Computer memory flaw leads to global security fixes
In AMD processors
Cybersecurity experts studying computer memory modules have uncovered a significant security flaw that has led to global security fixes in AMD computer processors. The vulnerability, known as ‘BadRAM,’ arises when rogue memory modules deliberately provide false information to a computer’s processor during startup, potentially exposing sensitive data or causing system disruptions.
Processors are integral to computing calculations. They store code and data in the system’s memory (DRAM). When a computer boots up, the processor communicates with the DRAM modules to determine their size, speed, and configuration.
This critical information is stored in the SPD (Serial Presence Detect) chip. However, researchers discovered that attackers could manipulate this chip, bypassing AMD’s built-in security mechanisms to protect sensitive data, particularly in cloud environments vulnerable to data breaches and insider threats.
The research team targeted a security feature called Secure Encrypted Virtualisation (SEV), developed by AMD. SEV encrypts virtual machines’ memory, safeguarding cloud computing privacy and isolating virtual machines from advanced attacks.
The research, conducted by experts from KU Leuven (Belgium), the University of Lübeck (Germany), and the University of Birmingham (UK), identified a significant flaw that allowed attackers to trick the system into accessing protected memory.
Dr David Oswald, from the University of Birmingham, explained, “Using inexpensive off-the-shelf equipment, we could manipulate the processor into granting access to protected memory.”
The researchers further explained that BadRAM causes the memory module to falsely report its size, tricking the CPU into addressing non-existent ‘ghost’ memory regions. This results in two CPU addresses mapping to the exact DRAM location, enabling attackers to bypass memory protections and access sensitive data.
In response to the findings, AMD has issued firmware updates to secure the memory configuration process at boot. Dr Oswald assured users, stating, “Most cloud providers have already updated their firmware to include AMD’s countermeasures, so there’s no need to worry about the security of your data.”
The researchers have also launched a website to explain the vulnerability and its potential risks further.
Hero image: AMD has issued firmware updates to secure the memory configuration process at boot. Credit: Johannes Plenio