News Another AMD Zen 'Secure Encrypted Virtualization' Vulnerability Demonstrated by Researchers

jgraham11

Distinguished
Jan 15, 2010
48
14
18,535
0
Not only do you need physical access you must of modified the motherboard to vary the voltage being supplied to the processor. This article is misleading in that the motherboard voltage modulation is required and brushed over and only physical access is stated which is not the same as having server covers removed and the soldering iron is out... I don't think this is much of a real threat.

Not even in the same realm as Intel bugs, some can be executed just by visiting a website. Keep your systems updated!
 

USAFRet

Titan
Moderator
Mar 16, 2013
147,469
9,352
175,390
23,026
Not even in the same realm as Intel bugs, some can be executed just by visiting a website. Keep your systems updated!
And the theoretical drive by for the Intel was also vastly overrated.
We only see this several years after the thing became public.

 

escksu

Respectable
Aug 8, 2019
491
177
1,860
0
Not only do you need physical access you must of modified the motherboard to vary the voltage being supplied to the processor. This article is misleading in that the motherboard voltage modulation is required and brushed over and only physical access is stated which is not the same as having server covers removed and the soldering iron is out... I don't think this is much of a real threat.

Not even in the same realm as Intel bugs, some can be executed just by visiting a website. Keep your systems updated!
You dont need a modified motherboard to vary voltage today. All boards are able to control the clockspeed and voltage on both BIOS and OS level. Physcial access. Again, its not that difficult because administrators arent the only threats. You still need people to service your servers, racks (Eg. wiring, hardware replacement). Even server rooms (eg. lights, aircondition, ducts servicing).
 

ASK THE COMMUNITY

TRENDING THREADS