Friday, August 16th 2024

"Sinkclose" Vulnerability Affects Every AMD CPU Dating Back to 2006

A critical security flaw known as "Sinkclose" (CVE-2023-31315) has been identified in all AMD processors dating back to 2006, potentially affecting hundreds of millions of devices worldwide. This vulnerability allows malicious actors to exploit the chip architecture, leading to unauthorized access to sensitive data. Researchers Enrique Nissim and Krzysztof Okupski, researchers from the security firm IOActive, have revealed that the vulnerability can be exploited through various methods, enabling attackers to extract confidential information from affected systems, including passwords and personal data. The issue is especially concerning, given that it is present in all AMD CPUs made in the last 18 years and their widespread use in both consumer and enterprise environments. However, to exploit this vulnerability, an attacker must possess access to system's kernel. Downloading of malware-infused files can trigger it, so general safety measures are recommended.

The Sinkclose method exploits a little-known capability in AMD processors called TClose. This name is a blend of "TClose" and "Sinkhole," with the latter referring to a previous vulnerability found in Intel's System Management Mode in 2015. AMD chips employ a protective mechanism named TSeg, which blocks operating systems from accessing a specific memory area reserved for System Management Mode (SMM), known as System Management Random Access Memory (SMRAM). However, the TClose feature is designed to maintain backward compatibility with older hardware that might use the same memory addresses as SMRAM. It does this by remapping memory when activated. The security experts discovered that they could manipulate this TClose remapping function using only standard operating system permissions. By doing so, they could deceive the SMM into retrieving altered data, enabling them to redirect the processor and run their own instructions with the high-level privileges of SMM. This technique essentially allows attackers to bypass standard security measures and execute malicious code at one of the most privileged levels of the processor, potentially compromising the entire system.
In response to the discovery, AMD has initiated a patching process for its critical chip lines, aiming to mitigate the risks associated with this flaw. The company works closely with hardware manufacturers and software developers to ensure that updates are deployed swiftly and effectively. Enrique Nissim and Krzysztof Okupski agreed not to publish any proof-of-concept code for the vulnerability to ensure that the patches aren't rushed and systems are not getting exploited. AMD already issued patched for most of its models, and you should check out the official website for your specific mitigation firmware update. The enterprise EPYC CPUs and Instinct accelerators have been a first-priority products with patches implemented in May, while consumer desktop/laptop 4000/5000/7000/8000 series CPUs received a fix in August. No fixes are planned for 3000 series Ryzen CPUs. Workstation-grade CPUs have also received an update to mitigate this issue.

Update 08:20 UTC: AMD confirmed that the Ryzen 3000 series "Matisse" processors are getting an update planned for August 20, 2024.
Sources: Wired, AMD
Add your own comment

124 Comments on "Sinkclose" Vulnerability Affects Every AMD CPU Dating Back to 2006

#76
Visible Noise
remixedcatThe media made the stink about it at the same time
You understand AMD just disclosed this right? Should it be ignored by the media because it offends you? Hint - this is big news. The media should cover it.

But seriously, please tell us how Intel engineered this to occur just now, 10 months later. I really, really want to know how they did it.
Posted on Reply
#77
Hecate91
remixedcatdo you know what's going on w intel right?
The timing of these researchers releasing this news is very coincidental with what is happening with Intel.
remixedcatdual bios is doable. even routers have that... my meraki has a rapid failover in case the other is corrupted or doesn't boot it boots from the prev version.
I'd like to see dual bios as a standard on boards, though mobo makers seem to cheap out on features which should only cost a few cents like a POST code display or physical power and reset buttons on the board.
remixedcatppl should have rejected those anti cheats to begin with they were always a bad idea and people were too desperate to play some games they complied.
Agreed, the anti-cheats spying at a kernel level is only punishing the legit players, I refuse to play some games with how sketchy the anti-cheat system is with some of them requiring TPM enabled.
Posted on Reply
#78
Visible Noise
INFERNUSI don't think the average gamer, who maybe bought their PC pre-built and only wants to play games and maybe stream are even going to even acknowledge this BIOS update.
Prebuilts get their BIOS updates over Windows Update.
Posted on Reply
#79
INFERNUS
Visible NoisePrebuilts get their BIOS updates over Windows Update.
Hmmm, I would not trust this at all LOL. As I posted if that BIOS has an issue and you can't boot you need to send the whole PC back.
Posted on Reply
#80
RJARRRPCGP
IIRC, the pre-10th-gen CSME bug, had "remote code execution" and was rated "critical". I was urgently finding a BIOS update for a new laptop I used to have, but there was no update in 2020, so I got another Ryzen PC. That was how I got the A320 build in another room (it came with a Ryzen 5 2600 (Pinnacle Ridge) (Zen+) and now has the Ryzen 7 3700X (Matisse) (Zen 2) ) The BIOS is flashed to at least a version from 2023, IIRC, so it should take a Ryzen 5 5600/X.

The laptop had a Core i7 9750H (TMK) Also had a GeForce GTX 1650.

A relief that I shouldn't have to panic now, because I don't just go ahead and let stuff run as administrator.
Posted on Reply
#81
Visible Noise
INFERNUSHmmm, I would not trust this at all LOL. As I posted if that BIOS has an issue and you can't boot you need to send the whole PC back.
Trust it or not, it’s the default for prebuilt PCs. Dell, HP, Lenovo, etc all will automatically update their bios without any intervention from the user.
Posted on Reply
#82
R-T-B
remixedcatThe media made the stink about it at the same time
So the media is complicit now?

Somewhere, Occam's Razor is screaming.
Hecate91The timing of these researchers releasing this news is very coincidental with what is happening with Intel.
Yes. But that's where it ends without further evidence. Sometimes convenient scandals just happen.
Posted on Reply
#83
INFERNUS
Found this on laptopmag website "A hacker must have already gained access to a PC or server to exploit the System Management Mode controls, which is one reason AMD is downplaying the concern. In a background statement to Wired, AMD company compared the Sinkclose method to "accessing a bank's safe-deposit boxes after already bypassing its alarms, the guards, and vault door." I think for the most part the average home user has nothing to worry about.
Posted on Reply
#84
Visible Noise
R-T-BSo the media is complicit now?

Somewhere, Occam's Razor is screaming.
That’s how it is with these guys, it’s never AMD’s fault.
Posted on Reply
#85
kondamin
INFERNUSFound this on laptopmag website "A hacker must have already gained access to a PC or server to exploit the System Management Mode controls, which is one reason AMD is downplaying the concern. In a background statement to Wired, AMD company compared the Sinkclose method to "accessing a bank's safe-deposit boxes after already bypassing its alarms, the guards, and vault door." I think for the most part the average home user has nothing to worry about.
Yeah laptop magazine is wrong, someone just needs to install malicious software unknowingly, once.

and that machine can be compromised until the end of its life if it’s just used to spy
Posted on Reply
#86
LabRat 891
remixedcatThe timing of this whole thing is sus...

Intel hired them to cover up the 1314gate
The thought had occured.
Did a cursory bit of research on the company, and couldn't find any obvious associations.

Corporate espionage isn't anything new. So, it's not a 'far fetched' thought to have.
-just... maybe, more inquisitive than accusative.
Posted on Reply
#87
Clockmaster77
I have a Ryzen7 3700X and I was planning to have it for some years to come, because, having 16 threads, was nearly (I said nearly) an high end consumer CPU when I bought it in late 2020. In these days AMD said it will not release SinkClose patches for 3000 series. This thing happens just after INTEL is in severe crisis due to crashing new processors, and this is at least suspicious. Now that I have to, in a reasonably distant future (because I am not a millionaire) change newly all my MOTHERBOARD, CPU AND MEMORY thank to this, I'll surely don't choose nor AMD than INTEL. And this because I hope in that future there will be new, more reliable vendors like (maybe) NVIDIA or other ARM (i hope) based sellers also in the consumer/low price market.
Posted on Reply
#88
Makaveli
Visible NoiseTrust it or not, it’s the default for prebuilt PCs. Dell, HP, Lenovo, etc all will automatically update their bios without any intervention from the user.
I manage many Lenovo's laptops at work.

Bios updates are done through the Lenovo Commerical Vantage software which you launch then scan for update then when it finds a bios you install.

We do not ever allow bios updates over windows update for end user machines that is a nightmare waiting to happen that we plan to avoid.

None of our users have local admin rights!
Posted on Reply
#89
95Viper
Stick to the topic.
Stop the insulting remarks about any group of people.
Posted on Reply
#90
R-T-B
Clockmaster77I have a Ryzen7 3700X and I was planning to have it for some years to come, because, having 16 threads, was nearly (I said nearly) an high end consumer CPU when I bought it in late 2020. In these days AMD said it will not release SinkClose patches for 3000 series. This thing happens just after INTEL is in severe crisis due to crashing new processors, and this is at least suspicious. Now that I have to, in a reasonably distant future (because I am not a millionaire) change newly all my MOTHERBOARD, CPU AND MEMORY thank to this, I'll surely don't choose nor AMD than INTEL. And this because I hope in that future there will be new, more reliable vendors like (maybe) NVIDIA or other ARM (i hope) based sellers also in the consumer/low price market.
You aren't going to find a vendor that does not have hardware security bugs these days.
Posted on Reply
#91
Super Firm Tofu
Clockmaster77I have a Ryzen7 3700X and I was planning to have it for some years to come, because, having 16 threads, was nearly (I said nearly) an high end consumer CPU when I bought it in late 2020. In these days AMD said it will not release SinkClose patches for 3000 series. This thing happens just after INTEL is in severe crisis due to crashing new processors, and this is at least suspicious. Now that I have to, in a reasonably distant future (because I am not a millionaire) change newly all my MOTHERBOARD, CPU AND MEMORY thank to this, I'll surely don't choose nor AMD than INTEL. And this because I hope in that future there will be new, more reliable vendors like (maybe) NVIDIA or other ARM (i hope) based sellers also in the consumer/low price market.
Why?

Just buy a 5800X, 5900X, or 5950X and sell the 3700X.
Posted on Reply
#92
Makaveli
Super Firm TofuWhy?

Just buy a 5800X, 5900X, or 5950X and sell the 3700X.
The longer you wait on doing these in socket upgrades the less value you get when selling older parts.

I did this move in 2021 after being on Zen 2 for 2 years and it was worth it. Sold my 3800X for $400 when I paid $440 for it 2 year prior. Zen 3 was a solid upgrade over 2 there was no reason to stay on Zen 2.
Posted on Reply
#93
unwind-protect
So in ring -2 you can flash the code in the firmware that flashes the firmware?

Why are there no jumpers or BIOS settings to prevent that when the user doesn't want it?
Posted on Reply
#95
azrael
Update 08:20 UTC: AMD confirmed that the Ryzen 3000 series "Matisse" processors are getting an update planned for August 20, 2024.
Who'd have thunk it...
Posted on Reply
#96
Vincero
azraelWho'd have thunk it...
Actually not surprised for 3 reasons:

1) As mentioned before, Ryzen 4000 series is same Zen2 so no real excuse not to apply it to 3000 series also. Technically they could have made the distinction of laptop 4000 series but they didn't so targetting some Zen2 on the AM4 socket and not others seems to be purposely 'unhelpful'.
2) Some Ryzen 3000 series parts will still be under warranty and I'm sure a simple software fix to the BIOS to stop / validate SMM access requests properly is better than dealing with even a limited number of upset customers, or more likely OEMs - and lets face it, AMD still need to work hard to keep OEMs onside vs the Intel marketing / financing machine.
3) Having been included in the Windows 11 list of approved CPUs, I would expect there is some (probably not much) push from Microsoft for some solid support of these whilst they remain on that list.
Posted on Reply
#97
trsttte
john_Time to replace those old Opteron servers.
Or maybe

not.


AMD does have a habit of not supporting hardware that is still in the market. I am not sure if the old(10-15 years ago) AMD was doing it, but today's AMD does.
I mean, Vega is not getting the same upgrades as RDNA2/3 chips, but it's still on the market, in the form of the iGPU in many AMD chips.
3000(Zen 2) series is still selling as mobile chips and desktop chips. Under new names as part of mobile 7000 series, or as part of the 4000 desktop APUs.
To be fair those rehashed zen2 (4000, 5000, 7000, whatever) were different than 3000 in their classification, those are still supported. Now they released an update that 3000 series will also be supported, good, but in reality they should also support 2000 and 1000 series as they all use the same socket and motherboards - the microcode update will be a bios update after-all

In the end either way doesn't matter all that much because we're at the mercy of motherboard vendors actually packaging the update which may or may not happen. My board is yet to receive the 1.2.0.ca that fixes zenbleed and took 6 months to receive 1.2.0.c so I don't have a lot of hopes for this 1.2.0.cb, not in any decent timely manner at least.
Posted on Reply
#98
A Computer Guy
My 3950x is still a workhorse of a CPU. Glad AMD changed their minds and will provide an update.
Visible NoiseWhat people are missing is because of the incompleteness of this article.

This vulnerability - which AMD themselves have rated as high severity - allows undetectable persistence of UEFI malware. Once that occurs it’s throw out the machine time.
You can't just reflash it?
Darmok N JaladKinda feels like we need a ROM bios with basic recovery features as a fallback, and a secondary flashable BIOS that can be wiped from orbit by the ROM BIOS. Or will that not even work?
UEFI on flash card. It's about overdue and motherboard manufactures can save money on not having to implement bios flashback including the RGB buttons for them.
Posted on Reply
#99
unwind-protect
A Computer GuyYou can't just reflash it?
I think that the point here is that you can replace the firmware portion that does the flashing. So you would future forward always be flashing with an infected flasher that could manipulate the image to flash.

I say "I think" because it seems impossible to get any load-bearing information on this. And the Defcon talk seems to have no public recording.
Posted on Reply
#100
trsttte
A Computer GuyUEFI on flash card. It's about overdue and motherboard manufactures can save money on not having to implement bios flashback including the RGB buttons for them.
Let's go one step further and isolate microcode/agesa into seperate modules that can be flashed independently, so no one needs to wait for motherboards vendors to repackage the amd update.

It's cool that AMD is saying 3000 series cpu will get the fix but reality is only x570 and maybe some b550 boards will ever get the bios update to apply the fix, and even then not all of them will. Platform longevity is not just every board being able to run every AM4 cpu, it needs to be bios updates as well.
Posted on Reply
Add your own comment
Jan 6th, 2025 09:06 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts