Jump to content

Welcome to ExtremeHW

Welcome to ExtremeHW, like most online communities you must register to view or post in our community, but don't worry this is a simple free process that requires minimal information for you to signup. Be a part of ExtremeHW by signing in or creating an account.

  • Start new topics and reply to others
  • Subscribe to topics and forums to get email updates
  • Get your own profile page and make new friends
  • Send personal messages to other members.
  • Take advantage of site exclusive features.
IGNORED

AMD CPU Vulnerability in Chipset Affects Virtually All Ryzen Systems Running Windows


ENTERPRISE
 Share

Recommended Posts

Quote

ZeroPeril security researcher Kyriakos Economou has revealed that he has found a driver vulnerability in several AMD chipsets.

The bug allows attackers to extract information from RAM via the Platform Security Processor (PSP) in AMD CPUs. It seems to only apply to the Windows driver.

 

This allows sensitive information such as passwords to be stolen.

The PSP is AMD's take on Intel's SGX enclave and is the part of the memory that the processor entrusts with sensitive information.

When Windows communicates with the enclave, it does so through the kernel driver amdsps.sys

Source

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...

Important Information

This Website may place and access certain Cookies on your computer. ExtremeHW uses Cookies to improve your experience of using the Website and to improve our range of products and services. ExtremeHW has carefully chosen these Cookies and has taken steps to ensure that your privacy is protected and respected at all times. All Cookies used by this Website are used in accordance with current UK and EU Cookie Law. For more information please see our Privacy Policy