Cloud Security, Vulnerability Management

Researchers uncover AMD chip flaw threatening cloud data

Shift Left

Security researchers have identified a vulnerability in AMD processors that they have dubbed badRAM and which could allow threat actors with physical access to cloud computing environments to bypass encryption protections, reports The Record, a news site by cybersecurity firm Recorded Future.

The flaw circumvents AMD’s Secure Encrypted Virtualization, which encrypts virtual machine memory to safeguard cloud customer data, by tampering with the Serial Presence Detect chip on memory modules using hardware that can cost under $10. The technique involves forcing the memory module to provide incorrect information about its size so that attackers can trick the processor into exposing encrypted memory regions.

"This leads to two CPU addresses mapping to the same DRAM location. And through these aliases, attackers can bypass CPU memory protections, exposing sensitive data or causing disruptions," said researcher David Oswald. "The whole AMD security technology is built on the assumption that there is no aliasing." While exploiting this flaw requires physical access, researchers warned that malicious insiders, corrupt employees, or law enforcement with access to cloud hardware could leverage it. AMD has released firmware updates and recommends using memory modules with locked SPD chips alongside physical security measures. The research found no evidence of the vulnerability being exploited in the wild.

An In-Depth Guide to Cloud Security

Get essential knowledge and practical strategies to fortify your cloud security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds