The physical damage potential is apparent when looking at the
ASM1142 Datasheet:
1. Enable/Disable Over current protection.
2. PCIE port power - can be set over spec.
3. The ASM1142 is the Battery charge controller.
The ASM1142 handles Normal and Suspend power regulation, set by flipping some registers. Battery charging can be allowed to overcharge or apply unsafe voltages causing battery swelling or explosion.
On page 27 of the ASM1142 datasheet it implicitly states that setting parameters over recommended will cause permanent damage to the ASMedia host controller.
Nope, the chip that is hacked is the power management/PCIE/USB controller. Failsafes for OVC and OCP are programmable.
He kinda screws up though... like the rest of the media.
You can't complain about how shady the outfit is for releasing the news "too quickly" and in the same breath shame them for not having a proof-of-concept or exploit code available as proof of viability (4:15). And really, they do have the source code as they have confirmed it with a reputable security outfit "Trail of Bits" - which he fails to mention.
He misses the whole point about the BIOS (as does his "security friends") It's not that if you just have local Admin access you could flash a BIOS... the BIOS has to be signed and verified by the AMD Platform Security Processor. So, the whole idea is that a malicious BIOS should be prevented by AMD's security... that is now broken. The fact that we can now flash an unsigned malicious BIOS update
is the real news. You can contrast the BIOS issue by looking over at LibreBoot where they have been pleading with AMD to release the firmware as open source:
https://libreboot.org/amd-libre.html
So, we should now be grasping the breadth of what is going on with the BIOS part of it. Looks like LibreBoot will be in luck as now even they will be able to craft a BIOS to bypass the AMD PSP .