A team of security researchers with Cornell University have demonstrated a proof of concept attack on AMD’s Secure Encrypted Virtualization (SEV) technology, leveraging the Zen-integrated AMD Secure Processor (AMD-SP) to achieve full system access.
The technique requires physical access to the AMD system and is based on a voltage glitching attack that allows a bad actor to actually deploy custom SEV firmware, which would, in turn, allow the decryption of all Virtual Machine (VM)-bound information. The vulnerability is executable on Zen 1 through Zen 3. Previously, part of AMD’s claim to fame was that Zen 2 and Zen 3 were free from any vulnerabilities of this kind.
TL;DR — Plundervolt × SEV, fault injection в AMD Secure Processor через программную регулировку напряжения и потом получение полного контроля над AMD SEV (технология конфиденциальной виртуализации).