In a surprising revelation, researchers from the University of Lübeck, KU Leuven, and the University of Birmingham have discovered a vulnerability in AMD’s Secure Encrypted Virtualization (SEV) technology. This technology, designed to protect processor memory in virtual machine environments, can be exploited using a simple and cost-effective method.
The attack, known as “BadRAM,” involves tricking the CPU into believing it has more memory than it actually does by using a rogue memory module. By manipulating the serial presence detect (SPD) chip in the memory module to misreport the amount of onboard memory during boot-up, the researchers were able to access the encrypted memory contents stored on the processor.
Using a test rig consisting of a Raspberry Pi Pico and a DIMM socket, the researchers demonstrated how the attack could be carried out with minimal resources. The Raspberry Pi Pico, which costs just a few dollars, was used to manipulate the SPD chip and create a “ghost” space where the supposedly secure memory contents could be written.
This vulnerability raises concerns about the security of AMD’s SEV technology and the potential for malicious actors to gain unauthorized access to sensitive data in virtual machine environments. The researchers have brought this issue to light in order to prompt AMD to address the vulnerability and enhance the security of their processor memory protection mechanisms.
As virtualization becomes increasingly prevalent in modern computing environments, ensuring the integrity and confidentiality of data stored in virtual machines is crucial. AMD’s SEV technology was designed to provide an additional layer of security by encrypting memory contents and protecting them from unauthorized access. However, the discovery of the “BadRAM” attack highlights the need for ongoing research and development to identify and mitigate potential vulnerabilities in security technologies.
In response to this discovery, AMD is expected to investigate the vulnerability and work towards releasing patches or updates to mitigate the risk of exploitation. In the meantime, users of AMD processors should exercise caution when handling sensitive data in virtualized environments and take steps to secure their systems against potential threats.
Overall, the “BadRAM” attack serves as a reminder of the constant cat-and-mouse game between security researchers and threat actors. As technology continues to evolve, so too must our approach to cybersecurity to stay one step ahead of those seeking to exploit vulnerabilities for malicious purposes.

