Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

im guessing not, but does this affect AMD CPUs/chipsets?


No. The ultimate potential of this attack is the complete compromise of all Intel signing authorities over affected models. Naturally, that signing key does not have any value on AMD systems, nor can this vulnerability in itself be used on them.


I figured as much. thanks!


update - it has now been confirmed that the T2 chip is vulnerable to the checkm8 vulnerability which made version-agnostic jailbreaks available for all iOS devices up to A11 CPUs. So, it would seem that Apple is only slightly in a better position.

AFAIK, the Secure Enclave stores the actual disk encryption keys and Touch ID data, so that should be safe. But the secure boot validation, firmware password, startup security policy, etc. can now be bypassed (once a full exploit to do so is written). Also, it is quite possible that the Intel ME and UEFI firmware validation can be bypassed by simply disabling that part of the T2's bridgeOS code.


IN addition to what's been said below, the early boot process is totally different on AMD. They've got a little ARM core called the PSP babysitting the main core complex(es).


That's not that different. The PSP is basically AMD's ME.


Yes, but the way it boots and is hooked into the system is completely and totally different than ME.

It fulfills the same abstract purpose, but that's where the similarities end.


So there is a different piece that can be inspected for it's own vulnerabilities, that probably does not get as much scrutiny because the hardware isn't as popular.

That's not a criticism per se, I am sure it's hard to design these things securely and without bugs.


Totally, although it's under a ton of scrutiny from the PS4 folks where the Platform Security Processor is known as SAMU, and holds most of the decryption keys for the rest of the system including all executables.

Right now the only attacks I know of treat it as a decryption oracle, but it'd be nice to not have to pre decrypt programs on a real PS4 for cases like archiving and emulation.


> it'd be nice to not have to pre decrypt programs on a real PS4 for cases like archiving and emulation

I'm no expert, but that would be the only legal way of archiving these programs, no?


Eh, the legality is pretty orthogonal.

Using it as a decryption oracle involves enough circumvention in the first place that you might already be running afoul of the DMCA if that applies to you.

Meanwhile, institutions that are given more legal carte blanche like Archive.org would probably prefer to have the decryption keys in case there comes a point where they have access to encrypted binaries, but PS4s to decrypt with have become hard to find, or keys are rotated to the point where new applications exist that require a firmware version that aren't subject to the same decryption oracle attacks.

<And, not a lawyer>




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: