AMD reports that AMD Zen 3 processors are vulnerable to side-channel attacks and advises owners…
Windows relies on the amdsps.sys kernel driver to communicate with PSP enclaves, and researchers at ZeroPeril write that they have found a number of problems with it. During testing, they were able to retrieve several gigabytes of uninitialized physical pages, and the content of those pages ranged from kernel objects and arbitrary pool addresses that could be used to bypass KASLR, extract NTLM hashes and user authentication credentials.
Experts successfully tested the exploitation of the CVE-2021-26333 vulnerability on AMD Ryzen 2000 and 3000 series processors before reporting the issue to the manufacturer in April this year.
When Microsoft released the patches as part of the September Patch Tuesday, AMD posted a message urging users to install the updates as soon as possible, as they also contain patches for the PSP chipset driver.
According to the company, the vulnerability threatens the following processors:
Let me remind you that we wrote that AMD Zen 3 processors are vulnerable to side-channel attacks.
Kurlibat.xyz is a site that tries to trick you into clik to its browser notifications…
Initiateintenselyrenewedthe-file.top is a domain that tries to trick you into clik to its browser notifications…
Wotigorn.xyz is a site that tries to force you into subscribing to its browser notifications…
Initiateintenselyprogressivethe-file.top is a domain that tries to force you into clik to its browser notifications…
Nuesobatoxylors.co.in is a domain that tries to trick you into subscribing to its browser notifications…
Helistym.xyz is a site that tries to force you into clik to its browser notifications…