AMD Chips in Hot Water: New Side-Channel Attack Threat Looms

AMD is warning users about the Transient Scheduler Attack (TSA), a side-channel attack affecting various AMD chips. While rated low to medium in severity, experts still consider the threat critical. The attack requires complex execution, needing an attacker to run arbitrary code on a machine, but could lead to data leaks.

Pro Dashboard

Hot Take:

Move over, Meltdown and Spectre, there’s a new villain in town, and it goes by the name of Transient Scheduler Attack (TSA). AMD’s chips are getting a side-channel sneak peek, but don’t worry, this isn’t a Marvel-level threat. It’s more like a well-behaved cat burglar who needs explicit permission to enter your house and still struggles to find the silverware. But hey, better safe than sorry, so patch those chips and show TSA the exit!

Key Points:

  • AMD warns about Transient Scheduler Attack (TSA) affecting its chips.
  • Four vulnerabilities discovered, with two rated medium and two low severity.
  • Despite low severity ratings, TSA deemed “critical” by Trend Micro and CrowdStrike.
  • Attack requires running arbitrary code on target machine with local access.
  • AMD chips affected include EPYC, Ryzen, Instinct, and Athlon-series.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?