AMD’s SEV Security Scramble: $10 Hack Exposes Virtual Machine Vulnerability!
AMD Secure Encrypted Virtualization (SEV) can be bypassed with a mere $10 of hardware, thanks to the BadRAM attack. Researchers used a Raspberry Pi Pico and other components to manipulate memory, exposing secrets and undermining SEV’s integrity. This pokes fun at AMD’s touted security, leaving cloud providers scratching their heads.

Hot Take:
Who knew that a $10 Raspberry Pi could turn into a master spy, sneaking past AMD’s high-tech defenses like a ninja in the night? It’s like discovering your fancy, high-security vault can be picked with a toothpick. AMD might want to rethink their security strategy or invest in some raspberry jam to catch those fruity hackers in the act.
Key Points:
- Researchers from several universities discovered a vulnerability in AMD’s SEV-SNP.
- The attack, dubbed “BadRAM,” uses inexpensive hardware to bypass memory security.
- BadRAM requires physical access but could potentially be executed remotely on unlocked memory modules.
- AMD’s vulnerability is cataloged as CVE-2024-21944 and AMD-SB-3015.
- AMD plans to release an advisory and firmware updates to address the issue.
Already a member? Log in here
