Another AMD Zen 'Secure Encrypted Virtualization' Vulnerability Demonstrated by Researchers

A team of security researchers with Cornell University have demonstrated a proof of concept attack on AMD's Secure Encrypted Virtualization (SEV) technology, leveraging the Zen-integrated AMD Secure Processor (AMD-SP) to achieve full system access. 

The technique requires physical access to the AMD system and is based on a voltage glitching attack that allows a bad actor to actually deploy custom SEV firmware, which would, in turn, allow the decryption of all Virtual Machine (VM)-bound information. The vulnerability is executable on Zen 1 through Zen 3. Previously, part of AMD's claim to fame was that Zen 2 and Zen 3 were free from any vulnerabilities of this kind.

Francisco Pires
Freelance News Writer

Francisco Pires is a freelance news writer for Tom's Hardware with a soft side for quantum computing.

  • drajitsh
    Voltage glitch exploit. Could you add how this works?
    Reply
  • InvalidError
    Practically nothing is truly secure when you have physical access.
    Reply
  • jgraham11
    Not only do you need physical access you must of modified the motherboard to vary the voltage being supplied to the processor. This article is misleading in that the motherboard voltage modulation is required and brushed over and only physical access is stated which is not the same as having server covers removed and the soldering iron is out... I don't think this is much of a real threat.

    Not even in the same realm as Intel bugs, some can be executed just by visiting a website. Keep your systems updated!
    Reply
  • USAFRet
    jgraham11 said:
    Not even in the same realm as Intel bugs, some can be executed just by visiting a website. Keep your systems updated!
    And the theoretical drive by for the Intel was also vastly overrated.
    We only see this several years after the thing became public.

    https://therecord.media/first-fully-weaponized-spectre-exploit-discovered-online/
    Reply
  • escksu
    jgraham11 said:
    Not only do you need physical access you must of modified the motherboard to vary the voltage being supplied to the processor. This article is misleading in that the motherboard voltage modulation is required and brushed over and only physical access is stated which is not the same as having server covers removed and the soldering iron is out... I don't think this is much of a real threat.

    Not even in the same realm as Intel bugs, some can be executed just by visiting a website. Keep your systems updated!

    You dont need a modified motherboard to vary voltage today. All boards are able to control the clockspeed and voltage on both BIOS and OS level. Physcial access. Again, its not that difficult because administrators arent the only threats. You still need people to service your servers, racks (Eg. wiring, hardware replacement). Even server rooms (eg. lights, aircondition, ducts servicing).
    Reply
  • jeremyj_83
    Physical access is absolute access. As soon as you have that nothing is secure.
    Reply