Chipmaker, Advanced Micro Devices (AMD), has said it plans to release patches to fix some of the flaws in its microprocessors recently pointed out by CTS Labs.
Israeli cyber security research firm, CTS Labs, said in a report released earlier this month that potential attackers would need administrative access to exploit the reported vulnerabilities.
"Any attacker gaining unauthorised administrative access would have a wide range of attacks at their disposal well beyond the exploits identified in this research," the chipmaker said on Tuesday.
Two days before the research was made public, short selling of AMD's stock increased by about 15 million shares, according to S3 Partners, a financial analytics firm.
CTS executives said that they shared their findings with some clients who pay the firm for proprietary research on vulnerabilities in computer hardware.
The little-known Israeli security firm claimed in mid-March that AMD's Ryzen and Epyc architectures were subject to major exploitable flaws. AMD said at the time it hadn’t had time to confirm or deny the claims.
Researchers said they had discovered serious potential vulnerabilities within AMD’s Ryzen and Epyc chip architectures.
CTS-Labs said it had discovered four potential attacks, code-named Masterkey, Ryzenfall, Fallout, and Chimera, all of which would require a program running with local access and administrator privileges to exploit them.
However, the cyber security research firm claimed it had been able to exploit the vulnerabilities it found on several Ryzen chips, but stressed that no potential attack had been seen in the wild.
(Reporting by Laharee Chatterjee in Bengaluru; Editing by Sriraj Kalluvila; with Mark Hachman, PC World (US))