Tuesday, February 4th 2025
AMD "Zen 1" to "Zen 4" Processors Affected by Microcode Signature Verification Vulnerability
Google Security Research team has just published its latest research on a fundamental flaw in the microcode patch verification system that affects AMD processors from "Zen 1" through "Zen 4" generations. The vulnerability stems from an inadequate hash function implementation in the CPU's signature validation process for microcode updates, enabling attackers with local administrator privileges (ring 0 from outside a VM) to inject malicious microcode patches, potentially compromising AMD SEV-SNP-protected confidential computing workloads and Dynamic Root of Trust Measurement systems. Google disclosed this high-severity issue to AMD on September 25, 2024, leading to AMD's release of an embargoed fix to customers on December 17, 2024, with public disclosure following on February 3, 2025; however, due to the complexity of supply chain dependencies and remediation requirements, comprehensive technical details are being withheld until March 5, 2025, allowing organizations time to implement necessary security measures and re-establish trust in their confidential compute environments.
AMD has released comprehensive mitigation measures through AGESA firmware updates across its entire EPYC server processor lineup, from the first-generation Naples to the latest Genoa-X and Bergamo architectures. The security patch, designated as CVE-2024-56161 with a high severity rating of 7.2, introduces critical microcode updates: Naples B2 processors require uCode version 0x08001278, Rome B0 systems need 0x0830107D, while Milan and Milan-X variants mandate versions 0x0A0011DB and 0x0A001244 respectively. For the latest Genoa-based systems, including Genoa-X and Bergamo/Siena variants, the required microcode versions are 0x0A101154, 0x0A10124F, and 0x0AA00219. These updates implement robust protections across all SEV security features - including SEV, SEV-ES, and SEV-SNP - while introducing new restrictions on microcode hot-loading capabilities to prevent future exploitation attempts.
Sources:
Google on GitHub, AMD
AMD has released comprehensive mitigation measures through AGESA firmware updates across its entire EPYC server processor lineup, from the first-generation Naples to the latest Genoa-X and Bergamo architectures. The security patch, designated as CVE-2024-56161 with a high severity rating of 7.2, introduces critical microcode updates: Naples B2 processors require uCode version 0x08001278, Rome B0 systems need 0x0830107D, while Milan and Milan-X variants mandate versions 0x0A0011DB and 0x0A001244 respectively. For the latest Genoa-based systems, including Genoa-X and Bergamo/Siena variants, the required microcode versions are 0x0A101154, 0x0A10124F, and 0x0AA00219. These updates implement robust protections across all SEV security features - including SEV, SEV-ES, and SEV-SNP - while introducing new restrictions on microcode hot-loading capabilities to prevent future exploitation attempts.
16 Comments on AMD "Zen 1" to "Zen 4" Processors Affected by Microcode Signature Verification Vulnerability
And the related documents: www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html
Check the time frame: September 25, 2024 - March 5, 2025
For Milan and Genoa (7003 and 9004) a similar, but more manageable issue occurs. This particular fix has to be delivered by the BIOS vendor or any future microcode update at runtime will fail (probably because the cryptography changes).
I am curious if there's a difference between Ryzen and EPYC microcode loading since Ryzens also can perform runtime updates. Will there be a separate AGESA update to address this?
I mean, some basic browsing skills (not clicking on suspicious links, not downloading anything unverified, etc.) should mitigate the issue, I suppose.
On the other hand this particular AMD issue is so specific that the risk to normal users is almost 0. I doubt anyone would bother creating a widespread attack for it, but targeted attacks by state-level agencies are another matter ;)
Performance regressions incoming.
The microcode runtime update vulnerability
is probably also present in Ryzens, is definitely present in Ryzens since Google's PoC worked on a laptop chip, but not disclosed by AMD yet. I guess it will be added to AGESA at a later date.If understood correctly what I saw hours ago it is about epyc processors - or milan whatever they call these server cpus.
I wondered if my Ryzen is affected or not. I'm very happy that certain package manager use now keys to verify downloads and checksums to verify downloads. A big improvement for a few years. Windows can not do that afaik. You download something and hope that computerbase.de/download has a clean download for software vlc, microsoft windows, intel driver, and so on. Let's trust the windows software download server and companies
This is a generic statement that I have to download every single windows 11 pro 24h2 software by hand, store it and execute the installer by hand.
powershell scripts which install modules which only nerds know about like winget do not count for the usual consumer. i doubt those websites like pcgameshardware.de to name someone who is not here - check every single advertisement file by a human person.
I'm not implying using an adblocker may be a security enhancement feature.