Data: CASIE
Negative Trigger
within
a
few
weeks
and
AMD
device
owners
shouldn
’
t
worry
about
the reported flaws
Vulnerability-related.DiscoverVulnerability
.
AMD
is addressing
Vulnerability-related.PatchVulnerability
several
vulnerabilities
discovered
Vulnerability-related.DiscoverVulnerability
in
its
Ryzen
and
EPYC
chips
,
and
rolling out
Vulnerability-related.PatchVulnerability
updates
for
millions
of
devices
``
in
the
coming
weeks
.
''
The
13
vulnerabilities
came to public
Vulnerability-related.DiscoverVulnerability
attention
clouded
in
controversy
.
The
security
company
CTS
Labs
gave
AMD
less
than
24
hours
notice
before
releasing
the
information
to
the
public
.
Standard
vulnerability
disclosure
Vulnerability-related.DiscoverVulnerability
practices
call
for
giving
companies
at
least
90
days
'
notice
so
they
can fix
Vulnerability-related.PatchVulnerability
the
flaws
before
researchers
go public
Vulnerability-related.DiscoverVulnerability
and
hackers
can
start
causing
trouble
.
Had
CTS
Labs
given
AMD
that
same
courtesy
,
the
issues
would
have been addressed
Vulnerability-related.PatchVulnerability
within
a
week
of
the
notification
.
``
Each
of
the
issues
cited
can
be
mitigated
Vulnerability-related.PatchVulnerability
through
firmware
patches
and
a
standard
BIOS
update
,
which
we
plan
to
release
Vulnerability-related.PatchVulnerability
in
the
coming
weeks
,
''
said
Sarah
Youngbauer
,
AMD
's
senior
spokeswoman
.
``
We
believe
this
provides
a
good
example
of
why
the
more
standard
90-day
notification
window
for
such
notifications
exist
.
''
In
the original vulnerability report
Vulnerability-related.DiscoverVulnerability
,
CTS
Labs
said
that
it
would
take
``
several
months
''
to
fix
Vulnerability-related.PatchVulnerability
the
issues
and
that
some
hardware
flaws
``
cannot be fixed
Vulnerability-related.PatchVulnerability
.
''
AMD
disagreed
with
that
timeline
,
and
said
it
would
provide
more
information
in
several
weeks
.
The
chipmaker
said
the
issues
were
not
with
its
hardware
,
but
with
firmware
,
or
software
that
's
embedded
in
hardware
.
It
'll
be sending
Vulnerability-related.PatchVulnerability
fixes
for
all
13
vulnerabilities
through
patches
and
BIOS
updates
.
According
to
AMD
's
technical
assessment
,
each
of
the
flaws
required
administrative
access
.
``
Any
attacker
gaining
unauthorized
administrative
access
would
have
a
wide
range
of
attacks
at
their
disposal
well
beyond
the
exploits
identified
in
this
research
,
''
Papermaster
said
in
a
statement
.
Critics
also
took
issue
with
another
aspect
of
the
CTS
Labs
report
,
pointing
out
the
legal
disclaimer
on
the
company
's
website
:
``
You
are
advised
that
we
may
have
,
either
directly
or
indirectly
,
an
economic
interest
in
the
performance
of
the
securities
of
the
companies
whose
products
are
the
subject
of
our
reports
.
''
Last
Wednesday
,
CTS
Labs
'
chief
financial
officer
and
co-founder
,
Yaron
Luk-Zilberman
,
a
former
hedge
fund
manager
,
said
it
did
n't
have
``
any
investment
(
long
or
short
)
in
Intel
or
AMD
.
''
A
security
researcher
has published
Vulnerability-related.DiscoverVulnerability
details
of
a
vulnerability
in
a
popular
cloud
storage
drive
after
the
company
failed to issue
Vulnerability-related.PatchVulnerability
security
patches
for
over
a
year
.
Remco
Vermeulen
found
Vulnerability-related.DiscoverVulnerability
a
privilege
escalation
bug
in
Western
Digital
’
s
My
Cloud
devices
,
which
he
said
Vulnerability-related.DiscoverVulnerability
allows
an
attacker
to
bypass
the
admin
password
on
the
drive
,
gaining
“
complete
control
”
over
the
user
’
s
data
.
The
exploit
works
because
drive
’
s
web-based
dashboard
doesn
’
t
properly
check
a
user
’
s
credentials
before
giving
a
possible
attacker
access
to
tools
that
should
require
higher
levels
of
access
.
The
bug
was
“
easy
”
to
exploit
,
Vermeulen
told
TechCrunch
in
an
email
,
and
was
remotely
exploitable
if
a
My
Cloud
device
allows
remote
access
over
the
internet
—
which
thousands
of
devices
do
.
He
posted
a
proof-of-concept
video
on
Twitter
.
Details
of
the
bug
were
also
independently
found
Vulnerability-related.DiscoverVulnerability
by
another
security
team
,
which
released
its
own
exploit
code
.
Vermeulen
reported
Vulnerability-related.DiscoverVulnerability
the
bug
over
a
year
ago
,
in
April
2017
,
but
said
the
company
stopped
responding
.
Normally
,
security
researchers
give
90
days
for
a
company
to
respond
,
in
line
with
industry-accepted
responsible
disclosure
guidelines
.
After
he
found
Vulnerability-related.DiscoverVulnerability
that
WD
updated
Vulnerability-related.PatchVulnerability
the
My
Cloud
firmware
in
the
meanwhile
without fixing
Vulnerability-related.PatchVulnerability
the
vulnerability
he
found
Vulnerability-related.DiscoverVulnerability
,
he
decided
to
post
Vulnerability-related.DiscoverVulnerability
his
findings
.
A
year
later
,
WD
still
hasn’t released
Vulnerability-related.PatchVulnerability
a
patch
.
The
company
confirmed
Vulnerability-related.DiscoverVulnerability
that
it
knows
Vulnerability-related.DiscoverVulnerability
of
the
vulnerability
but
did
not
say
why
it
took
more
than
a
year
to
issue
Vulnerability-related.PatchVulnerability
a
fix
.
“
We
are
in
the
process
of
finalizing
a
scheduled
firmware
update
that
will resolve
Vulnerability-related.PatchVulnerability
the
reported
issue
,
”
a
spokesperson
said
,
which
will arrive
Vulnerability-related.PatchVulnerability
“
within
a
few
weeks.
”
WD
said
Vulnerability-related.DiscoverVulnerability
that
several
of
its
My
Cloud
products
are vulnerable
Vulnerability-related.DiscoverVulnerability
—
including
the
EX2
,
EX4
and
Mirror
,
but
not
My
Cloud
Home
.
In
the
meantime
,
Vermeulen
said
that
there
’
s
no
fix
and
that
users
have
to
“
just
disconnect
”
the
drive
altogether
if
they
want
to
keep
their
data
safe
.