Image Source: AMD/tomshardware.com

The vulnerability, dubbed Sinkclose, allows hackers to gain access to the SMM system management mode in computers running AMD processors and inject malware into the UEFI bootloader. It is almost impossible to detect and remove such software – this will require physically erasing the contents of the chip from the BIOS using a programmer. To complicate matters, the SMM layer allows unrestricted access to all system memory and can be used to monitor the operating system. Given the severity of the problem, AMD has released security updates for a number of processors.

However, the company notes that some older products are beyond the period of their software support – AMD does not intend to close the security hole in them. In particular, the company does not plan to update the Ryzen 1000, 2000 and 3000 series processors, as well as the Threadripper 1000 and 2000 models. The new Ryzen 9000 and Ryzen AI 300 processors are also missing from the list, but there is a possibility that for them the vulnerability was fixed at the factory .

Processors that have already received or are awaiting a security update include the following:

  • All generations of AMD EPYC processors for data centers;
  • Latest Threadripper and Ryzen models;

  • MI300A chips for data centers.

Full table of AMD chips for which the update will be released:

Image source: Tomshardware.com

Although the Sinkclose vulnerability is difficult to exploit, AMD recommends that all users install the update as soon as it becomes available. At the same time, the company assured that the update will not affect processor performance.

It is also noted that all Ryzen Embedded and EPYC Embedded, without exception, will receive the update. This is due to the fact that most embedded processors run in the background 24/7 without human intervention for several years, which further creates the threat of various types of hacker attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *