CVE-2021-46757

7.8 HIGH

📋 TL;DR

This AMD Secure Processor vulnerability allows a malicious Trusted Application (TA) to read from or write to the ASP Secure OS kernel virtual address space due to insufficient memory buffer checking. This could lead to privilege escalation within the secure processor environment. Systems using affected AMD processors with ASP technology are vulnerable.

💻 Affected Systems

Products:
  • AMD processors with AMD Secure Processor (ASP) technology
Versions: Specific affected processor models and firmware versions listed in AMD-SB-5001
Operating Systems: All operating systems running on affected AMD processors
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the AMD Secure Processor firmware, not the host operating system. Requires ASP technology to be present and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the AMD Secure Processor environment, allowing attackers to bypass security boundaries, execute arbitrary code with kernel privileges, and potentially access sensitive secure data.

🟠

Likely Case

Privilege escalation within the ASP Secure OS, allowing a malicious TA to gain kernel-level access and potentially compromise other TAs or secure operations.

🟢

If Mitigated

Limited impact if proper isolation between TAs is maintained and malicious TAs cannot be loaded onto the system.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the system and a malicious TA to be loaded, making direct internet exploitation unlikely.
🏢 Internal Only: MEDIUM - Requires an attacker with local system access and ability to load a malicious TA, which could occur through compromised administrative access or supply chain attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires loading a malicious Trusted Application onto the AMD Secure Processor, which typically requires administrative/privileged access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AMD firmware updates as specified in AMD-SB-5001

Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001

Restart Required: Yes

Instructions:

1. Check AMD-SB-5001 for affected processor models. 2. Obtain firmware updates from system/motherboard manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot system to activate new firmware.

🔧 Temporary Workarounds

Disable AMD Secure Processor

all

Disable ASP functionality in BIOS/UEFI settings to remove the vulnerable component

Restrict TA loading

all

Implement policies to prevent unauthorized Trusted Applications from being loaded onto the ASP

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from loading Trusted Applications
  • Monitor for suspicious TA loading activities and maintain detailed audit logs of ASP operations

🔍 How to Verify

Check if Vulnerable:

Check processor model against AMD-SB-5001 list and verify current firmware version

Check Version:

On Linux: 'sudo dmidecode -t processor' or check BIOS/UEFI version; On Windows: Check System Information or manufacturer tools

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in AMD-SB-5001

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Trusted Application loading events
  • ASP firmware version changes
  • System firmware update logs

Network Indicators:

  • No network-based indicators as this is a local firmware vulnerability

SIEM Query:

Search for firmware update events or unauthorized system configuration changes related to AMD Secure Processor

🔗 References

📤 Share & Export