Wednesday, December 11, 2024

CHEAP THRILLS >> BadRAM: $10 security flaw in AMD could allow hackers to access cloud computing secrets

Cyber security experts studying memory modules in computers have uncovered a key weakness that has led to worldwide security fixes in AMD computer processors.
The weakness occurs because of "BadRAM"—rogue  that deliberately provide  to the computer's  during startup.

'BadRAM' exploit: Security flaw in computer memory leads to worldwide fixes

Flaw in computer memory leads to global security fixes
BadRAM logo. Credit: University of Birmingham

Processors are present in every computer and are necessary to perform every calculation. The computer's memory (DRAM) is essential for storing code and data. When a computer boots up, the processor will communicate with DRAM modules to learn size, speed and configuration.

This information is stored on the so-called SPD chip. But by tampering with this chip, the researchers found that attackers were able to bypass the AMD's security mechanisms put in place to protect sensitive data—particularly data stored in shared cloud environments with pervasive data breaches and insider threats.
In this case, the researchers targeted a  called Secure Encrypted Virtualization (SEV), designed by global computing company AMD. This cutting-edge technology protects privacy and trust in cloud computing by encrypting a virtual machine's memory and isolating it from advanced attackers.
  • The research was carried out by a consortium of experts from KU Leuven, Belgium; the University of Luebeck, Germany; and the University of Birmingham, U.K.
It has led to AMD issuing firmware updates to securely validate memory configurations as processors boot up
Professor Oswald said, "We found that using cheap, off-the-shelf equipment, we were able to trick the computer's processor into allowing access to protected memory."

BadRAM: $10 hack unlocks AMD encrypted memory

International research team uncovers vulnerability in cloud server security  — News

The researchers have published a website to explain the weakness and the potential threat posed. They explain that BadRAM makes the computer's memory module intentionally lie about its size, tricking the CPU into addressing "ghost" memory regions that don't exist.
This leads to two CPU addresses mapping to the same DRAM location. And through these aliases, attackers can bypass CPU memory protections, exposing  or causing disruptions.
Professor Oswald added,
"We worked with AMD to ensure they were able to adopt appropriate countermeasures so that BadRAM is detected at the point the computer boots up. While it's good practice to keep your system up-to-date, most cloud providers will have updated their firmware to include AMD's countermeasures—so there is no need to worry that your data is not secure!"

Explore further

Software package can bypass CPU for more efficient computing
BadRAM attack breaches AMD secure VMs using a Raspberry Pi Pico, DDR  socket, and a 9V battery | Tom's Hardware
BadRAM: $10 security flaw in AMD could allow hackers to access cloud  computing secrets | The Record from Recorded Future News

No comments: