Vulnerability in AMD’s Secure Encrypted Virtualization for EPYC: Update Now to Build
#1
Exclamation 
Quote:
[Image: EPYC%20Tech%20Day%20First%20Session_For%20Press%20an...78x452.jpg]

One of the key elements of building a processor is that designing a secure product involves reducing the ‘attack surface’ as much as possible: the fewer ways an attack can get in, the safer your product is. For the white knights of the security world, when a vulnerability is found, the process usually goes through a period of responsible disclosure, i.e. the issue is presented to the company, and they are often given a certain time to fix the issue (to help customers) before the full disclosure is made public (in case it might be swept under the rug). Using this method, a researcher at Google found a vulnerability in the way AMD’s EPYC processors provide Secure Encrypted Virtualization (SEV) which would allow an attacker to recover a secure key that would provide access between previously isolated VMs on a system. AMD has since released an update to the firmware which patches this issue.

AMD’s Secure Encrypted Virtualization (SEV) feature on its EPYC processors allows a system that runs multiple virtual machines through a hypervisor to have those virtual machines purely isolated from one another. By producing encryption keys at the hardware level, the hypervisor can maintain the equivalent of separate secure enclaves between VMs with individual keys. The SEV code runs deep within the EPYC processor, specifically on a Platform Security Processor (PSP), which is a hardened ARM Cortex core.

The SEV feature relies on elliptic-curve cryptography for its secure key generation, which runs when a VM is launched. The VM initiates the elliptic-curve algorithm by providing points along its NIST (National Institute of Standards and Technology) curve and relaying the data based on the private key of the machine. Due to the algorithm involved, if the points provided to the algorithm at the VM launch are both non-standard and small, parts of the algorithm are reduced to zero, leaving behind a path by which over repeated VM launches, an attacker could gather enough data to reassemble the private key of the system. More details are provided in the full disclosure documentation, which indicates that SEV firmware version 0.17 build 11 and earlier are vulnerable.
Continue Reading
[-] The following 2 users say Thank You to harlan4096 for this post:
  • ismail, silversurfer
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
K-Lite Codec Pack 19.6.0 / 19.6.1 Update
Changes in 19.6.0:...harlan4096 — 11:42
Free Download Manager 6.33.2.6656
Changes in 6.33.2....harlan4096 — 11:41
Vivaldi 7.9 Build 3970.45
Vivaldi 7.9 Build ...harlan4096 — 11:40
Apples Releases the 26.4 Versions of iOS...
Apple has just rel...harlan4096 — 11:38
Opera 129.0.5823.22
Hello! Opera st...harlan4096 — 11:37

[-]
Birthdays
Today's Birthdays
avatar (44)gapedDow
avatar (38)snorydar
Upcoming Birthdays
avatar (46)qaqapeti

[-]
Online Staff
harlan4096's profile harlan4096
Administrator

>