AMD’s Zen 3 & Zen 2 CPUs Now Vulnerable To “Zenhammer”, Prompting Memory Leakage

AMD’s Zen 3 & Zen 2 CPUs Now Vulnerable To “Zenhammer”, Prompting Memory Leakage

 0
AMD’s Zen 3 & Zen 2 CPUs Now Vulnerable To “Zenhammer”, Prompting Memory Leakage
AMD's Zen 3 & Zen 2 CPUs Now Vulnerable To "Zenhammer", Prompting Memory Leakage 1

AMD's Zen platform is reportedly vulnerable to Rowhammer attacks, as revealed in new research by ETH Zurich, affecting the usability of DRAM.

Rowhammer is quite an old vulnerability, initially discovered in 2014 through collaborative research by Carnegie Mellon University and Intel. This breach affects your DRAM's contents by prompting an electric leakage in memory cells, potentially flipping the bits present to corrupt the data in the memory. Moreover, it could also lead to intruders getting access to sensitive information, and the vulnerability has expanded to AMD's Zen systems, which is why it is labeled as "Zenhammer" now.

Independent researchers from ETH Zurich have found a way to disrupt your memory contents through the Rowhammer implementation, by flipping the bits in DDR4 memory mounted in Zen 2 and Zen 3 systems. Here is how they were able to do it:

ZenHammer reverse engineers DRAM addressing functions despite their non-linear nature, uses specially crafted access patterns for proper synchronization, and carefully schedules flush and fence instructions within a pattern to increase the activation throughput while preserving the access order necessary to bypass in-DRAM mitigations.

- ETH Zurich via The Register

The research showed that AMD systems were vulnerable, similar to how Intel-based systems are, and after successfully exploiting the secret DRAM address functions, the researchers were able to adjust the timing routine and, through extensive tests, were able to integrate Rowhammer's effects into the systems, flipping the memory contents in both Zen 2 and Zen 3 systems. While this situation is alarming for relatively old AMD consumers, Team Red has responded quickly to the problem and released a security brief to address it.

AMD continues to assess the researchers’ claim of demonstrating Rowhammer bit flips on a DDR5 device for the first time. AMD will provide an update upon completion of its assessment.

AMD microprocessor products include memory controllers designed to meet industry-standard DDR specifications. Susceptibility to Rowhammer attacks varies based on the DRAM device, vendor, technology, and system settings. AMD recommends contacting your DRAM or system manufacturer to determine any susceptibility to this new variant of Rowhammer.

AMD also continues to recommend the following existing DRAM mitigation to Rowhammer-style attacks, including:

  • Using DRAM supporting Error Correcting Codes (ECC)
  • Using memory refresh rates above 1x
  • Disabling Memory Burst/Postponed Refresh
  • Using AMD CPUs with memory controllers that support a Maximum Activate Count (MAC) (DDR4) 1st Gen AMD EPYC™ Processors formerly codenamed “Naples" 2nd Gen AMD EPYC™ Processors formerly codenamed “Rome" 3rd Gen AMD EPYC™ Processors formerly codenamed “Milan"
  • 1st Gen AMD EPYC™ Processors formerly codenamed “Naples"
  • 2nd Gen AMD EPYC™ Processors formerly codenamed “Rome"
  • 3rd Gen AMD EPYC™ Processors formerly codenamed “Milan"
  • Using AMD CPUs with memory controllers that support Refresh Management (RFM) (DDR5) 4th Gen AMD EPYC™ Processors formerly codenamed “Genoa"
  • 4th Gen AMD EPYC™ Processors formerly codenamed “Genoa"
  • For users particularly concerned with Zenhammer, we advise them to implement mitigations suggested by Team Red themselves to stay safe from the vulnerability. Meanwhile, the company is working on assessing the situation and providing a more extensive update.

    News Sources: The Register, Comsec

    What's Your Reaction?

    like

    dislike

    love

    funny

    angry

    sad

    wow