AMD VM security tools can be bypassed, letting hackers infilitrate your devices, experts warn

0
1


  • University researchers find way to trick AMD’s secure VM tech into sharing sensitive information
  • AMD released a security advisory with recommended mitigations
  • The bug requires physical access, but in some scenarios could be abused through software alone

AMD Virtual Machine (VM) security tools can be bypassed, allowing cybercriminals to infiltrate devices and steal sensitive data, experts have warned.

Security researchers from multiple universities in the EU and the UK outlined how AMD chips come with Secure Encrypted Virtualization (SEV), a security feature designed to encrypt virtual machine (VM) memory to protect it from unauthorized access, including by the hypervisor or other VMs. SEV uses hardware-based encryption keys unique to each VM, ensuring data remains confidential and tamper-proof even in shared environments.

LEAVE A REPLY

Please enter your comment!
Please enter your name here