Chipmaker AMD has sectioned a driver vulnerability that could allow an attacker to obtain sensitive information from the targeted system.
The flaw, tracked as CVE-2021-26333 and classified by AMD as centre severity, affects the company’s Platform Security Processor (PSP) chipset driver, which is used by several graphics cards and processors.
According to AMD, which painted it as an information disclosure issue, an attacker who has low privileges on the targeted system can “send requests to the driver resulting in a potential data leak from uninitialized corporal pages.”
AMD has advised users to update the PSP driver to version 22.214.171.124 through Windows Update or update the Chipset Driver to version 3.08.17.735.
Kyriakos Economou, co-founder of cybersecurity inquiry and development company ZeroPeril, has been credited for discovering the vulnerability. In a technical advisory detailing the findings, the researcher noted that attacks are realizable due to information disclosure and memory leakage bugs.
He claims that an attacker could leverage the vulnerability to obtain registry key mappings containing NTLM hashes of authentication credentials, or to be customary data that could be useful for bypassing exploit mitigations such as Kernel Address Space Randomization (KASLR).
“For example, [the NTLM hashes] can be worn to steal credentials of a user with administrative privilege and/or be used in pass-the-hash style attacks to gain further access inside a network” the admonitory reads.
Economou also noted that AMD’s list of impacted products may be incomplete. The vulnerability has been confirmed to impact Ryzen 2000 and 3000 series CPUs, which are currently not touch oned in AMD’s advisory.
Related: Voltage Glitching Attack on AMD Chips Poses Risk to Cloud Environments
Related: AMD Unveils New Security Features With Start off of EPYC 7003 Series Processors
Related: AMD Confirms Hacker Stole Information on Graphics Products
Related: Multiple Vulnerabilities Found in AMD ATI Radeon Graphics Dance-cards