Google has disclosed details of a vulnerability in AMD processors and published a toolkit for analyzing and modifying their microcode

Google Security Team specialists reported details of a vulnerability (CVE-2024-56161) that allows bypassing the digital signature verification mechanism when updating microcode in AMD processors based on the Zen1 to Zen4 microarchitecture, as reported by the OpenNet resource.

The vulnerability has a CVSS severity rating of 7.2 out of 10, indicating it is a serious issue. “An improper signature check in the AMD CPU microcode patch loader could allow an attacker with local administrator privileges to load malicious microcode,” Google said in a statement. The researchers notified AMD of the vulnerability on September 25, 2024.

The vulnerability that allowed custom patches to be loaded into the microcode of AMD Zen 1-4 processors was caused by the use of the CMAC algorithm for verification instead of the recommended hash functions, which is not suitable for this purpose and is not protected from brute-force collisions. AMD fixed the vulnerability in a December microcode update by replacing CMAC with a cryptographically strong hash function.

Image Source: AMD

Google has also released Zentool under the Apache 2.0 license, which can be used to analyze microcode, manipulate it, and create patches to change the microcode in AMD Zen processors. Zentool includes the following commands: zentool edit — edits the parameters of microcode files, changes the microcode, and replaces individual instructions; zentool print — displays information about the structures and parameters of the microcode; zentool load — loads the microcode into the CPU; zentool resign — corrects the digital signature taking into account the changes added to the microcode. Zentool also includes the mcas and mcop utilities with assembler and disassembler implementations for the microcode.

Google has also produced a guide to the RISC86 microarchitecture used in AMD microcode, and guidance on creating your own microcode, explaining how to create your own processor instructions implemented in RISC86 microcode, change the behavior of existing instructions, and load microcode changes into the processor.

admin

Share
Published by
admin

Recent Posts

By 2030, console gaming will leave PC gaming far behind, but mobile games will be in the lead

Apparently, in the near future the eternal dispute about what is more popular - games…

30 minutes ago

Defective GPUs May Have Leaked Into GeForce RTX 50 Series Laptops — Now They Won’t Be Released on Time

According to German publication Heise, laptop manufacturers are working hard to thoroughly test new models…

1 hour ago

Robocop Returns in Unfinished Business Story DLC for RoboCop: Rogue City — Details and First Gameplay

Publisher Nacon and developers from the Polish studio Teyon (Terminator: Resistance) presented Unfinished Business -…

2 hours ago

Intuitive Machines’ Athena Lander Lands on the Moon, But How Exactly Is a Mystery

The $62.5 million IM-2 mission launched on February 26 on a SpaceX Falcon 9 rocket…

3 hours ago

Two heroes, stealth, open combat: Ubisoft showed 20 minutes of Assassin’s Creed Shadows gameplay

Image source: Ubisoft Let us remind you that the events of Assassin’s Creed Shadows will…

3 hours ago

TikTok’s future in the US is still in question: talks with potential buyers have not yet begun

With less than a month left before TikTok's U.S. sale deadline, its Chinese owner has…

4 hours ago