. Security experts on both Twitter and news
aggregation service HackerNews were quick to spot that the new Spectre
exploit might be a module for CANVAS, a penetration testing tool
developed by Immunity Inc.]]></description>
		<content:encoded><![CDATA[<p>Spectre exploits in the &#8220;wild&#8221;<br />
<a href="https://dustri.org/b/spectre-exploits-in-the-wild.html" rel="nofollow">https://dustri.org/b/spectre-exploits-in-the-wild.html</a><br />
Someone was silly enough to upload a working spectre (CVE-2017-5753)<br />
exploit for Linux (there is also a Windows one with symbols that I<br />
didn&#8217;t look at.) on VirusTotal last month, so here is my quick Sunday<br />
afternoon lazy analysis.. In my lab, on a vulnerable Fedora, the<br />
exploit is successfully dumping /etc/shadow in a couple of minutes.<br />
Interestingly, there are checks to detect SMAP and abort if it&#8217;s<br />
present. I didn&#8217;t manage to understand why the exploit was failing in<br />
its presence.. Also<br />
<a href="https://therecord.media/first-fully-weaponized-spectre-exploit-discovered-online/" rel="nofollow">https://therecord.media/first-fully-weaponized-spectre-exploit-discovered-online/</a><br />
&#8220;But while Voisin did not want to name the exploit author, several<br />
people were not as shy. Security experts on both Twitter and news<br />
aggregation service HackerNews were quick to spot that the new Spectre<br />
exploit might be a module for CANVAS, a penetration testing tool<br />
developed by Immunity Inc.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jennifer Brooks</title>
		<link>https://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/comment-page-1/#comment-1673596</link>
		<dc:creator><![CDATA[Jennifer Brooks]]></dc:creator>
		<pubDate>Tue, 24 Mar 2020 16:05:29 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185857#comment-1673596</guid>
		<description><![CDATA[Intel got a favorable position over AMD as far as speed.most intel processors made are quicker than AMD&#039;s processor.some center i5 processors perform better than a portion of the athlon IIs and the phenom IIs.but then there&#039;s some intel processors that are overrated.like the center 2 teams and the center 2 limits.]]></description>
		<content:encoded><![CDATA[<p>Intel got a favorable position over AMD as far as speed.most intel processors made are quicker than AMD&#8217;s processor.some center i5 processors perform better than a portion of the athlon IIs and the phenom IIs.but then there&#8217;s some intel processors that are overrated.like the center 2 teams and the center 2 limits.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/comment-page-1/#comment-1672639</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Mar 2020 07:41:23 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185857#comment-1672639</guid>
		<description><![CDATA[Besides Meltdown and Spectre, other transient attacks were eventually discovered during the past two years, including the likes of Foreshadow, Zombieload, RIDL, Fallout, and LazyFP.]]></description>
		<content:encoded><![CDATA[<p>Besides Meltdown and Spectre, other transient attacks were eventually discovered during the past two years, including the likes of Foreshadow, Zombieload, RIDL, Fallout, and LazyFP.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/comment-page-1/#comment-1672638</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Mar 2020 07:40:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185857#comment-1672638</guid>
		<description><![CDATA[Intel CPUs vulnerable to new LVI attacks
https://www.zdnet.com/article/intel-cpus-vulnerable-to-new-lvi-attacks/
Researchers say Intel processors will need another round of silicon
chip re-designs to protect against new attack.
Named Load Value Injection, or LVI for short, this is a new class of theoretical attacks against Intel CPUs.
While the attack has been deemed only a theoretical threat, Intel has released firmware patches to mitigate attacks against current CPUs, and fixes will be deployed at the hardware (silicon design) level in future generations.]]></description>
		<content:encoded><![CDATA[<p>Intel CPUs vulnerable to new LVI attacks<br />
<a href="https://www.zdnet.com/article/intel-cpus-vulnerable-to-new-lvi-attacks/" rel="nofollow">https://www.zdnet.com/article/intel-cpus-vulnerable-to-new-lvi-attacks/</a><br />
Researchers say Intel processors will need another round of silicon<br />
chip re-designs to protect against new attack.<br />
Named Load Value Injection, or LVI for short, this is a new class of theoretical attacks against Intel CPUs.<br />
While the attack has been deemed only a theoretical threat, Intel has released firmware patches to mitigate attacks against current CPUs, and fixes will be deployed at the hardware (silicon design) level in future generations.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/comment-page-1/#comment-1672391</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 08 Mar 2020 19:10:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185857#comment-1672391</guid>
		<description><![CDATA[Paul Alcorn / Tom&#039;s Hardware:
Researchers detail two new side channel attacks that can leak secret data from all AMD CPUs made between 2011 and 2019

New AMD Side Channel Attacks Discovered, Impacts Zen Architecture (AMD Responds)
AMD processors from 2011 to 2019 impacted
https://www.tomshardware.com/uk/news/new-amd-side-channel-attacks-discovered-impacts-zen-architecture

&quot;We are aware of a new whitepaper that claims potential security exploits in AMD CPUs, whereby a malicious actor could manipulate a cache-related feature to potentially transmit user data in an unintended way. The researchers then pair this data path with known and mitigated software or speculative execution side channel vulnerabilities. AMD believes these are not new speculation-based attacks.&quot;

It&#039;s noteworthy that this advisory does not point to any mitigations for the attack in question, merely citing other mitigated speculative executions that were used as a vehicle to attack the L1D cache predictor. The researchers also used other methods to exploit the vulnerability, so the advisory is a bit nebulous.

The university says it disclosed the vulnerabilities to AMD on August 23, 2019, meaning it was disclosed in a responsible manner (unlike the CTS Labs debacle), but there isn&#039;t any word of a fix yet. We&#039;ve pinged AMD for comment. 

We&#039;ve become accustomed to news of new Intel vulnerabilities being disclosed on a seemingly-weekly basis, but other processor architectures, like AMD and ARM, have also been impacted by some vulnerabilities, albeit to a lesser extent. It&#039;s hard to ascertain if these limited discoveries in AMD processors are triggered by a security-first approach to hardened processor design, or if researchers and attackers merely focus on Intel&#039;s processors due to their commanding market share: Attackers almost always focus on the broadest cross-section possible. We see a similar trend with malware being designed for Windows systems, by far the predominant desktop OS, much more frequently than MacOS, though that does appear to be changing.]]></description>
		<content:encoded><![CDATA[<p>Paul Alcorn / Tom&#8217;s Hardware:<br />
Researchers detail two new side channel attacks that can leak secret data from all AMD CPUs made between 2011 and 2019</p>
<p>New AMD Side Channel Attacks Discovered, Impacts Zen Architecture (AMD Responds)<br />
AMD processors from 2011 to 2019 impacted<br />
<a href="https://www.tomshardware.com/uk/news/new-amd-side-channel-attacks-discovered-impacts-zen-architecture" rel="nofollow">https://www.tomshardware.com/uk/news/new-amd-side-channel-attacks-discovered-impacts-zen-architecture</a></p>
<p>&#8220;We are aware of a new whitepaper that claims potential security exploits in AMD CPUs, whereby a malicious actor could manipulate a cache-related feature to potentially transmit user data in an unintended way. The researchers then pair this data path with known and mitigated software or speculative execution side channel vulnerabilities. AMD believes these are not new speculation-based attacks.&#8221;</p>
<p>It&#8217;s noteworthy that this advisory does not point to any mitigations for the attack in question, merely citing other mitigated speculative executions that were used as a vehicle to attack the L1D cache predictor. The researchers also used other methods to exploit the vulnerability, so the advisory is a bit nebulous.</p>
<p>The university says it disclosed the vulnerabilities to AMD on August 23, 2019, meaning it was disclosed in a responsible manner (unlike the CTS Labs debacle), but there isn&#8217;t any word of a fix yet. We&#8217;ve pinged AMD for comment. </p>
<p>We&#8217;ve become accustomed to news of new Intel vulnerabilities being disclosed on a seemingly-weekly basis, but other processor architectures, like AMD and ARM, have also been impacted by some vulnerabilities, albeit to a lesser extent. It&#8217;s hard to ascertain if these limited discoveries in AMD processors are triggered by a security-first approach to hardened processor design, or if researchers and attackers merely focus on Intel&#8217;s processors due to their commanding market share: Attackers almost always focus on the broadest cross-section possible. We see a similar trend with malware being designed for Windows systems, by far the predominant desktop OS, much more frequently than MacOS, though that does appear to be changing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/03/07/intel-hardware-trust-is-lost-again/comment-page-1/#comment-1672334</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 07 Mar 2020 14:36:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185857#comment-1672334</guid>
		<description><![CDATA[A major new Intel processor flaw could defeat encryption and DRM protections
Security researchers claim it’s unfixable
https://www.theverge.com/2020/3/6/21167782/intel-processor-flaw-root-of-trust-csme-security-vulnerability

Security researchers are warning of a major new security flaw inside Intel processors, and it could defeat hardware-based encryption and DRM protections. The flaw exists at the hardware level of modern Intel processors released in the last five years, and could allow attackers to create special malware (like keyloggers) that runs at the hardware level and is undetectable by traditional antivirus systems. Intel’s latest 10th Gen processors are not vulnerable, though.

“The problem is not only that it is impossible to fix firmware errors that are hard-coded in the Mask ROM of microprocessors and chipsets,” warns Ermolov. “The larger worry is that, because this vulnerability allows a compromise at the hardware level, it destroys the chain of trust for the platform as a whole.”

Successful attacks would require skill and in most cases physical access to a machine, but some could be performed by other malware bypassing OS-level protections to perform local attacks. This could lead to data from encrypted hard disks being decrypted, forged hardware IDs, and even the ability to extract digital content protected by DRM.

Positive Technologies plans to “provide more technical details” in a white paper that’s due to be published soon]]></description>
		<content:encoded><![CDATA[<p>A major new Intel processor flaw could defeat encryption and DRM protections<br />
Security researchers claim it’s unfixable<br />
<a href="https://www.theverge.com/2020/3/6/21167782/intel-processor-flaw-root-of-trust-csme-security-vulnerability" rel="nofollow">https://www.theverge.com/2020/3/6/21167782/intel-processor-flaw-root-of-trust-csme-security-vulnerability</a></p>
<p>Security researchers are warning of a major new security flaw inside Intel processors, and it could defeat hardware-based encryption and DRM protections. The flaw exists at the hardware level of modern Intel processors released in the last five years, and could allow attackers to create special malware (like keyloggers) that runs at the hardware level and is undetectable by traditional antivirus systems. Intel’s latest 10th Gen processors are not vulnerable, though.</p>
<p>“The problem is not only that it is impossible to fix firmware errors that are hard-coded in the Mask ROM of microprocessors and chipsets,” warns Ermolov. “The larger worry is that, because this vulnerability allows a compromise at the hardware level, it destroys the chain of trust for the platform as a whole.”</p>
<p>Successful attacks would require skill and in most cases physical access to a machine, but some could be performed by other malware bypassing OS-level protections to perform local attacks. This could lead to data from encrypted hard disks being decrypted, forged hardware IDs, and even the ability to extract digital content protected by DRM.</p>
<p>Positive Technologies plans to “provide more technical details” in a white paper that’s due to be published soon</p>
]]></content:encoded>
	</item>
</channel>
</rss>
