pwshub.com

Researchers reveal "Sinkclose" vulnerability affecting nearly all AMD processors since 2006

Serving tech enthusiasts for over 25 years.
TechSpot means tech analysis and advice you can trust.

What just happened? Security researchers at this year's Def Con have presented findings regarding a long-standing albeit recently discovered vulnerability in AMD processors called "Sinkclose." Though rather hard to exploit, the security flaw can potentially yield catastrophic results for any system unlucky enough to fall victim to it.

On Saturday, IOActive's Principal Security Consultant Enrique Nissim and Associate Principal Security Consultant Krzysztof Okupski delivered vulnerability research in a presentation titled AMD Sinkclose: Universal Ring-2 Privilege Escalation. According to the team's presentation, its team noticed a flaw in one of the components required to secure an execution mode known as System Management Mode. This mode provides attackers access to a highly versatile and powerful execution method. The exploit is invisible to OS-level protections such as anti-virus, anti-malware, and anti-cheat solutions commonly used in online gaming.

Exploiting the vulnerability is not easy (thankfully) and requires the attacker to gain access to the system's kernel first. If successful, the bad actor can use Ring-0 privileges to gain Ring-2 privileges to install an undetectable bootkit. Bootkits are malware designed to target a system's master boot record. Once installed, it cannot be easily detected or removed. In some cases, a successful attack can even persist despite a complete reinstallation of the OS. In these scenarios, an affected machine may require a complete replacement rather than typical malware removal and remediation.

Despite only being recently reported and tracked as CVE-2023-31315, the Sinkclose vulnerability appears to have been a long-standing issue that went undetected in many of AMD's workstations and server-class CPUs for the last 18 years. According to AMD's product security bulletin, the vulnerability impacts many processors across its data center CPUs, graphics solutions, embedded processors, desktops, HEDTs, workstations, and mobile product lines.

IOActive's researchers disclosed the issue to AMD 10 months before its announcement, giving the chipmaker time to review and address it before going public. Team Red already issued mitigations for EPYC and Ryzen CPUs. An AMD spokesperson told Wired that additional mitigations for embedded processors and other affected products would be coming soon. However, the company didn't provide an official timeline.

While the initial news and potential damage may sound horrific, users can rest easier knowing that the vulnerability went undetected for almost two decades, and it appears that hackers have never exploited it. Given AMD's remediation efforts and the inherent difficulty attackers would face in obtaining kernel-level access, widespread exploitation of the vulnerability is highly unlikely.

Source: techspot.com

Related stories
1 month ago - Deep insecurity — Worse-case scenario: "You basically have to throw your computer away." Security flaws in...
1 month ago - Sinkclose is a potentially serious security vulnerability discovered by IOActive analysts in AMD's x86 CPU technology. This low-level bug affects all processors released by the Santa Clara-based corporation since 2006. While AMD...
1 month ago - In light of the recently disclosed Sinkclose vulnerability, AMD is releasing updates to address the issue across several processor families. These updates include all generations of EPYC processors, as well as the latest Threadripper and...
1 month ago - Plus more pain for Intel which fixed 43 bugs, SAP and Adobe also in on the action Patch Tuesday Microsoft has disclosed 90 flaws in its products – six of which have already been exploited – and four others that are listed as publicly...
1 month ago - Plus more pain for Intel which fixed 43 bugs, SAP and Adobe also in on the action Patch Tuesday Microsoft has disclosed 90 flaws in its products – six of which have already been exploited – and four others that are listed as publicly...
Other stories
18 minutes ago - Write better code, urges Jen Easterly. And while you're at it, give crime gangs horrible names like 'Evil Ferret' Software developers who ship buggy, insecure code are the real villains in the cyber crime story, according to Jen Easterly,...
57 minutes ago - The Indian government has approved $2.7 billion in new spending for its space program.
57 minutes ago - heard you like apps — Windows App replaces Microsoft Remote Desktop on macOS, iOS, and Android. Enlarge / The...
57 minutes ago - LinkedIn limits opt-outs to future training, warns AI models may spout personal data.
57 minutes ago - BUSTED — iServer provided a simple service for phishing credentials to unlock phones. Getty Images ...