Skip to content Skip to footer
0 items - $0.00 0

Zentool – AMD Zen Microcode Manipulation Utility by taviso

Zentool – AMD Zen Microcode Manipulation Utility by taviso

Zentool – AMD Zen Microcode Manipulation Utility by taviso

9 Comments

  • Post Author
    p1mrx
    Posted March 5, 2025 at 10:28 pm

    > You can use the `resign` command to compensate for the changes you made:

    How does that work? Did someone figure out AMD's private keys?

  • Post Author
    dzdt
    Posted March 5, 2025 at 10:35 pm

    The blog post that explains the exploit and how this whole thing works is at https://bughunters.google.com/blog/5424842357473280/zen-and-…

  • Post Author
    BonusPlay
    Posted March 5, 2025 at 10:48 pm

    Both AMD and Google note, that Zen[1-4] are affected, but what changed about Zen5? According to the timeline, it released before Google notified AMD [1].

    Is it using different keys, but same scheme (and could possibly be broken via side-channels as noted in the article)? Or perhaps AMD notices something and changed up the microcode? Some clarification on that part would be nice.

    [1] https://github.com/google/security-research/security/advisor…

  • Post Author
    mkj
    Posted March 5, 2025 at 11:04 pm

    Was the microcode signing scheme documented by AMD, or did the researchers have to reverse engineer it somehow? I couldn't see a mention in the blog post.

  • Post Author
    transpute
    Posted March 6, 2025 at 1:07 am

    This is not the first case of accidental reuse of example keys in firmware signing, https://kb.cert.org/vuls/id/455367

    Would it be useful to have a public list of all example keys that could be accidentally used, which could be CI/CD tested on all publicly released firmware and microcode updates?

    If there was a public test suite, Linux fwupd and Windows Update could use it for binary screening before new firmware updates are accepted for distribution to endpoints.

  • Post Author
    dtgriscom
    Posted March 6, 2025 at 2:46 am

    Are there any examples of using this for non-nefarious reasons? For instance, could I add new instructions that made some specific calculation faster?

  • Post Author
    amluto
    Posted March 6, 2025 at 3:03 am

    Something worth noting:

    CPUs have no non-volatile memory — microcode fully resets when the power is cycled. So, in a sensible world, the impact of this bug would be limited to people temporarily compromising systems on which they already had CPL0 (kernel) access. This would break (possibly very severely and maybe even unpatchably) SEV, and maybe it would break TPM-based security if it persisted across a soft reboot, but would not do much else of consequence.

    But we do not live in a sensible world. The entire UEFI and Secure Boot ecosystem is a complete dumpster fire in which the CPU, via mechanisms that are so baroque that they should have been disposed of in, well, the baroque era, enforces its own firmware security instead of delegating to an independent coprocessor. So the actual impact is that getting CPL0 access to an unpatched system [0] will allow a complete compromise of the system flash, which will almost certainly allow a permanent, irreversible compromise of that system, including persistent installation of malicious microcode that will pretend to be patched. Maybe a really nice Verified Boot (or whatever AMD calls its version) implementation would make this harder. Maybe not.

    (Okay, it's not irreversible if someone physically rewrites the flash using external hardware. Good luck.)

    [0] For this purpose, "unpatched" means running un-fixed microcode at the time at which CPL0 access is gained.

  • Post Author
    nomercy400
    Posted March 6, 2025 at 7:08 am

    Wow, so providing a tool for bypassing the protection mechanism of a device (cpu) is accepted when it comes from google?

    Try this on any game console or drm protected device ans you are DMCAed before you know it.

  • Post Author
    nomercy400
    Posted March 6, 2025 at 7:09 am

    Doesn't changing how your cpu's microcode works mean you can bypass or leak all kinds of security measures and secrets?

Leave a comment

In the Shadows of Innovation”

© 2025 HackTech.info. All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.