• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

"Sinkclose" Vulnerability Affects Every AMD CPU Dating Back to 2006

Joined
Feb 20, 2019
Messages
8,370 (3.91/day)
System Name Bragging Rights
Processor Atom Z3735F 1.33GHz
Motherboard It has no markings but it's green
Cooling No, it's a 2.2W processor
Memory 2GB DDR3L-1333
Video Card(s) Gen7 Intel HD (4EU @ 311MHz)
Storage 32GB eMMC and 128GB Sandisk Extreme U3
Display(s) 10" IPS 1280x800 60Hz
Case Veddha T2
Audio Device(s) Apparently, yes
Power Supply Samsung 18W 5V fast-charger
Mouse MX Anywhere 2
Keyboard Logitech MX Keys (not Cherry MX at all)
VR HMD Samsung Oddyssey, not that I'd plug it into this though....
Software W10 21H1, barely
Benchmark Scores I once clocked a Celeron-300A to 564MHz on an Abit BE6 and it scored over 9000.
Ring -2 could theoretically avoid detection forever and not be eliminated so easily. Almost no one will think that they will have something operating at that level that a bios reflash is necessary.
Oh, I've been BIOS flashing compromised systems for almost two decades. Rootkits that can survive a disk wipe and OS reinstall have been around since Sony's silly rootkit scandal of 2005 hit mainstream media and even global broadcast TV news. Anyone not considering rootkits is ignorant of basic security vulnerabilities and that means they should hand over the job to someone with a clue; they're unfit to do it themselves.

I barely have a clue, but that's why I hire people whose sole job it is to be on top of this stuff.
 
Joined
Jun 3, 2008
Messages
786 (0.13/day)
Location
Pacific Coast
System Name Z77 Rev. 1
Processor Intel Core i7 3770K
Motherboard ASRock Z77 Extreme4
Cooling Water Cooling
Memory 2x G.Skill F3-2400C10D-16GTX
Video Card(s) EVGA GTX 1080
Storage Samsung 850 Pro
Display(s) Samsung 28" UE590 UHD
Case Silverstone TJ07
Audio Device(s) Onboard
Power Supply Seasonic PRIME 600W Titanium
Mouse EVGA TORQ X10
Keyboard Leopold Tenkeyless
Software Windows 10 Pro 64-bit
Benchmark Scores 3DMark Time Spy: 7695
No its because something worse is a moot point as if someone attacks at ring 0, the user is already compromised, though either is unlikely unless if the user is clicking on suspicious links.
Unlikely? It happens all the time! You want that driver that no one has any more. Or that program. You are hacking around with some hardware or some software. You get it from the only source you can find. A forum. Discord. Github. Wherever. Someone has the answer to your problem. You want it. It seems like your only option. So you click the buttons when it asks you for permission. And now you are compromised.

This is super common. Not unlikely at all.

Being compromised is one thing. Being compromised, undetectable by antivirus, and still compromised after a drive wipe and reinstall is another thing.

No one understands the definition of worse. lol

One is bad. The other is worse. A lot worse.

Oh, I've been BIOS flashing compromised systems for almost two decades. Rootkits that can survive a disk wipe and OS reinstall have been around since Sony's silly rootkit scandal of 2005 hit mainstream media and even global broadcast TV news. Anyone not considering rootkits is ignorant of basic security vulnerabilities and that means they should hand over the job to someone with a clue; they're unfit to do it themselves.

I barely have a clue, but that's why I hire people whose sole job it is to be on top of this stuff.
According to available information, this is primarily a consumer problem at this point. We're not talking about hiring people and having experts. The most extreme thing most consumers can imagine is wiping their drive and starting over.
 
Last edited:
Joined
Mar 18, 2023
Messages
938 (1.44/day)
System Name Never trust a socket with less than 2000 pins
This vulnerability would allegedly give them Ring -2 access. That's where you can do lasting damage without detection.

How, specifically?

(not directed at you in particular, it is just a bit unclear. I hope the DefCon talk will clear things up)
 
Joined
Jan 18, 2020
Messages
844 (0.47/day)
Unlikely? It happens all the time! You want that driver that no one has any more. Or that program. You are hacking around with some hardware or some software. You get it from the only source you can find. A forum. Discord. Github. Wherever. Someone has the answer to your problem. You want it. It seems like your only option. So you click the buttons when it asks you for permission. And now you are compromised.

This is super common. Not unlikely at all.

Being compromised is one thing. Being compromised, undetectable by antivirus, and still compromised after a drive wipe and reinstall is another thing.

No one understands the definition of worse. lol

One is bad. The other is worse. A lot worse.


According to available information, this is primarily a consumer problem at this point. We're not talking about hiring people and having experts. The most extreme thing most consumers can imagine is wiping their drive and starting over.

If the user is this stupid, this exploit is definitely the least of their concerns. They'll be compromised over and over again regardless of if they're running a AMD, Intel or any other CPU.
 
Joined
Jun 3, 2008
Messages
786 (0.13/day)
Location
Pacific Coast
System Name Z77 Rev. 1
Processor Intel Core i7 3770K
Motherboard ASRock Z77 Extreme4
Cooling Water Cooling
Memory 2x G.Skill F3-2400C10D-16GTX
Video Card(s) EVGA GTX 1080
Storage Samsung 850 Pro
Display(s) Samsung 28" UE590 UHD
Case Silverstone TJ07
Audio Device(s) Onboard
Power Supply Seasonic PRIME 600W Titanium
Mouse EVGA TORQ X10
Keyboard Leopold Tenkeyless
Software Windows 10 Pro 64-bit
Benchmark Scores 3DMark Time Spy: 7695
How, specifically?

(not directed at you in particular, it is just a bit unclear. I hope the DefCon talk will clear things up)
It is alleged. And apparently corroborated by AMD. We don't know the details at this point, because patches are still in development.

If the user is this stupid, this exploit is definitely the least of their concerns. They'll be compromised over and over again regardless of if they're running a AMD, Intel or any other CPU.
What a fantasy world you must live in.


Regardless, one is bad. The other is worse. Detectable by antivirus vs not. Non-persistent vs persistent.

Flippant.


Is this some silly brand loyalist thing?

The question was 'why is this bad/worse?'. And then, when you respond to that answer with 'i don't care because of some other reason', why are you even in this topic?

Nihilist?


When RGB software does this, it's the end of the world with software we should never need to use in the first place (I agree). When it's a native CPU problem, oh, what's the big deal? The world sucks anyway.
 
Last edited:
Joined
Feb 1, 2019
Messages
3,669 (1.70/day)
Location
UK, Midlands
System Name Main PC
Processor 13700k
Motherboard Asrock Z690 Steel Legend D4 - Bios 13.02
Cooling Noctua NH-D15S
Memory 32 Gig 3200CL14
Video Card(s) 4080 RTX SUPER FE 16G
Storage 1TB 980 PRO, 2TB SN850X, 2TB DC P4600, 1TB 860 EVO, 2x 3TB WD Red, 2x 4TB WD Red
Display(s) LG 27GL850
Case Fractal Define R4
Audio Device(s) Soundblaster AE-9
Power Supply Antec HCG 750 Gold
Software Windows 10 21H2 LTSC
Why would installing programs require admin privilegies? If I launch CMD it does not have that.
Depends where it is installed.

If the binaries are dumped in the user profile path (which is becoming increasingly common) no UAC elevation required. If you want them in Program Files, then you need elevation. The reason for this is Program Files has a security boundary to write to the location which should make it harder to tamper with binaries. User profile folder was originally intended just for data. Programs already installed in Program Files that need to update themselves without elevating get round it via a background service they install.
 
Joined
Mar 11, 2008
Messages
984 (0.16/day)
Location
Hungary / Budapest
System Name Kincsem
Processor AMD Ryzen 9 9950X
Motherboard ASUS ProArt X870E-CREATOR WIFI
Cooling Be Quiet Dark Rock Pro 5
Memory Kingston Fury KF560C32RSK2-96 (2×48GB 6GHz)
Video Card(s) Sapphire AMD RX 7900 XT Pulse
Storage Samsung 970PRO 500GB + Samsung 980PRO 2TB + FURY Renegade 2TB+ Adata 2TB + WD Ultrastar HC550 16TB
Display(s) Acer QHD 27"@144Hz 1ms + UHD 27"@60Hz
Case Cooler Master CM 690 III
Power Supply Seasonic 1300W 80+ Gold Prime
Mouse Logitech G502 Hero
Keyboard HyperX Alloy Elite RGB
Software Windows 10-64
Benchmark Scores https://valid.x86.fr/9qw7iq https://valid.x86.fr/4d8n02 X570 https://www.techpowerup.com/gpuz/g46uc
....if only nsa did not ask AMD and Intel to leave loopholes in their CPUs....
 
Joined
Mar 31, 2018
Messages
52 (0.02/day)
There are Zen2 processors that will get the upgrade (series 4000, mobile series 5300, 5500, 5700, mobile series 3000 is even Zen1+), Zen1 server is supported too (another platform), so the negative for Zen1/Zen2 desktop AM4 even when the BIOS could be updated isn't for validation issues, feels more for planned obsolescence than anything else. Shady.
 
Joined
Dec 12, 2016
Messages
1,964 (0.67/day)
What a fantasy world you must live in.
I think you are still not understanding the point others are trying to make but I could be wrong. This exploit is so deep into the computer that other more easier ways are available to take over a computer. Most of those easier ways are blocked from exploitation but vulnerable computers still exist that do not require the Sinkclose exploit. The other commenters are saying that unaware users are more vulnerable to these easier exploits; therefore Sinkclose is more academic right now and just another possible avenue of exploiting a computer and not the end of secure computing as the shock and awe media would have us believe otherwise.
 
Joined
Jun 3, 2008
Messages
786 (0.13/day)
Location
Pacific Coast
System Name Z77 Rev. 1
Processor Intel Core i7 3770K
Motherboard ASRock Z77 Extreme4
Cooling Water Cooling
Memory 2x G.Skill F3-2400C10D-16GTX
Video Card(s) EVGA GTX 1080
Storage Samsung 850 Pro
Display(s) Samsung 28" UE590 UHD
Case Silverstone TJ07
Audio Device(s) Onboard
Power Supply Seasonic PRIME 600W Titanium
Mouse EVGA TORQ X10
Keyboard Leopold Tenkeyless
Software Windows 10 Pro 64-bit
Benchmark Scores 3DMark Time Spy: 7695
I don't think that I am missing the point.

This vulnerability is deeper. Point
The other stuff is normal stuff that happens every day. This is worse, harder to detect, and harder to get rid of. Point

Take an existing Ring 0 exploit. Change it to Ring -2. Why is that worse? If Ring 0 is so bad, why would an attacker want lower? These are hypothetical questions, of course. Answer them, and you have your answer.
 
Last edited:
Joined
Dec 24, 2010
Messages
580 (0.11/day)
Location
mississauga, on, Canada
System Name YACS amd
Processor 5800x,
Motherboard gigabyte x570 aorus gaming elite.
Cooling bykski GPU, and CPU, syscooling p93x pump
Memory corsair vengeance pro rgb, 3600 ddr4 stock timings.
Video Card(s) xfx merc 310 7900xtx
Storage kingston kc3000 2TB, amongst others. Fanxiang s770 2TB
Display(s) benq ew3270u, or acer XB270hu, acer XB280hk, asus VG 278H,
Case lian li LANCOOL III
Audio Device(s) obs,
Power Supply FSP Hydro Ti pro 1000w
Mouse logitech g703
Keyboard durogod keyboard. (cherry brown switches)
Software win 11, win10pro.
so amd processors… PS5, PS4 have AMD processors… and everyone is worried that their system is pwned… but, is it not a good thing?, because now you can jail break your PS5, or PS4 Right?… and it is not fixable… so the Sinkclose vulnerability will allow games to be easily stolen on the PC and PS5… no?.

if not, why is everyone doing the “doom and gloom” posting?
 
Joined
Jul 26, 2013
Messages
438 (0.10/day)
Location
Midlands, UK
System Name Electra III
Processor AMD Ryzen 5 3600 @ 4.40 GHz (1.3 V)
Motherboard ASUS PRIME X570-PRO with BIOS 5003
Cooling Cooler Master Hyper 212 EVO V1 + 4× ARCTIC P12 PWM
Memory 32 GiB Kingston FURY Renegade RGB (DDR4-3600 16-20-20-39)
Video Card(s) PowerColor Fighter RX 6700 XT with Adrenalin 24.7.1
Storage 1 TiB Samsung 970 EVO Plus + 4 TB WD Red Pro
Display(s) Dell G3223Q + Samsung U28R550Q + HP 22w
Case Fractal Design Focus G (Black)
Audio Device(s) Realtek HD Audio S1220A
Power Supply EVGA SuperNOVA G3 750 W
Mouse Logitech G502 X Lightspeed + Logitech MX Master 2S
Keyboard MSI VIGOR GK71 SONIC Blue
Software Windows 10 22H2 Pro x64
Benchmark Scores CPU-Z = 542/4,479 — R15 = 212/1,741 — R20 = 510/3,980 — PM 10 = 2,784/19,911 — GB 5 = 1,316/7,564
Stupid of AMD to omit a fix for the Ryzen 3000 series.
 
Joined
May 19, 2009
Messages
1,868 (0.33/day)
Location
Latvia
System Name Personal \\ Work - HP EliteBook 840 G6
Processor 7700X \\ i7-8565U
Motherboard Asrock X670E PG Lightning
Cooling Noctua DH-15
Memory G.SKILL Trident Z5 RGB Black 32GB 6000MHz CL36 \\ 16GB DDR4-2400
Video Card(s) ASUS RoG Strix 1070 Ti \\ Intel UHD Graphics 620
Storage 2x KC3000 2TB, Samsung 970 EVO 512GB \\ OEM 256GB NVMe SSD
Display(s) BenQ XL2411Z \\ FullHD + 2x HP Z24i external screens via docking station
Case Fractal Design Define Arc Midi R2 with window
Audio Device(s) Realtek ALC1150 with Logitech Z533
Power Supply Corsair AX860i
Mouse Logitech G502
Keyboard Corsair K55 RGB PRO
Software Windows 11 \\ Windows 10
This would seem to be a vulnerability that is primarily exposed by the exploit needing to be executed by someone/something at the main OS level.

In which case - you have already lost and this vulnerability is not really that critical.
 
Joined
Jun 20, 2024
Messages
405 (2.09/day)
Yeah, because Intel have never had an SMM security issue... oh, hang on they have... could be worse, with Intel ME you could also have an additional attack vector offering fully fledged in-built remote access across a network even if the OS isn't running...

When you also factor in the employee headcount difference between AMD and Intel, and amount of staff Intel can dedicate to every facet of a product from security to design, it is actually quite amazing these issues crop up so often.
 
Last edited by a moderator:
Joined
Feb 21, 2006
Messages
2,241 (0.33/day)
Location
Toronto, Ontario
System Name The Expanse
Processor AMD Ryzen 7 5800X3D
Motherboard Asus Prime X570-Pro BIOS 5013 AM4 AGESA V2 PI 1.2.0.Cc.
Cooling Corsair H150i Pro
Memory 32GB GSkill Trident RGB DDR4-3200 14-14-14-34-1T (B-Die)
Video Card(s) XFX Radeon RX 7900 XTX Magnetic Air (24.12.1)
Storage WD SN850X 2TB / Corsair MP600 1TB / Samsung 860Evo 1TB x2 Raid 0 / Asus NAS AS1004T V2 20TB
Display(s) LG 34GP83A-B 34 Inch 21: 9 UltraGear Curved QHD (3440 x 1440) 1ms Nano IPS 160Hz
Case Fractal Design Meshify S2
Audio Device(s) Creative X-Fi + Logitech Z-5500 + HS80 Wireless
Power Supply Corsair AX850 Titanium
Mouse Corsair Dark Core RGB SE
Keyboard Corsair K100
Software Windows 10 Pro x64 22H2
Benchmark Scores 3800X https://valid.x86.fr/1zr4a5 5800X https://valid.x86.fr/2dey9c 5800X3D https://valid.x86.fr/b7d
Yes and you need kernel level access to exploit it, i.e installing a compromised driver or something like that.

The concern for your average user is less than zero.

If a threat actor has that kind of access they can do much worse than just this exploit. I guess governments or people running missions critical intelligence or military infrastructure could be concerned. I'd also guess there are zero of these first gen ryzen chips being used in such places anyway.
What about games that install Anti cheat with Kernel level access?

Stupid of AMD to omit a fix for the Ryzen 3000 series.
A good time to upgrade Zen 3 is cheap and in socket replacement no need for even a windows reinstall.
 
Last edited by a moderator:
Joined
May 20, 2020
Messages
30 (0.02/day)
What about games that install Anti cheat with Kernel level access?


Nice trolling.

Team blue still dealing with silicon degradation don't you have something better to do with your time?


A good time to upgrade Zen 3 is cheap and in socket replacement no need for even a windows reinstall.
So whataboutism, whataboutism, and just give the company more money for an additional product they may refuse to update like your current one.

Not the best solutions, but hey it is the internet, you get to try to dunk on people without addressing the spirit of the criticism.
 
Joined
May 1, 2023
Messages
85 (0.14/day)
AMD Ryzen™ 7000 Series Desktop Processors
ComboAM5PI 1.2.0.1 (2024-08-07)

Time to keep an eye out for BIOS updates with 1.2.0.1. Manufacturers just got 1.2.0.0a out the door with the 9000 series launch.
 
Joined
Aug 10, 2021
Messages
75 (0.06/day)
Processor Ryzen 7 7800X3D
Motherboard AsRock B650M Pro RS
Cooling Thermalright Phantom Spirit 120 SE
Memory 32GB G.Skill FlareX 6000MT/s CL30
Video Card(s) Asus RX 6600 XT Dual OC
Storage Samsung 970 Evo 500GB & Crucial MX500 2TB
Display(s) AOC C24G1 & Lenovo L24-i10
Case Deepcool CH370 White & 8x Arctic P12/P14
Audio Device(s) Beyerdynamic DT770 Pro & Fifine T669 Mic
Power Supply SeaSonic Focus GX-850
Mouse Logitech GPXSL
Keyboard Logitech G Pro KDA (GX Brown)
Software W10
What I'm reading is that I can now force my brother to ditch Zen+ in favour of Zen 3. Hopefully AGESA update ships quickly for my Zen 4 and 3 systems.
 
Joined
Feb 20, 2019
Messages
8,370 (3.91/day)
System Name Bragging Rights
Processor Atom Z3735F 1.33GHz
Motherboard It has no markings but it's green
Cooling No, it's a 2.2W processor
Memory 2GB DDR3L-1333
Video Card(s) Gen7 Intel HD (4EU @ 311MHz)
Storage 32GB eMMC and 128GB Sandisk Extreme U3
Display(s) 10" IPS 1280x800 60Hz
Case Veddha T2
Audio Device(s) Apparently, yes
Power Supply Samsung 18W 5V fast-charger
Mouse MX Anywhere 2
Keyboard Logitech MX Keys (not Cherry MX at all)
VR HMD Samsung Oddyssey, not that I'd plug it into this though....
Software W10 21H1, barely
Benchmark Scores I once clocked a Celeron-300A to 564MHz on an Abit BE6 and it scored over 9000.
Take an existing Ring 0 exploit. Change it to Ring -2. Why is that worse? If Ring 0 is so bad, why would an attacker want lower? These are hypothetical questions, of course. Answer them, and you have your answer.
I'm openly aware that I'm somewhere in the Dunning-Kruger valley of despair when it comes to security vulnerabilities, but I don't see how this vulnerability can be exploited unless worse things have already happened to effectively write-off the system entirely.

Let's say someone steals your car, takes it for a joyride and wrecks it. That's the kernel-level exploit.
As they get out of the burning car, they steal the sunglasses you had in the glovebox. That's the higher-privilege exploit that wasn't possible unless they'd already gained access to your car.

Either way, you've lost your sunglasses and the sunglasses are the least of your worries. If their ultimate goal in the first place was to steal your sunglasses then the lock on the glovebox really wasn't the biggest hurdle.
 
Joined
Jul 26, 2013
Messages
438 (0.10/day)
Location
Midlands, UK
System Name Electra III
Processor AMD Ryzen 5 3600 @ 4.40 GHz (1.3 V)
Motherboard ASUS PRIME X570-PRO with BIOS 5003
Cooling Cooler Master Hyper 212 EVO V1 + 4× ARCTIC P12 PWM
Memory 32 GiB Kingston FURY Renegade RGB (DDR4-3600 16-20-20-39)
Video Card(s) PowerColor Fighter RX 6700 XT with Adrenalin 24.7.1
Storage 1 TiB Samsung 970 EVO Plus + 4 TB WD Red Pro
Display(s) Dell G3223Q + Samsung U28R550Q + HP 22w
Case Fractal Design Focus G (Black)
Audio Device(s) Realtek HD Audio S1220A
Power Supply EVGA SuperNOVA G3 750 W
Mouse Logitech G502 X Lightspeed + Logitech MX Master 2S
Keyboard MSI VIGOR GK71 SONIC Blue
Software Windows 10 22H2 Pro x64
Benchmark Scores CPU-Z = 542/4,479 — R15 = 212/1,741 — R20 = 510/3,980 — PM 10 = 2,784/19,911 — GB 5 = 1,316/7,564

amdv.png


intelv.png
 
Last edited by a moderator:
Joined
Aug 20, 2007
Messages
21,572 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 5800X Optane 800GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Yes and you need kernel level access to exploit it, i.e installing a compromised driver or something like that.

The concern for your average user is less than zero.

If a threat actor has that kind of access they can do much worse than just this exploit. I guess governments or people running missions critical intelligence or military infrastructure could be concerned. I'd also guess there are zero of these first gen ryzen chips being used in such places anyway.
This, basically. Good summary. I'd also expect 0 performance impact from patching this.

I hope that the fix won't affect the performance of these chips.
It shouldn't.

I don't understand this sort of flippant response. People install malicious software every day via social engineering. This is another exploit that allows slightly malicious software to become very malicious. There is no reason to downplay its potential until it is fixed.
This is also true but at the same time, it is healthy to remind people not to panic.
 
Joined
Jun 20, 2024
Messages
405 (2.09/day)
What about games that install Anti cheat with Kernel level access?
They are the worst kind... usually used by companies with crap coding to stop modders/cheaters... what trust can you put in them??
Doesn't help some are of dubious origin.

So whataboutism, whataboutism
The point was "what about software that gets installed with ring0 access that you effectively need to trust but with poor / no oversight"

I'm openly aware that I'm somewhere in the Dunning-Kruger valley of despair when it comes to security vulnerabilities, but I don't see how this vulnerability can be exploited unless worse things have already happened to effectively write-off the system entirely.

Let's say someone steals your car, takes it for a joyride and wrecks it. That's the kernel-level exploit.
As they get out of the burning car, they steal the sunglasses you had in the glovebox. That's the higher-privilege exploit that wasn't possible unless they'd already gained access to your car.

Either way, you've lost your sunglasses and the sunglasses are the least of your worries. If their ultimate goal in the first place was to steal your sunglasses then the lock on the glovebox really wasn't the biggest hurdle.
I think the reason why people are concerned is that you have 2 main tiers of system exploit; 1) you loose control of the software but there is limited scope to damage anything else, or 2) you loose control of the software and they can also permanently infect the hardware. This falls in to tier 2.

Again, fanboys and uninformed people will act in an incredulous way when informed that this isn't exactly a new risk itself - remember back when people were finding out about the CIH virus... fun times.
 
Joined
Aug 20, 2007
Messages
21,572 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 5800X Optane 800GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Oh, I've been BIOS flashing compromised systems for almost two decades. Rootkits that can survive a disk wipe and OS reinstall have been around since Sony's silly rootkit scandal of 2005 hit mainstream media and even global broadcast TV news. Anyone not considering rootkits is ignorant of basic security vulnerabilities and that means they should hand over the job to someone with a clue; they're unfit to do it themselves.

I barely have a clue, but that's why I hire people whose sole job it is to be on top of this stuff.
Rootkits are not the same as ring -2. They typically cannot survive a reinstall.
 
Joined
Jun 20, 2024
Messages
405 (2.09/day)
In which case - you have already lost and this vulnerability is not really that critical.
Its 'critical' in terms of direct impact - its impossible to class it based on risk as everyone works differently. For sure the risk is high of someone inadvertently loading it. For those with locked down devices and effective endpoint security, the risk is probably quite low, but the impact wouldn't be any different if it somehow was triggered.
 
Joined
Aug 20, 2007
Messages
21,572 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 5800X Optane 800GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
so amd processors… PS5, PS4 have AMD processors… and everyone is worried that their system is pwned… but, is it not a good thing?, because now you can jail break your PS5, or PS4 Right?… and it is not fixable… so the Sinkclose vulnerability will allow games to be easily stolen on the PC and PS5… no?.

if not, why is everyone doing the “doom and gloom” posting?
There certainly are some fun things you could do with this.

That said, the potential for abuse is worse. Its why "hardware security" is a bad idea encapsulated.
 
Top