IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New They're insanely hard to trigger
Your quote mentions this, but here's the nitty gritty:
https://it.slashdot.org/comments.pl?sid=11851827&cid=56252925
MASTERKEY:

Exploiting MASTERKEY requires an attacker to be able to re-flash the BIOS with a specially crafted BIOS update. This update would contain Secure Processor metadata that exploits one of the vulnerabilities, as well as malware code compiled for ARM Cortex A5 – the processor inside the AMD Secure Processor.

RYZENFALL:

Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges. Accessing the Secure Processor is done through a vendor supplied driver that is digitally signed.

FALLOUT:

Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges. Accessing the Secure Processor is done through a vendor supplied driver that is digitally signed.

CHIMERA:

Prerequisites for Exploitation: A program running with local-machine elevated administrator privileges. Access to the device is provided by a driver that is digitally signed by the vendor.


[edit/tyop]
--

Drew
Collapse Edited by drook March 14, 2018, 07:26:27 AM EDT
They're insanely hard to trigger
You're quote mentions this, but here's the nitty gritty:
https://it.slashdot.org/comments.pl?sid=11851827&cid=56252925
MASTERKEY:

Exploiting MASTERKEY requires an attacker to be able to re-flash the BIOS with a specially crafted BIOS update. This update would contain Secure Processor metadata that exploits one of the vulnerabilities, as well as malware code compiled for ARM Cortex A5 – the processor inside the AMD Secure Processor.

RYZENFALL:

Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges. Accessing the Secure Processor is done through a vendor supplied driver that is digitally signed.

FALLOUT:

Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges. Accessing the Secure Processor is done through a vendor supplied driver that is digitally signed.

CHIMERA:

Prerequisites for Exploitation: A program running with local-machine elevated administrator privileges. Access to the device is provided by a driver that is digitally signed by the vendor.
--

Drew
     TR: Newly reported AMD chipset vulnerabilities. - (Another Scott) - (6)
         They're insanely hard to trigger - (drook)
         Interesting soap opera.. - (Ashton)
         One can't forget that machines can be intercepted while new and moving from maker to customer. - (a6l6e6x) - (3)
             Or malware can be put on the "restore" DVDs, etc., etc. - (Another Scott) - (1)
                 Catch ..2018 and --> onwards - (Ashton)
             Very true - (crazy)

It's Zeus. He's taking you away to the Acropolis.
60 ms