AMD Zen 3 Archives - TechGoing https://www.techgoing.com/tag/amd-zen-3/ Technology News and Reviews Wed, 03 May 2023 17:57:54 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.4 AMD Zen 2/3 Processor Vulnerabilities Exposed, Attack Costs $200 https://www.techgoing.com/amd-zen-2-3-processor-vulnerabilities-exposed-attack-costs-200/ Wed, 03 May 2023 17:57:47 +0000 https://www.techgoing.com/?p=93674 Network security experts from Berlin Technical University recently released a report, saying that the Trusted Platform Module (TPM) on the AMD platform has a vulnerability, and it can fully access encrypted data through a malicious TPM short-circuit attack. This means that hackers can completely compromise any application or encryption, including BitLocker, a password management tool […]

The post AMD Zen 2/3 Processor Vulnerabilities Exposed, Attack Costs $200 appeared first on TechGoing.

]]>
Network security experts from Berlin Technical University recently released a report, saying that the Trusted Platform Module (TPM) on the AMD platform has a vulnerability, and it can fully access encrypted data through a malicious TPM short-circuit attack.

This means that hackers can completely compromise any application or encryption, including BitLocker, a password management tool that relies exclusively on the TPM.

The researchers report that the vulnerability exists on the Platform Security Processor (PSP) in Zen 2 and Zen 3 processors, but the report does not mention whether Zen 4 also has the vulnerability.

The researchers published a list of codes and equipment required for the attack on GitHub, which cost about $200 (currently about RMB 1384), and the entire cracking process takes “several hours.”

The experts used a test laptop from Lenovo, and they physically connected the user device to the power supply, the BIOS SPI chip, and the SVI2 bus (power management interface). The attack targets the PSP security coprocessor present in Zen 2 and Zen 3 processors to obtain data that would allow the decryption of objects stored in the TPM. Successfully extracted “key”.

By default, BitLocker uses only TPM mechanisms to store keys, but users can assign a PIN that works with TPM-based mechanisms. This provides multiple layers of protection, but these PINs are not enabled by default and are vulnerable to brute-force attacks.

Intel processors are not affected, and AMD sent Tom’s Hardware the following statement:

  • AMD has learned from this Trusted Platform Module research report that it appears to exploit a related vulnerability previously discussed at ACM CCS 2021.
  • This requires an attack by physical means, usually outside the scope of processor architecture security mitigations.
  • We are continually innovating new hardware-based protections in future products to limit the efficacy of these technologies.
  • We are working hard to understand potential new threats and will provide updates and updates to our customers and end users in a timely manner.

The post AMD Zen 2/3 Processor Vulnerabilities Exposed, Attack Costs $200 appeared first on TechGoing.

]]>
AMD Ryzen 7 5800X3D Zen 3 encounters fatal bug, lights up for few seconds and disappears https://www.techgoing.com/amd-ryzen-7-5800x3d-zen-3-encounters-fatal-bug-lights-up-for-few-seconds-and-disappears/ Fri, 31 Mar 2023 06:51:17 +0000 https://www.techgoing.com/?p=84467 According to data, in some markets, AMD’s best-selling processor is the Ryzen 7 5800X3D. Because of the massive cache design and the good reputation of Zen3, it has become the most cost-effective game god U. However, the German god Igor’s Lab accidentally discovered that there is a bug in the overclocking software of MSI Center, […]

The post AMD Ryzen 7 5800X3D Zen 3 encounters fatal bug, lights up for few seconds and disappears appeared first on TechGoing.

]]>
According to data, in some markets, AMD’s best-selling processor is the Ryzen 7 5800X3D. Because of the massive cache design and the good reputation of Zen3, it has become the most cost-effective game god U. However, the German god Igor’s Lab accidentally discovered that there is a bug in the overclocking software of MSI Center, ASUS, Gigabyte and even ASRock, which allows the Ryzen 7 5800X3D to be overclocked and boosted almost instantly. Let the processor hang up.

It stands to reason that for the standard version of the Ryzen 5000X, 1.3~1.4V is considered a safe voltage, but the problem is that the design of the Ryzen 7 5800X3D is different. After being superimposed on the 96MB L3 cache, the heat dissipation is limited. The frequency is very conservative, and the limit voltage is lowered from 1.5V to 1.35V.

According to the test, these third-party software allows unlimited frequency modulation of Ryzen 7 5800X3D overload, such as 1.55V, 80 times (8GHz), the final result can be imagined.

There is a view that in addition to updating the third-party software, the 3D cache version of AMD Ryzen (including Ryzen 7000X3D) should be identified and overclocked safely. At the same time, AMD should also update the AGESA microcode as soon as possible to prevent the above-mentioned Phenomenon.

The post AMD Ryzen 7 5800X3D Zen 3 encounters fatal bug, lights up for few seconds and disappears appeared first on TechGoing.

]]>