• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

"Sinkclose" Vulnerability Affects Every AMD CPU Dating Back to 2006

Joined
Mar 20, 2024
Messages
33 (0.12/day)
This is getting ridiculous!

AMD and Intel both working against the second hand market and product longevity. Completely by accident of course…….

Intel: Your second hand PC might have a faulty CPU, that starts to fail due to mysterious degradation.

AMD: Your second hand PC might be compromised in a stealth mode, where no clean OS reinstall will help you.
 
Joined
Aug 20, 2007
Messages
21,539 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
This is getting ridiculous!

AMD and Intel both working against the second hand market and product longevity. Completely by accident of course…….

Intel: Your second hand PC might have a faulty CPU, that starts to fail due to mysterious degradation.

AMD: Your second hand PC might be compromised in a stealth mode, where no clean OS reinstall will help you.
Just install the bios update and forget about it. Seriously. This isn't some grand conspiracy.

Although, it is pretty bad they drop support for 3000 and below, admitedly, but thats an AMD exclusive thing, pretty much...
 
Joined
Oct 15, 2011
Messages
2,477 (0.51/day)
Location
Springfield, Vermont
System Name KHR-1
Processor Ryzen 9 5900X
Motherboard ASRock B550 PG Velocita (UEFI-BIOS P3.40)
Memory 32 GB G.Skill RipJawsV F4-3200C16D-32GVR
Video Card(s) Sparkle Titan Arc A770 16 GB
Storage Western Digital Black SN850 1 TB NVMe SSD
Display(s) Alienware AW3423DWF OLED-ASRock PG27Q15R2A (backup)
Case Corsair 275R
Audio Device(s) Technics SA-EX140 receiver with Polk VT60 speakers
Power Supply eVGA Supernova G3 750W
Mouse Logitech G Pro (Hero)
Software Windows 11 Pro x64 23H2
There are Zen2 processors that will get the upgrade
Matisse is Zen 2. So that means lots of chips bought during the very-early pandemic, are considered obsolete now!

Rootkits are not the same as ring -2. They typically cannot survive a reinstall.
Yeah, ones that survive a drive wipe, are a BIOS-rootkit!
 
Joined
Jun 19, 2024
Messages
130 (0.70/day)
What people are missing is because of the incompleteness of this article.

This vulnerability - which AMD themselves have rated as high severity - allows undetectable persistence of UEFI malware. Once that occurs it’s throw out the machine time.
 
Joined
Oct 15, 2011
Messages
2,477 (0.51/day)
Location
Springfield, Vermont
System Name KHR-1
Processor Ryzen 9 5900X
Motherboard ASRock B550 PG Velocita (UEFI-BIOS P3.40)
Memory 32 GB G.Skill RipJawsV F4-3200C16D-32GVR
Video Card(s) Sparkle Titan Arc A770 16 GB
Storage Western Digital Black SN850 1 TB NVMe SSD
Display(s) Alienware AW3423DWF OLED-ASRock PG27Q15R2A (backup)
Case Corsair 275R
Audio Device(s) Technics SA-EX140 receiver with Polk VT60 speakers
Power Supply eVGA Supernova G3 750W
Mouse Logitech G Pro (Hero)
Software Windows 11 Pro x64 23H2
allows undetectable persistence of UEFI malware. Once that occurs it’s throw out the machine time.
That's what the Coffee Lake-and-earlier CSME bug was, and I have been wondering if just a packet received while connected to the internet, results in a contaminated UEFI-BIOS.
Doesn't affect Comet Lake and later.

The current AMD bug found, only affects ring-0 access.
 
Joined
Aug 20, 2007
Messages
21,539 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
That's what the Coffee Lake-and-earlier CSME bug was, and I have been wondering if just a packet received while connected to the internet, results in a contaminated UEFI-BIOS.
Doesn't affect Comet Lake and later.

The current AMD bug found, only affects ring-0 access.
I mean its all bad. Whataboutism serves no one here.
 
Joined
Oct 15, 2011
Messages
2,477 (0.51/day)
Location
Springfield, Vermont
System Name KHR-1
Processor Ryzen 9 5900X
Motherboard ASRock B550 PG Velocita (UEFI-BIOS P3.40)
Memory 32 GB G.Skill RipJawsV F4-3200C16D-32GVR
Video Card(s) Sparkle Titan Arc A770 16 GB
Storage Western Digital Black SN850 1 TB NVMe SSD
Display(s) Alienware AW3423DWF OLED-ASRock PG27Q15R2A (backup)
Case Corsair 275R
Audio Device(s) Technics SA-EX140 receiver with Polk VT60 speakers
Power Supply eVGA Supernova G3 750W
Mouse Logitech G Pro (Hero)
Software Windows 11 Pro x64 23H2
Just install the bios update and forget about it.
Warning: BIOS update currently not available for ASRock B550 PG Velocita
 

Solaris17

Super Dainty Moderator
Staff member
Joined
Aug 16, 2005
Messages
27,077 (3.83/day)
Location
Alabama
System Name RogueOne
Processor Xeon W9-3495x
Motherboard ASUS w790E Sage SE
Cooling SilverStone XE360-4677
Memory 128gb Gskill Zeta R5 DDR5 RDIMMs
Video Card(s) MSI SUPRIM Liquid X 4090
Storage 1x 2TB WD SN850X | 2x 8TB GAMMIX S70
Display(s) 49" Philips Evnia OLED (49M2C8900)
Case Thermaltake Core P3 Pro Snow
Audio Device(s) Moondrop S8's on schitt Gunnr
Power Supply Seasonic Prime TX-1600
Mouse Razer Viper mini signature edition (mercury white)
Keyboard Monsgeek M3 Lavender, Moondrop Luna lights
VR HMD Quest 3
Software Windows 11 Pro Workstation
Benchmark Scores I dont have time for that.
Damn, time to put my 3600+ brisbane to sleep. /salute
 
Joined
Jun 20, 2024
Messages
402 (2.17/day)
Damn, time to put my 3600+ brisbane to sleep. /salute
This does make me think there should be a buy back system in place. People could still buy (as new) Ryzen 3000 series products less than 3 years ago - technically you are still in warranty (brand new unsold items sitting on the shelf still get the same end user warranty period) - if you're not gonna support it then should be forced to offer a buy back.... I bet the support teams will miraculously offer BIOS updates as that little bit of work would cost far less.

AMD have said they probably will not offer updates for R3000 chips but I suspect it's more likely a case of getting little interest from motherboard/system OEM's also, and at the end of the day, nearly every AM4 motherboard would need to have the BIOS updates offered to fix this so why not just roll the patch to cover them also...??
To their credit, Intel did actually do patches for the Spectre/Meltdown CPU microcode all the way back to Nehalem (1st gen Core-i3/5/7 from 2008/2009) but the lazy motherboard manufacturers did nothing for them - I can count on one hand the amount of BIOS updates for systems that old that appeared - in the consumer/enthusiast components mainstream the newest platform I ever saw with BIOS updates for it was Haswell (LGA1150) - anything Ivy Bridge or earlier with patches is pretty rare.
 
Last edited:

Frick

Fishfaced Nincompoop
Joined
Feb 27, 2006
Messages
19,668 (2.86/day)
Location
w
System Name Black MC in Tokyo
Processor Ryzen 5 7600
Motherboard MSI X670E Gaming Plus Wifi
Cooling Be Quiet! Pure Rock 2
Memory 2 x 16GB Corsair Vengeance @ 6000Mhz
Video Card(s) XFX 6950XT Speedster MERC 319
Storage Kingston KC3000 1TB | WD Black SN750 2TB |WD Blue 1TB x 2 | Toshiba P300 2TB | Seagate Expansion 8TB
Display(s) Samsung U32J590U 4K + BenQ GL2450HT 1080p
Case Fractal Design Define R4
Audio Device(s) Plantronics 5220, Nektar SE61 keyboard
Power Supply Corsair RM850x v3
Mouse Logitech G602
Keyboard Dell SK3205
Software Windows 10 Pro
Benchmark Scores Rimworld 4K ready!
Joined
Jan 14, 2019
Messages
12,569 (5.79/day)
Location
Midlands, UK
System Name Nebulon B
Processor AMD Ryzen 7 7800X3D
Motherboard MSi PRO B650M-A WiFi
Cooling be quiet! Dark Rock 4
Memory 2x 24 GB Corsair Vengeance DDR5-4800
Video Card(s) AMD Radeon RX 6750 XT 12 GB
Storage 2 TB Corsair MP600 GS, 2 TB Corsair MP600 R2
Display(s) Dell S3422DWG, 7" Waveshare touchscreen
Case Kolink Citadel Mesh black
Audio Device(s) Logitech Z333 2.1 speakers, AKG Y50 headphones
Power Supply Seasonic Prime GX-750
Mouse Logitech MX Master 2S
Keyboard Logitech G413 SE
Software Bazzite (Fedora Linux) KDE
The article mentions CVE-2023-31315 vulnerability. According to AMD's website, AGESA 1.2.0.1 will patch it for Ryzen 7000. According to my motherboard's support page, the latest BIOS with AGESA 1.2.0.0a patches CVE-2024-31315. Are these the same thing?
 
Joined
Feb 20, 2019
Messages
8,339 (3.91/day)
System Name Bragging Rights
Processor Atom Z3735F 1.33GHz
Motherboard It has no markings but it's green
Cooling No, it's a 2.2W processor
Memory 2GB DDR3L-1333
Video Card(s) Gen7 Intel HD (4EU @ 311MHz)
Storage 32GB eMMC and 128GB Sandisk Extreme U3
Display(s) 10" IPS 1280x800 60Hz
Case Veddha T2
Audio Device(s) Apparently, yes
Power Supply Samsung 18W 5V fast-charger
Mouse MX Anywhere 2
Keyboard Logitech MX Keys (not Cherry MX at all)
VR HMD Samsung Oddyssey, not that I'd plug it into this though....
Software W10 21H1, barely
Benchmark Scores I once clocked a Celeron-300A to 564MHz on an Abit BE6 and it scored over 9000.
Rootkits are not the same as ring -2. They typically cannot survive a reinstall.
Yeah, I think my heavy-handed, scorched earth approach to anything AV can't tackle means that rootkits and ring -2 are identical to me. Both need BIOS reflash and disks secure-erased before a reinstall.
 
Joined
Aug 20, 2007
Messages
21,539 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Yeah, I think my heavy-handed, scorched earth approach to anything AV can't tackle means that rootkits and ring -2 are identical to me. Both need BIOS reflash and disks secure-erased before a reinstall.
At ring -2 you can't even necessarily trust bios reflash. Not unless using a hardware flasher anyways. Its serious suck level stuff.
 
Joined
Jun 19, 2024
Messages
130 (0.70/day)
The article mentions CVE-2023-31315 vulnerability. According to AMD's website, AGESA 1.2.0.1 will patch it for Ryzen 7000. According to my motherboard's support page, the latest BIOS with AGESA 1.2.0.0a patches CVE-2024-31315. Are these the same thing?

I think your motherboard support page is wrong, this is a 2023 vulnerability.

Yeah, I think my heavy-handed, scorched earth approach to anything AV can't tackle means that rootkits and ring -2 are identical to me. Both need BIOS reflash and disks secure-erased before a reinstall.

Malware installed this way can survive a reflash. For example that’s how pc anti-theft software works. Reflash, reinstall Windows, and it just gets reinstalled from the protected UEFI region.

 
Joined
Jun 1, 2021
Messages
310 (0.24/day)
Its 'critical' in terms of direct impact - its impossible to class it based on risk as everyone works differently. For sure the risk is high of someone inadvertently loading it. For those with locked down devices and effective endpoint security, the risk is probably quite low, but the impact wouldn't be any different if it somehow was triggered.
That is why actual security professionals use vector strings to describe the attacks and not 'critical'.

For this one it's:

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Which Translating it means, Attack Vector is Local, Attack Complexity is High, Privileges Required is High, User Interaction is None, Scope is Changed, Confidentiality Impact is High, Integrity Impact is High and Availability Impact is High.

While the attack is hard to execute, the impact of a successful execution is very high which is why it ends up with being a serious threat.

If I am not mistaken, I don`t think there has ever really been a Spectre and Meltdown exploit in the wild too, but everyone rushed to fix those. Spectre allowed you to read any memory at something like kilobytes per second(I don't remember if it could modify it too).
 
Joined
Mar 16, 2017
Messages
2,159 (0.76/day)
Location
Tanagra
System Name Budget Box
Processor Xeon E5-2667v2
Motherboard ASUS P9X79 Pro
Cooling Some cheap tower cooler, I dunno
Memory 32GB 1866-DDR3 ECC
Video Card(s) XFX RX 5600XT
Storage WD NVME 1GB
Display(s) ASUS Pro Art 27"
Case Antec P7 Neo
Kinda feels like we need a ROM bios with basic recovery features as a fallback, and a secondary flashable BIOS that can be wiped from orbit by the ROM BIOS. Or will that not even work?
 
Joined
May 13, 2010
Messages
6,081 (1.14/day)
System Name RemixedBeast-NX
Processor Intel Xeon E5-2690 @ 2.9Ghz (8C/16T)
Motherboard Dell Inc. 08HPGT (CPU 1)
Cooling Dell Standard
Memory 24GB ECC
Video Card(s) Gigabyte Nvidia RTX2060 6GB
Storage 2TB Samsung 860 EVO SSD//2TB WD Black HDD
Display(s) Samsung SyncMaster P2350 23in @ 1920x1080 + Dell E2013H 20 in @1600x900
Case Dell Precision T3600 Chassis
Audio Device(s) Beyerdynamic DT770 Pro 80 // Fiio E7 Amp/DAC
Power Supply 630w Dell T3600 PSU
Mouse Logitech G700s/G502
Keyboard Logitech K740
Software Linux Mint 20
Benchmark Scores Network: APs: Cisco Meraki MR32, Ubiquiti Unifi AP-AC-LR and Lite Router/Sw:Meraki MX64 MS220-8P
The timing of this whole thing is sus...

Intel hired them to cover up the 1314gate
 
Joined
Jun 20, 2024
Messages
402 (2.17/day)
Kinda feels like we need a ROM bios with basic recovery features as a fallback, and a secondary flashable BIOS that can be wiped from orbit by the ROM BIOS. Or will that not even work?
Yep, it could be done... maybe on a removable chip just in case it needs to be reprogrammed to include new product support, etc...
 
Joined
Dec 1, 2022
Messages
250 (0.33/day)
Kinda feels like we need a ROM bios with basic recovery features as a fallback, and a secondary flashable BIOS that can be wiped from orbit by the ROM BIOS. Or will that not even work?
Having a ROM chip in a socket would be nice also, and I miss when even cheaper boards had dual BIOS. I wonder if dual BIOS would work if the secondary BIOS could only be used with a physical switch.
 
Joined
May 13, 2010
Messages
6,081 (1.14/day)
System Name RemixedBeast-NX
Processor Intel Xeon E5-2690 @ 2.9Ghz (8C/16T)
Motherboard Dell Inc. 08HPGT (CPU 1)
Cooling Dell Standard
Memory 24GB ECC
Video Card(s) Gigabyte Nvidia RTX2060 6GB
Storage 2TB Samsung 860 EVO SSD//2TB WD Black HDD
Display(s) Samsung SyncMaster P2350 23in @ 1920x1080 + Dell E2013H 20 in @1600x900
Case Dell Precision T3600 Chassis
Audio Device(s) Beyerdynamic DT770 Pro 80 // Fiio E7 Amp/DAC
Power Supply 630w Dell T3600 PSU
Mouse Logitech G700s/G502
Keyboard Logitech K740
Software Linux Mint 20
Benchmark Scores Network: APs: Cisco Meraki MR32, Ubiquiti Unifi AP-AC-LR and Lite Router/Sw:Meraki MX64 MS220-8P
Can’t tell if serious.
do you know what's going on w intel right?

Kinda feels like we need a ROM bios with basic recovery features as a fallback, and a secondary flashable BIOS that can be wiped from orbit by the ROM BIOS. Or will that not even work?
dual bios is doable. even routers have that... my meraki has a rapid failover in case the other is corrupted or doesn't boot it boots from the prev version.

The concern for your average user with administrator privileges, which is like 99.9% of home users is very much there.
Especially if they use pirated software or cheat software which makes you turn off your anti virus software
I've even seen legitimate printer drivers trigger antivirus warnings forcing me to turn off protection to be able to install the device.

So, yes it's important this patch gets pushed and I hope it happens automatically trough a windows update or something so tech illiterate's machines get patched too.
ppl should have rejected those anti cheats to begin with they were always a bad idea and people were too desperate to play some games they complied.
 
Joined
Jun 20, 2024
Messages
402 (2.17/day)
The only real issue with removable BIOSimplementations these days would probably revolve around TPM/secure boot, etc.
Arguably, you could have a removable TPM/BIOS chip seeing as both have a 'secure enclave' which could be rewritten via unknown malicious means - if mistakingly removed as long as it's restored back to the board/boot device it would work as normal.
 
Joined
Aug 20, 2007
Messages
21,539 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
I don`t think there has ever really been a Spectre and Meltdown exploit in the wild too, but everyone rushed to fix those.
The answer as to why is in the second portion of your sentence.

Meltdown was a shockingly easy form of privledge escalation. The only reason it wasn't exploited more was widespread patching.
 
Joined
May 13, 2010
Messages
6,081 (1.14/day)
System Name RemixedBeast-NX
Processor Intel Xeon E5-2690 @ 2.9Ghz (8C/16T)
Motherboard Dell Inc. 08HPGT (CPU 1)
Cooling Dell Standard
Memory 24GB ECC
Video Card(s) Gigabyte Nvidia RTX2060 6GB
Storage 2TB Samsung 860 EVO SSD//2TB WD Black HDD
Display(s) Samsung SyncMaster P2350 23in @ 1920x1080 + Dell E2013H 20 in @1600x900
Case Dell Precision T3600 Chassis
Audio Device(s) Beyerdynamic DT770 Pro 80 // Fiio E7 Amp/DAC
Power Supply 630w Dell T3600 PSU
Mouse Logitech G700s/G502
Keyboard Logitech K740
Software Linux Mint 20
Benchmark Scores Network: APs: Cisco Meraki MR32, Ubiquiti Unifi AP-AC-LR and Lite Router/Sw:Meraki MX64 MS220-8P
So you’re saying Intel had the foresight to leak this vulnerability to a security company back in October, knowing that AMD would announce it right when Intel is releasing voltage patches the following August.

congrats, you’ve left me speechless.
The media made the stink about it at the same time
 
Top