Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 11 August, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Security Flaw discovered within AMD Secure Processor – Security Pro's have their say

by The Gurus
January 11, 2018
in Editor's News
Share on FacebookShare on Twitter

A security flaw has been discovered on the AMD PSP (Platform Security Processor), which is a chip-on-chip security system, that stores critical system data such as passwords, certificates, and encryption keys, in a secure environment and outside of the more easily accessible AMD cores. AMD has fixed but not released the firmware updates. Much like the Intel ME, the AMD PSP is an integrated coprocessor that sits next to the real AMD64 x86 CPU cores. A Google Cloud Security researcher discovered the vulnerability and reported the issue to AMD in September with AMD developing a patch in December.
The news was released on the same day as the Intel Meltdown and Spectre flaws announcement. AMD has since confirmed their units are only affected by the Spectre flaw.
With million’s potentially impacted by the news, what can organisations do to protect themselves? Cyber Security professionals from FireMon and Lastline have offered their advise:
Josh Mayfield, director at FireMon:
It can be difficult for organisations to know just how to protect themselves from the AMD PSP vulnerability without intimate knowledge of where the vulnerability exists.  Vulnerability scanners can be helpful to locate the assets affected, but unfortunately, scanners stop at this point.
The primary vehicle for mitigating the risk is basic analysis with attack simulation.  This happens when you combine policy with vulnerability details to see how a weak spot can be accessed (and exploited).  If an organisation can quarantine the communication of affected systems, they can reduce the risk of spread throughout the network.  This compresses the patch list, because assets removed from communication can go lower on the list, and critical systems (those with necessary connections) can take priority.
Furthermore, PSP can be disabled on the systems with this vulnerability.  However, it would be imprudent to suspend PSP on all AMD machines.  Again, attack simulation reveals this.  Ranking priorities is essential to mitigate the risk to systemic spread.
Unlike Spectre and Meltdown, this PSP vulnerability goes right to the security processing on the AMD chip.  Several processors for security were built-in to these chips, including: encryption keying, certificates, privileged passwords.  This is what makes the AMD vulnerability so frightening.  It’s like disabling the part of your brain that reminds you to avoid danger, like running in front of a bus.  The good thing is that it is not as widely distributed as the Intel Spectre/Meltdown vulnerabilities, so patching should not take as long to perform.
Organisations must reduce their attack surface.  They can do so by visualizing their vulnerabilities, control endpoints, segment networks, and do analysis with every breath.  Today it is Spectre, Meltdown, or AMD PSP.  Tomorrow, it will be something else.  Security teams need to reduce their attack surface to wage war on their own terms, compress the field of battle and remove these opportunities for exploit.
Giovanni Vigna, CTO and co-founder at Lastline:
This is not as bad as Spectre and Meltdown, as a fix to the firmware code would solve the problem.
However, this shows how “getting security right” is really hard, also when hardware-based support is available.
Another example of a similar class of vulnerabilities was Boomerang:
https://www.cs.ucsb.edu/~vigna/publications/2017_NDSS_Boomerang.pdf

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweetShare
Previous Post

Welcome to WPA3, the next step in Wi-Fi security

Next Post

Technology at the Edge: Axis’ top 5 trends to shape 2018

Recent News

Laptop, phone, hands

Campaign Launched to Stop People From Becoming Money Mules

August 11, 2022
MIRACL is One Cybersecurity Company to Watch in 2022

MIRACL is One Cybersecurity Company to Watch in 2022

August 10, 2022
Hooded Torso

Unitree Robot Gun Carrying Dog Disabled by Remote Hacking Tool

August 10, 2022
black background, square. Infinity sign. META logo.

Meta Take Action Against Two Cyber Espionage Operations in South Africa

August 10, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information