James

AMD Epyc and Ryzen Pro have SEV vulnerability

Recommended Posts

The AMD Epyc server chips, and processors from the Ryzen Pro line have an encryption feature called Secure Encrypted Virtualization (SEV).

In theory the SEV is protected by encryption on the fly. However the page-wise encryption lacks integrity protection. An adjacent host-level administrator can craft a web environment that returns plaintext of memory locations. By observing encrypted usage of the memory locations by the target user it is possible to identify and then re-map the memory to a new user.

Fraunhofer AISEC researchers Mathias Morbitzer, Manuel Huber, Julian Horsch and Sascha Wessel have published their findings at https://arxiv.org/pdf/1805.09604.pdf

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now