EVGA

CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code

Author
rjohnson11
EVGA Forum Moderator
  • Total Posts : 102253
  • Reward points : 0
  • Joined: 2004/10/05 12:44:35
  • Location: Netherlands
  • Status: online
  • Ribbons : 84
2018/03/14 10:16:25 (permalink)
https://www.techpowerup.com/242346/cts-labs-sent-amd-and-other-companies-a-research-package-with-proof-of-concept-code
 
This is a followup story (with more info) to this forum thread: https://forums.evga.com/FindPost/2800713
 
CTS labs notified AMD and other parties with about 24 hours notice about the 4 vulnerabilities in question. In many people's eyes this was wrong as the unwritten rule says 90 days. However, remember that Spectre/Meltdown were kept secret for months. CTS labs sent AMD. Microsoft, HP, Dell, Symantec, FireEye, and Cisco Systems all of the detailed info including sample code for the vulnerability.
 
They (CTS labs) state: "If you look at the situation in the following way: right now the public knows about the vulnerabilities and their implications, AMD is fully informed and developing patches, and major security companies are also informed and working on mitigation."
 
Unlike Spectre/Meltdown these vulnerabilities only affect AMD CPUs. I am still confident in AMD CPUs and fully expect AMD to have patches and micro code updates soon to combat most of these issues. This doesn't affect my faith in the company and I will gladly buy another Threadripper processor.
 

AMD Ryzen 9 7950X,  Corsair Mp700 Pro M.2, 64GB Corsair Dominator Titanium DDR5  X670E Steel Legend, MSI RTX 4090 Associate Code: H5U80QBH6BH0AXF. I am NOT an employee of EVGA

#1

15 Replies Related Threads

    Brad_Hawthorne
    Insert Custom Title Here
    • Total Posts : 23174
    • Reward points : 0
    • Joined: 2004/06/06 16:13:06
    • Location: Dazed & Confused
    • Status: offline
    • Ribbons : 39
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/15 04:27:09 (permalink)
    They're a shell company that specializes in stock market price manipulation. Beware of news sources and intent.
    #2
    seth89
    CLASSIFIED ULTRA Member
    • Total Posts : 5290
    • Reward points : 0
    • Joined: 2007/11/13 11:26:18
    • Status: offline
    • Ribbons : 14
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/15 05:41:34 (permalink)
    It’s not real and the publisher of the memo even states that it’s BS. It’s the technology version of “fake news”.
    Please watch GamersNexus breakdown of the video.

    https://youtu.be/ZZ7H1WTqaeo


    #3
    kram36
    The Destroyer
    • Total Posts : 21477
    • Reward points : 0
    • Joined: 2009/10/27 19:00:58
    • Location: United States
    • Status: offline
    • Ribbons : 72
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/15 07:04:42 (permalink)
    This is not "fake news", this is a real issue that AMD will have to address.
    #4
    seth89
    CLASSIFIED ULTRA Member
    • Total Posts : 5290
    • Reward points : 0
    • Joined: 2007/11/13 11:26:18
    • Status: offline
    • Ribbons : 14
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/15 08:10:14 (permalink)
    They did reply, and they will look further into it.
    Watch the video.


    #5
    kram36
    The Destroyer
    • Total Posts : 21477
    • Reward points : 0
    • Joined: 2009/10/27 19:00:58
    • Location: United States
    • Status: offline
    • Ribbons : 72
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/15 08:14:47 (permalink)
    Gamers Nexus can try to put as much lipstick on this issue and attack the way the security company presented the issue, it's still an issue.
    #6
    XrayMan
    Insert Custom Title Here
    • Total Posts : 73000
    • Reward points : 0
    • Joined: 2006/12/14 22:10:06
    • Location: Santa Clarita, Ca.
    • Status: offline
    • Ribbons : 115
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/15 21:20:38 (permalink)
    kram36
    This is not "fake news", this is a real issue that AMD will have to address.




       +1

                My Affiliate Code: 8WEQVXMCJL
     
            Associate Code: VHKH33QN4W77V6A
     
                 
     
     
                      
     
     
     
              
     
       
     
               
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     



     
     
     
     
     
     &nbsp
    #7
    Brad_Hawthorne
    Insert Custom Title Here
    • Total Posts : 23174
    • Reward points : 0
    • Joined: 2004/06/06 16:13:06
    • Location: Dazed & Confused
    • Status: offline
    • Ribbons : 39
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/17 01:41:34 (permalink)
    Actually, with how it's been presented it truly is fake news.
    #8
    XrayMan
    Insert Custom Title Here
    • Total Posts : 73000
    • Reward points : 0
    • Joined: 2006/12/14 22:10:06
    • Location: Santa Clarita, Ca.
    • Status: offline
    • Ribbons : 115
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/17 16:48:11 (permalink)
    Brad_Hawthorne
    Actually, with how it's been presented it truly is fake news.




     Down voted.             

                My Affiliate Code: 8WEQVXMCJL
     
            Associate Code: VHKH33QN4W77V6A
     
                 
     
     
                      
     
     
     
              
     
       
     
               
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     



     
     
     
     
     
     &nbsp
    #9
    09973
    iCX Member
    • Total Posts : 474
    • Reward points : 0
    • Joined: 2008/01/10 11:05:19
    • Status: offline
    • Ribbons : 2
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/17 16:55:43 (permalink)
    Brad_Hawthorne
    Actually, with how it's been presented it truly is fake news.


    I agree here. The way CTS Labs acted and initially presented itself and its "findings" were completely suspect and honestly very irresponsible to present a possible vector of attack to the wild without giving the respective company time to respond first. However, now that AMD must scramble lets see what they do and what happens.

    As long as your popular enough, you can get away with anything.
    #10
    panzlock
    FTW Member
    • Total Posts : 1736
    • Reward points : 0
    • Joined: 2016/11/10 17:56:33
    • Location: Canada
    • Status: offline
    • Ribbons : 0
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/19 05:39:07 (permalink)
    XrayMan
    Brad_Hawthorne
    Actually, with how it's been presented it truly is fake news.




     Down voted.             




    Either you didn't watch the video or you don't understand the content.
    #11
    wmmills
    CLASSIFIED ULTRA Member
    • Total Posts : 5679
    • Reward points : 0
    • Joined: 2006/01/04 20:47:29
    • Location: New Jersey
    • Status: offline
    • Ribbons : 40
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/19 05:51:51 (permalink)
    09973
    Brad_Hawthorne
    Actually, with how it's been presented it truly is fake news.


    I agree here. The way CTS Labs acted and initially presented itself and its "findings" were completely suspect and honestly very irresponsible to present a possible vector of attack to the wild without giving the respective company time to respond first. However, now that AMD must scramble lets see what they do and what happens.


    +1.... but I think this story sums up the nonsense that these guys are probably being paid to serve the unknowing public: https://www.extremetech.com/computing/265695-cts-labs-responds-allegations-bad-faith-amd-security-disclosures-digs-deeper-hole  
     
    "
    [W]e have started researching ASMedia chips about a year ago. After researching for some time, we have found manufacturer backdoors inside the chip which give you full control over the chips (ASM1042, ASM1142, ASM1143). We wanted to go public with the findings, but then saw that AMD have outsourced their chipset to ASMedia. So we decided to check the state of AMD, we bought a Ryzen computer, and whimsically ran our exploit PoC, and it just worked out of the box.
    By its own statements, CTS Labs tested and developed a proof of concept exploit for Asmedia controllers before it was aware these controllers were incorporated into Ryzen chipsets. Where, then, is the website AsmediaFlaws.com? Where’s the notification to tell Intel motherboard customers that the chips on their motherboards can be similarly backdoored and abused? This isn’t a theoretical; I’m writing this article from an Ivy Bridge-E system powered by an Asus X79-Deluxe motherboard with an Asmedia 1042 controller. In its white paper, CTS Labs describes the offending Asmedia controllers as follows:
    In our assessment, these controllers, which are commonly found on motherboards made by Taiwanese OEMs, have sub-standard security and no mitigations against exploitation. They are plagued with security vulnerabilities in both firmware and hardware, allowing attackers to run arbitrary code inside the chip, or to reflash the chip with persistent malware.
     
    If CTS Labs has accurately characterized these flaws, the problems in Asmedia controllers affect millions of Intel motherboards worldwide going back six years. In the early days of USB 3.0, before Intel added its own native chipset support, Asmedia was one of the most common third-party providers. Chips like the ASM1142 are still used on Intel motherboards today. When we looked at Newegg, nearly every USB 3.0 PCI Express card we spot-checked used an Asmedia solution — typically the ASM1042 or ASM1142.
    If these Asmedia flaws are common to Intel, AMD, and standalone cards, Intel users and expansion card users absolutely should’ve been notified. If they’re unique to AMD users, CTS Labs needed to explain why. It has not. Again, when security researchers describe flaws, they typically describe them across the entire set of hardware on which they are known to occur. Failing that, they at least acknowledge the use of these broken solutions in other contexts. CTS Labs did neither."
     
    The whole thing is a joke, what a bunch horse hockey pucks! lol Nice try CTS.

    MOBO: EVGA x299 Dark, CPU: I9 10900X, RAM: Patriot Viper RGB 3600 32gb, SSD: Samsung 860 EVO 1TB, M2: Samsung 970 EVO+ 1TB, PSU: CoolerMaster M2 1500, CPU HSF: EVGA 240 CLC HSF~ P/P EK Furious Vardar, G-CARD:EVGA RTX3090 FTW3 Ultra Gaming w/Hybrid kit and Noctua IPPC 3000 P/P, CASE: LIAN-LI PC-V2010B w/ Window mod, OS: Windows 10 Pro 64bit, MON: Alienware AW3821DW

     New EVGA product? Register it NOW with this link:
    http://www.evga.com/register/default.asp?affiliatecode=4QFQRAMOII
     Help Our Vets From K-2!
    [link=https://strongholdfreedom
    #12
    rjohnson11
    EVGA Forum Moderator
    • Total Posts : 102253
    • Reward points : 0
    • Joined: 2004/10/05 12:44:35
    • Location: Netherlands
    • Status: online
    • Ribbons : 84
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/20 04:44:16 (permalink)
    CTS Labs have now disclosed a video showing a proof of concept:
     

     
     

    AMD Ryzen 9 7950X,  Corsair Mp700 Pro M.2, 64GB Corsair Dominator Titanium DDR5  X670E Steel Legend, MSI RTX 4090 Associate Code: H5U80QBH6BH0AXF. I am NOT an employee of EVGA

    #13
    GhostImage
    iCX Member
    • Total Posts : 358
    • Reward points : 0
    • Joined: 2008/09/21 11:49:30
    • Status: offline
    • Ribbons : 2
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/20 06:03:31 (permalink)
    Hmm.... Entertaining.
    From the comments:
    Go g: - " Who gave you the ADMINISTRATOR password? If connecting with a laptop to a production server is what a hacker COULD do, how would he get an administrator password for a server?"

    And this one.

    Dimiter Petrov: - "So you can flash BIOS if you have root access ... SURPRISE SURPRISE :D :D :D How is this a vulnerability? I see it more as a feature"

    None of those were answered by CTS labs.
    Ive been reading about this from the get go. The whole case stinks like a pile of fresh manure. Sorry for analogy. 😝


    #14
    rjohnson11
    EVGA Forum Moderator
    • Total Posts : 102253
    • Reward points : 0
    • Joined: 2004/10/05 12:44:35
    • Location: Netherlands
    • Status: online
    • Ribbons : 84
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/20 06:06:28 (permalink)
    GhostImage
    Hmm.... Entertaining.
    From the comments:
    Go g: - " Who gave you the ADMINISTRATOR password? If connecting with a laptop to a production server is what a hacker COULD do, how would he get an administrator password for a server?"

    And this one.

    Dimiter Petrov: - "So you can flash BIOS if you have root access ... SURPRISE SURPRISE :D :D :D How is this a vulnerability? I see it more as a feature"

    None of those were answered by CTS labs.
    Ive been reading about this from the get go. The whole case stinks like a pile of fresh manure. Sorry for analogy. 😝

    That is OK. We like honest answers and opinions here.

    AMD Ryzen 9 7950X,  Corsair Mp700 Pro M.2, 64GB Corsair Dominator Titanium DDR5  X670E Steel Legend, MSI RTX 4090 Associate Code: H5U80QBH6BH0AXF. I am NOT an employee of EVGA

    #15
    panzlock
    FTW Member
    • Total Posts : 1736
    • Reward points : 0
    • Joined: 2016/11/10 17:56:33
    • Location: Canada
    • Status: offline
    • Ribbons : 0
    Re: CTS Labs Sent AMD and Other Companies a Research Package with Proof-of-Concept Code 2018/03/20 07:05:55 (permalink)
    rjohnson11
    That is OK. We like honest answers and opinions here.




    Interesting. Because I was threatened with a ban for being honest and factual.
     
    #16
    Jump to:
  • Back to Mobile