AMD Chipset Driver Vulnerability Can Allow Hackers to Obtain Sensitive Data
Chipmaker AMD has patched a driver vulnerability that could allow an attacker to obtain sensitive information from the targeted system.
The flaw, tracked as CVE-2021-26333 and classified by AMD as medium severity, affects the company’s Platform Security Processor (PSP) chipset driver, which is used by several graphics cards and processors.
According to AMD, which described it as an information disclosure issue, an attacker who has low privileges on the targeted system can “send requests to the driver resulting in a potential data leak from uninitialized physical pages.”
AMD has advised users to update the PSP driver to version 188.8.131.52 through Windows Update or update the Chipset Driver to version 3.08.17.735.
Kyriakos Economou, co-founder of cybersecurity research and development company ZeroPeril, has been credited for discovering the vulnerability. In a technical advisory detailing the findings, the researcher noted that attacks are possible due to information disclosure and memory leakage bugs.
He claims that an attacker could leverage the vulnerability to obtain registry key mappings containing NTLM hashes of authentication credentials, or to obtain data that could be useful for bypassing exploit mitigations such as Kernel Address Space Randomization (KASLR).
“For example, [the NTLM hashes] can be used to steal credentials of a user with administrative privilege and/or be used in pass-the-hash style attacks to gain further access inside a network” the advisory reads.
Economou also noted that AMD’s list of impacted products may be incomplete. The vulnerability has been confirmed to impact Ryzen 2000 and 3000 series CPUs, which are currently not mentioned in AMD’s advisory.