- Sep 28, 2005
- 20,895
- 3,247
- 126
AMD TPM Exploit: faulTPM Attack Defeats BitLocker and TPM-Based Security (Updated)
Zen 2 and Zen 3 are vulnerable to voltage glitching.
www.tomshardware.com
Found on Zen2 and Zen3.
Unknown yet on Zen4.
Costs about $200 to attack AMD PSP (Platform Security Processor)
Method of attack:
Backup the BIOS flash image using an SPI flash programmer
Connect the fault injection hardware and determine the attack parameters (4.1)
Compile & deploy the payload extracting the key derivation secret (4.3)
Start the logic analyzer to capture the extracted key derivation secrets via SPI
Start the attack cycle on the target machine until the payload was executed successfully
Parse & decrypt the NVRAM using the BIOS ROM backup and payload output with amd-nv-tool
Extract and decrypt TPM objects protected by this fTPM with amd ftpm unseal
Things aren't looking good for AMD this year.
Last edited: