Page 6 of 7 FirstFirst ... 34567 LastLast
Results 81 to 96 of 101

Thread: AMD processors impacted by 13 serious flaws, says CTS Labs

  1. #81
    Senior Member
    Join Date
    May 2009
    Location
    Where you are not
    Posts
    1,331
    Thanks
    609
    Thanked
    103 times in 90 posts
    • Iota's system
      • Motherboard:
      • Asus Maximus Hero XI
      • CPU:
      • Intel Core i9 9900KF
      • Memory:
      • CMD32GX4M2C3200C16
      • Storage:
      • 1 x 1TB / 3 x 2TB Samsung 970 Evo Plus NVMe
      • Graphics card(s):
      • Nvidia RTX 3090 Founders Edition
      • PSU:
      • Corsair HX1200i
      • Case:
      • Corsair Obsidian 500D
      • Operating System:
      • Windows 10 Pro 64-bit
      • Monitor(s):
      • Samsung Odyssey G9
      • Internet:
      • 500Mbps BT FTTH

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by infraction View Post
    a bit like someone leaving their login details on a post-it note stuck to the monitor
    Well I've never done that....

  2. #82
    Long member
    Join Date
    Apr 2008
    Posts
    2,427
    Thanks
    70
    Thanked
    404 times in 291 posts
    • philehidiot's system
      • Motherboard:
      • Father's bored
      • CPU:
      • Cockroach brain V0.1
      • Memory:
      • Innebriated, unwritten
      • Storage:
      • Big Yellow Self Storage
      • Graphics card(s):
      • Semi chewed Crayola Mega Pack
      • PSU:
      • 20KW single phase direct grid supply
      • Case:
      • Closed, Open, Cold
      • Operating System:
      • Cockroach
      • Monitor(s):
      • The mental health nurses
      • Internet:
      • Please.

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by Tabbykatze View Post
    Tbh, if you think that it is only AMD boards that can be compromised in transit to destination then you are a fool.
    If I remember rightly there was an organised crime gang which intercepted a shipment of mobile phones (probably in China) and put malware on them. It was only one batch they got to but still, no one noticed for ages as you assume a phone you've bought from a shop is pretty much untouched from the manufacturer, everyone thought they were secure. It was a while back but frankly when you've got lorry drivers who are probably paid 3/5ths of nothing in somewhere like China, offering them a few grand in cash to "feel unwell and need to stop over at services overnight" whilst someone pokes at your cargo is not going to be hard to do. The lorry driver probably gets a life changing sum for their nappy nap.

  3. #83
    Senior Member Xlucine's Avatar
    Join Date
    May 2014
    Posts
    2,162
    Thanks
    298
    Thanked
    188 times in 147 posts
    • Xlucine's system
      • Motherboard:
      • Asus prime B650M-A II
      • CPU:
      • 7900
      • Memory:
      • 32GB @ 4.8 Gt/s (don't want to wait for memory training)
      • Storage:
      • Crucial P5+ 2TB (boot), Crucial P5 1TB, Crucial MX500 1TB, Crucial MX100 512GB
      • Graphics card(s):
      • Asus Dual 4070 w/ shroud mod
      • PSU:
      • Fractal Design ION+ 560P
      • Case:
      • Silverstone TJ08-E
      • Operating System:
      • W10 pro
      • Monitor(s):
      • Viewsonic vx3211-2k-mhd, Dell P2414H
      • Internet:
      • Gigabit symmetrical

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    CTS Labs told us that it bucked the industry-standard 90-day response time because, after it discussed the vulnerabilities with manufacturers and other security experts, it came to believe that AMD wouldn't be able to fix the problems for "many, many months, or even a year." Instead of waiting a full year to reveal these vulnerabilities, CTS Labs decided to inform the public of its discovery.
    Complete lies, and we know it from their actions - if it was unfixable, then they could have made more money. Just follow the standard process, and after 90 days you get to go public and shout "AMD has flaws, and they cannot fix them" with proof. That's bound to get more attention, and more effect on the share price. Their actual actions look like a textbook example of how to maximise the impact of a big nothingburger - all to generate the biggest splash in the month or so it takes AMD to fix any of the supposed vulnerabilities.

  4. #84
    boop, got your nose
    Join Date
    Sep 2007
    Location
    southport
    Posts
    2,695
    Thanks
    420
    Thanked
    445 times in 328 posts
    • stevie lee's system
      • Motherboard:
      • ASUS ROG STRIX B450-F Gaming
      • CPU:
      • Ryzen 3600
      • Memory:
      • 16 GB Corsair 3600 MHZ Cas 18
      • Storage:
      • 250GB BX500, M500 240GB, SN750 1TB NVME, mechs - Hitachi 1TB. WDblue 2TB
      • Graphics card(s):
      • sapphire 7700 1gb
      • PSU:
      • corsair RM550X
      • Case:
      • Xigmatech Midgard
      • Operating System:
      • Win 10 Home
      • Monitor(s):
      • 42" Panasonix viera (1080p limited RGB)
      • Internet:
      • plusnet fibre

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    been thinking about how these exploits could work (its stevie theory time - makes sense if you think about it but probabaly wrong )

    Masterkey (x3) vulnerabilities allow attackers to infiltrate the Secure Processor due to multiple vulnerabilities in the firmware. Exploiting MASTERKEY requires an attacker to be able to re-flash the BIOS with a specially crafted BIOS update.
    gigabyte has the @BIOS app that updates the bios from within windows. all you'd need to do is get a modified app that points to your server for update instead of gigabytes, voila modified bios.

    this isn't just a ryzen roblem though. gigabtye also make intel boards that has @bios

    Ryzenfall (x4) allows malicious code to take complete control over the AMD Secure Processor. Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges.
    Fallout (x3) allows attackers to read from and write to protected memory areas, such as SMRAM and Windows Credential Guard isolated memory (VTL-1). Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges
    again, generic stuff that affects all computers and the way they operate. and its the windows isolated memory affected, so why is this just on amds, surely intel can access that too?

    without knowing the specfics of why its just ryzens that are vulnerable, its just anti-amd talk to me. everythings affected if you have elevated admin access.

    Chimera (x2) consists of two sets of manufacturer backdoors; one in firmware and another in hardware. Malicious code can be injected via these backdoors. Prerequisites for Exploitation are: a program running with local-machine elevated administrator privileges. Access to the device is provided by a driver that is digitally signed by the vendor
    the picture underneath shows the asmedia usb3/3.1 chip. my quick google show this to be on everyboard that has usb3. so why are only amd affected and not intel that has the exact same chip?


    to me it looks very much like anti AMD talk, going 'look amd has problems too' people going 'oh yeah they do' 'boo amd', and hoping no one questions that these generic flaws affect every system ever.

    its just a big distraction con-job to in my eyes, could be al that stock manipulation stuff mentioned. and until they actually say how these only affect amd, or amd themselves go 'oh yeah these are vulnerabilities' then these are my thoughts on it.

  5. #85
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by 3dcandy View Post
    ....


    On the moderation note - I've not agreed with several people on here. Saracen and cat-the-right especially. But if I saw them in the pub I'd buy them a pint and have a nice strong debate about something, probably the beer! That's because although I don't necessarily agree with them I appreciate they can be right or wrong but debate fairly. Without too much name calling... which is damn right how it should be!
    That, to be honest, is exactly the type of debate we aim for. We certainly don't want a debate where everyobe agrees. How boring would "I think <insert topic/opinion>" followed by a unanimous chorus of agreement, and me too's. It be a very short and ultra boring discussion.

    I used to have some really good arguments in a rather rough pub. But we all respected each other's opinions. Good job really, 'cos if we'd started calling each other names, someone was likely to get bottled or clobbered with a broken chair leg. And that was just the ladies. It's amazing how the likelihood of a haymaker to the hooter encourages courtesy.

  6. Received thanks from:

    Hoonigan (16-03-2018)

  7. #86
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    13,009
    Thanks
    781
    Thanked
    1,568 times in 1,325 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 5900X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 2TB Linux, 2TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 39 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 900Mb/900Mb (CityFibre FttP)

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by stevie lee View Post
    again, generic stuff that affects all computers and the way they operate. and its the windows isolated memory affected, so why is this just on amds, surely intel can access that too?
    Secure processors aren't like normal ones, they are supposed to have an unbroken trust chain from their fixed boot rom up to the final application they run. There is a tendancy for people to break the chain though, just look at any old games console.
    I thought AMD were using an ARM trustzone implementation though, so I would have expected that to be OK. There must be some gnarly code where ARM meets amd64 though.
    Still, for someone like me that switches secure boot off in the BIOS and installs Linux it all seems rather moot.

    Quote Originally Posted by Saracen View Post
    And that was just the ladies. It's amazing how the likelihood of a haymaker to the hooter encourages courtesy.
    You need a good man with a haymaker to stop them
    Last edited by DanceswithUnix; 15-03-2018 at 08:11 AM.

  8. Received thanks from:

    Corky34 (15-03-2018),Saracen (15-03-2018)

  9. #87
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Hardware Unboxed revisited the HD7970/R9 280X,but look at the comment they posted(not debating the accuracy here but it was funny):

    https://www.youtube.com/watch?v=svxzrs8Dtq8

    Something I left out of the video, I discovered that the Radeon R9 280X has had a serious exploit all this time and all Radeon GPUs might suffer this same vulnerability. If you plug a graphics card with the 280X GPU into your system and connect up a display and then let a stranger onto your PC, they might be able to steal your data and even flash your BIOS. This is particularly serious if you have a password to access your account, but give the stranger the password!

  10. Received thanks from:

    aidanjt (16-03-2018),chinf (15-03-2018),Iota (15-03-2018),MLyons (15-03-2018)

  11. #88
    Fetchez la vache!
    Join Date
    Apr 2013
    Location
    Dorset
    Posts
    537
    Thanks
    59
    Thanked
    50 times in 38 posts
    • dannyboy75's system
      • Motherboard:
      • Asus TUF Gaming B550 Plus
      • CPU:
      • AMD Ryzen 5800X
      • Memory:
      • 32GB Crucial Ballistix DDR4 3200MHz
      • Storage:
      • Sabrent Rocket NVMe 4.0 500GB, Samsung 840 SSD 500Gb, WD 1TB HDD
      • Graphics card(s):
      • Nvidia 3080 Founders Edition
      • PSU:
      • Corsair RM850x
      • Case:
      • Falcon GameMax
      • Operating System:
      • Windows 11 Pro
      • Monitor(s):
      • Asus VG27AQ G-Sync 165 Hz IPS
      • Internet:
      • Virgin 200/20 FTTP

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by Hoonigan View Post
    To all of those that were singing AMD's praises when this came out about Intel a few weeks ago..

    PAHAHAHAHAHAHAHAHHHAHAHAAHAHAHA!!!!11!!11!!!!11ONEONE!!!1!!111!!!1ONE!!!!ONEONEONE!!!!11!!!!!!!
    Sir, you have messed up. You embarrass yourself.

    And no, I'm not an AMD fanboi/gurl/whatever. I haven't owned an AMD processor for about 10 years.

  12. #89
    Senior Member
    Join Date
    May 2014
    Posts
    2,385
    Thanks
    181
    Thanked
    304 times in 221 posts

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by dannyboy75 View Post
    Sir, you have messed up. You embarrass yourself.

    And no, I'm not an AMD fanboi/gurl/whatever. I haven't owned an AMD processor for about 10 years.
    But apparently I'm a girl *swooshes hair Shia LeBouef style*

  13. #90
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    LOL:

    https://www.extremetech.com/computin...gs-deeper-hole

    It’s absolutely fair to characterize and test the flaws in AMD’s chipsets. But as CTS Labs’ white paper makes clear, the same Asmedia chips that make up AMD’s Promontory chipset for Ryzen CPUs have been shipping on motherboards, including hundreds of Intel motherboards models, for at least the past six years.



    The Asmedia ASM1042 and ASM1142 were and are widely used on Intel motherboards, but CTS Labs neglects to mention that fact in its white paper or letter.

    Zilberman tacitly acknowledges this when he writes:

    [W]e have started researching ASMedia chips about a year ago. After researching for some time, we have found manufacturer backdoors inside the chip which give you full control over the chips (ASM1042, ASM1142, ASM1143). We wanted to go public with the findings, but then saw that AMD have outsourced their chipset to ASMedia. So we decided to check the state of AMD, we bought a Ryzen computer, and whimsically ran our exploit PoC, and it just worked out of the box.

    By its own statements, CTS Labs tested and developed a proof of concept exploit for Asmedia controllers before it was aware these controllers were incorporated into Ryzen chipsets. Where, then, is the website AsmediaFlaws.com? Where’s the notification to tell Intel motherboard customers that the chips on their motherboards can be similarly backdoored and abused? This isn’t a theoretical; I’m writing this article from an Ivy Bridge-E system powered by an Asus X79-Deluxe motherboard with an Asmedia 1042 controller. In its white paper, CTS Labs describes the offending Asmedia controllers as follows:

    In our assessment, these controllers, which are commonly found on motherboards made by Taiwanese OEMs, have sub-standard security and no mitigations against exploitation. They are plagued with security vulnerabilities in both firmware and hardware, allowing attackers to run arbitrary code inside the chip, or to reflash the chip with persistent malware.

    If CTS Labs has accurately characterized these flaws, the problems in Asmedia controllers affect millions of Intel motherboards worldwide going back six years. In the early days of USB 3.0, before Intel added its own native chipset support, Asmedia was one of the most common third-party providers. Chips like the ASM1142 are still used on Intel motherboards today. When we looked at Newegg, nearly every USB 3.0 PCI Express card we spot-checked used an Asmedia solution — typically the ASM1042 or ASM1142.

    If these Asmedia flaws are common to Intel, AMD, and standalone cards, Intel users and expansion card users absolutely should’ve been notified. If they’re unique to AMD users, CTS Labs needed to explain why. It has not. Again, when security researchers describe flaws, they typically describe them across the entire set of hardware on which they are known to occur. Failing that, they at least acknowledge the use of these broken solutions in other contexts. CTS Labs did neither.

  14. Received thanks from:

    aidanjt (16-03-2018),Iota (15-03-2018)

  15. #91
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Ok,I found this video on AT forums which was with Ian Cutress from AT and David Kanter talking with CTS-Labs:

    https://www.youtube.com/watch?v=cj3_AILPvU0

    A poster on AT forums who watched it said the following:

    It's a long watch but there are some good details in there about the story and his call with CTS. Lots of questions he posed with no real answer, deflections, obvious lack of understanding of the modern server/compute environment, lack of understanding of modern security protocol, certain elements of their story changing, outright lying (according to other industry contacts) about not being able to share details with anandtech due to Israeli law, etc.

    Ian is careful about not drawing complete conclusions which he shouldn't given his position and lack of expertise in all these areas, but luckily we don't have that standard in a casual tech forum and can call a spade a spade.
    Last edited by CAT-THE-FIFTH; 16-03-2018 at 03:08 AM.

  16. #92
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Transcript of AT interview with CTS-Labs:

    https://www.anandtech.com/show/12536...-with-cts-labs

    Wow,they ended the interview early and didn't answer any more questions from AT!!

    Commentary and Clarification

    All processors and chips have flaws – some are critical, others are simple, some can be fixed through hardware and software. There are security issues and errata in some processors that are several years old.

    CTS-Labs’ reasoning for believing that AMD cannot patch within a reasonable period, coming from ‘industry experts’, seems off – almost as if they believe that when they enter a responsible disclosure time-frame, they cannot reveal the vulnerabilities until they are fixed. The response to the question about Meltdown and Spectre, if they would have the same attitude to the fact that the industry had several months before publication for a coordinated effort, means that despite offering a unilateral reasoning for 0-day disclosure, they would not apply it unilaterally but on a case-by-case basis. The language used is clearly not indicative of their actual feeling and policy.

    Blaming the lack of CVE numbers on them being ‘new’ to it, yet citing repeatedly many years of security experience and in cyber-security is also in opposition. It may be their first public disclosure, even as individuals, but I find it hard to believe they were not prepared on the CVE front. Using our own experts, it can take hours for a well-known company to be issued a CVE number, or weeks for an unknown entity. Had CTS-Labs approached a big security firm, or AMD, then these could have been issued relatively easily. CTS-Labs stated that they are waiting for CVE numbers to be issued to going to be an interesting outcome, especially if they appear and/or the time of submission is provided.

    It seems a bit odd for a company looking into ASMedia related flaws to then turn their focus onto AMD’s secure processor, using the chipset vulnerabilities as a pivot point. ASMedia chips, especially the USB host controllers cited by CTS-Labs, are used on literally tens of millions of Intel-based motherboards around the world, from all the major OEMs. For a large period of time, it was hard to find a system without one. The decision to pivot on newer AMD platforms is a weak argument, the wishy-washy language when discussing projects at the start of the company’s existence, and the abrupt ending to the call when asked to discuss the original customer could be construed (this is conjecture here) that the funding for the product was purposefully directional towards AMD.

    The discussion about the understanding of how vulnerabilities can be mitigated certainly piqued David’s interest. The number of things that can be done through microcode, or that are undocumented to third-party chip analysts, means that it came across as highly strange that CTS-Labs were fervent in their believe that AMD could not patch the issue in reasonable time to warrant a longer reasonable disclosure period (one of many arguments used). As seen in recent vulnerabilities and responsible disclosures, chip designers have implemented a number of significant methods to enable/disable/adjust features that were not known to be able to be adjusted, such as resetting a branch predictor. All it takes is for the chip company to say ‘we can do this’ and for it to be implanted, so the use of high-impact language was certainly noted. The confusion between microcode and FPGA in the discussion also raised an eyebrow or three.

    When approaching the subject of virtualized environments, the short sharp acceptance that these vulnerabilities were less of an issue in VMs and with cloud providers was quickly overshadowed by the doom and gloom message for if a system was already compromised, even when it was stated that analyst expect 10% market share for EPYC by 2020. It was clear that the definitions of enterprise deployments seemed to differ between AnandTech and CTS-Labs, again partnered with amounts of doom and gloom.

    Lastly, the legal argument of not being able to share the details outside of Israel, or only to registered security companies outside of Israel, was an interesting one we were not expecting. This being coupled with the lack of knowledge on the effect of an open disclosure led us to reach out to our legal contacts that are familiar with the situation. This led to the line:

    “It’s BS, no restrictions.”

    Some of our contacts, and readers with security backgrounds, have privately confirmed that most of this is quite fishy. The combination of the methodology and presentation with a new company that both claims to have experience but can’t do CVE numbers is waving red flags.
    Opinion

    Going back to the two original questions, here is where I personally stand on the issue:
    One What are the vulnerabilities, how bad are they, and what can be done?

    One, if the vulnerabilities exist: It is very likely that these vulnerabilities are real. A secondary attack vector that could install monitoring software might be part of a multi-layer attack, but offering a place for indiscriminant monitoring of compromised systems can be seen as an important hole to fix. At this point, the nearest trusted source we have that these vulnerabilities are real is from Alex Ionescu, a Windows Internals Expert who works for CrowdStrike, one of the companies that CTS-Labs says has the full disclosure documents. That is still a stage a bit far from us to warrant a full confirmation. Given that Trail of Bits required 4-5 days to examine CTS-Labs work, I suspect it will take AMD a similar amount of time to do so. If that is the case, AMD might have additional statements either on Friday or Monday, either confirming or rebutting the issues, and discussing future action.
    Two Who are CTS-Labs, how come their approach to reasonable responsible disclosure differs to other security firms, how come a number of elements about the disclosure are atypical of a security firm, what is thier financial model, and who are their clients?

    Two, the status of CTS-Labs: I’m more than willing to entertain the fact that as a first public high-level disclosure, a security company can be out of step with a few of the usual expected methods of responsible disclosure and presentation. A number of new security companies that want to make a name for themselves have to be bold and brash to get new customers, however we have never quite seen it to this extent – normally the work speaks for itself, of the security company will develop a relationship with the company with the vulnerability and earn its kudos that way. The fact that CTS-Labs went with a polished website (with nine links to download the whitepaper, compared to the Meltdown/Spectre websites that had one), and a PR firm is definitely a different take. The unilateral reasoning for a 0-day/1-day disclosure, followed by a self-rebuttal when presented with a more significant issue, shows elements of inconsistency in their immediate judgement. The lack of CVEs ready to go, despite the employees having many years of experience, as well as experience in the Israeli equivalent of the NSA in Unit 8200, does seem as opposites; an experienced security team would be ready. The swift acceptance that cloud-based systems are vulnerable but then going straight into doom and gloom, despite the limited attack surface in that market, shows that they are focusing on the doom and gloom. The reluctance for CTS-Labs to talk about clients and funding, or previous projects, was perhaps to be expected.

    The initial downside of this story coming into the news was the foreboding question of ‘is this how we are going to do security now?’. Despite the actions of CTS and their decision to go with a 24-hour period, after speaking to long-term industry experts at high profile technology companies, a standard 90-180 day pre-disclosure period is still the primary standard that manufacturers would expect security companies to adhere with to actively engage with responsible information and verification. We were told that to go beyond/behind this structure ultimately formulates a level of distrust between the company, the security agency, and potentially the clients, regardless of the capabilities of the security researchers or the severity of the issues found; moreso if the issues are blown out of proportion in relation to their nature and attack surface.
    Last edited by CAT-THE-FIFTH; 16-03-2018 at 03:18 AM.

  17. #93
    Keep it sexy Zhaoman's Avatar
    Join Date
    Jun 2008
    Location
    Dublin
    Posts
    1,527
    Thanks
    234
    Thanked
    126 times in 106 posts

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    So are "CTS Labs" and any shady affiliates likely to just get away with this or will there be repercussions? Surely some of the short-selling around the time of the release of this article should be investigated?

  18. #94
    Senior Member
    Join Date
    May 2014
    Posts
    2,385
    Thanks
    181
    Thanked
    304 times in 221 posts

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by Zhaoman View Post
    So are "CTS Labs" and any shady affiliates likely to just get away with this or will there be repercussions? Surely some of the short-selling around the time of the release of this article should be investigated?
    I think it depends on what AMD wants to hit them for. If these vulnerabilities are proven and re-produce-able then they did not lie and therefore it would be hard to argue in court. I think they could probably look into defamation or libel in some ways. I'm not sure how the financial sector would hit the creators of this and if it is shareholder/competition funded then they're going to be protected up to the hilt to prevent the true sponsor leaking.

    I'm not really sure AMD/Courts can actually do much, but I will await someone far more legalese to comment.

  19. #95
    Keep it sexy Zhaoman's Avatar
    Join Date
    Jun 2008
    Location
    Dublin
    Posts
    1,527
    Thanks
    234
    Thanked
    126 times in 106 posts

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by Tabbykatze View Post
    I think it depends on what AMD wants to hit them for. If these vulnerabilities are proven and re-produce-able then they did not lie and therefore it would be hard to argue in court. I think they could probably look into defamation or libel in some ways. I'm not sure how the financial sector would hit the creators of this and if it is shareholder/competition funded then they're going to be protected up to the hilt to prevent the true sponsor leaking.

    I'm not really sure AMD/Courts can actually do much, but I will await someone far more legalese to comment.
    Yeah I guess we'll wait to see if these "exploits" are confirmed to be real threats or not but if they do indeed turn out to a waste of time then I'd like to think there are deterrents in place for this kind of blatant market manipulation. What's to stop us forming our own shady testing labs and going all in on some sweet manipulated profits?

  20. #96
    Senior Member Lanky123's Avatar
    Join Date
    Jul 2007
    Location
    Oxford
    Posts
    922
    Thanks
    91
    Thanked
    152 times in 101 posts
    • Lanky123's system
      • Motherboard:
      • Gigabyte GA-H81M-D2V
      • CPU:
      • Core i5 4570
      • Memory:
      • 2 x 4GB Vengeance LP
      • Storage:
      • 250GB Samsung 840 EVO SSD + 2+4TB HDD + 3TB Synology DS216SE
      • Graphics card(s):
      • MSI Radeon R9 270X HAWK
      • PSU:
      • Silverstone Strider 400W
      • Case:
      • Silverstone Sugo SG02B-F
      • Operating System:
      • Windows 8.1 / Ubuntu 16.04
      • Monitor(s):
      • ElectriQ 32" 4k IPS + Dell 22" U2212HM
      • Internet:
      • Virgin 60Mbit/s

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by Zhaoman View Post
    What's to stop us forming our own shady testing labs and going all in on some sweet manipulated profits?
    We (I presume ) don't have a couple of billion with which to short AMD stock. Other than that, depressingly little...

Page 6 of 7 FirstFirst ... 34567 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •