• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

AMD "Zen 1" to "Zen 4" Processors Affected by Microcode Signature Verification Vulnerability

AleksandarK

News Editor
Staff member
Joined
Aug 19, 2017
Messages
2,763 (1.01/day)
Google Security Research team has just published its latest research on a fundamental flaw in the microcode patch verification system that affects AMD processors from "Zen 1" through "Zen 4" generations. The vulnerability stems from an inadequate hash function implementation in the CPU's signature validation process for microcode updates, enabling attackers with local administrator privileges (ring 0 from outside a VM) to inject malicious microcode patches, potentially compromising AMD SEV-SNP-protected confidential computing workloads and Dynamic Root of Trust Measurement systems. Google disclosed this high-severity issue to AMD on September 25, 2024, leading to AMD's release of an embargoed fix to customers on December 17, 2024, with public disclosure following on February 3, 2025; however, due to the complexity of supply chain dependencies and remediation requirements, comprehensive technical details are being withheld until March 5, 2025, allowing organizations time to implement necessary security measures and re-establish trust in their confidential compute environments.

AMD has released comprehensive mitigation measures through AGESA firmware updates across its entire EPYC server processor lineup, from the first-generation Naples to the latest Genoa-X and Bergamo architectures. The security patch, designated as CVE-2024-56161 with a high severity rating of 7.2, introduces critical microcode updates: Naples B2 processors require uCode version 0x08001278, Rome B0 systems need 0x0830107D, while Milan and Milan-X variants mandate versions 0x0A0011DB and 0x0A001244 respectively. For the latest Genoa-based systems, including Genoa-X and Bergamo/Siena variants, the required microcode versions are 0x0A101154, 0x0A10124F, and 0x0AA00219. These updates implement robust protections across all SEV security features - including SEV, SEV-ES, and SEV-SNP - while introducing new restrictions on microcode hot-loading capabilities to prevent future exploitation attempts.



View at TechPowerUp Main Site | Source
 
Joined
Jun 29, 2018
Messages
560 (0.23/day)
A very interesting side-effect from this patch is that Rome and Naples (EPYC 7001 and 7002) will lose the ability to update microcode at runtime:
Microcode cannot be hot-loaded after updating to this PI version
This means that only BIOS updates will be able to deliver future microcode updates to those CPUs which somewhat limits potential security guarantees as some vendors have a spotty record with timely BIOS releases (looking at you here, ASRock Rack).
For Milan and Genoa (7003 and 9004) a similar, but more manageable issue occurs. This particular fix has to be delivered by the BIOS vendor or any future microcode update at runtime will fail (probably because the cryptography changes).
 
Joined
Jan 14, 2019
Messages
14,100 (6.37/day)
Location
Midlands, UK
Processor Various Intel and AMD CPUs
Motherboard Micro-ATX and mini-ITX
Cooling Yes
Memory Overclocking is overrated
Video Card(s) Various Nvidia and AMD GPUs
Storage A lot
Display(s) Monitors and TVs
Case The smaller the better
Audio Device(s) Speakers and headphones
Power Supply 300 to 750 W, bronze to gold
Mouse Wireless
Keyboard Mechanic
VR HMD Not yet
Software Linux gaming master race
So basically you need to perform a microcode (BIOS) update with malicious code in it to execute it? I wonder how it got such a high severity rating.
 
Joined
Nov 27, 2023
Messages
2,753 (6.31/day)
System Name The Workhorse
Processor AMD Ryzen R9 5900X
Motherboard Gigabyte Aorus B550 Pro
Cooling CPU - Noctua NH-D15S Case - 3 Noctua NF-A14 PWM at the bottom, 2 Fractal Design 180mm at the front
Memory GSkill Trident Z 3200CL14
Video Card(s) NVidia GTX 1070 MSI QuickSilver
Storage Adata SX8200Pro
Display(s) LG 32GK850G
Case Fractal Design Torrent (Solid)
Audio Device(s) FiiO E-10K DAC/Amp, Samson Meteorite USB Microphone
Power Supply Corsair RMx850 (2018)
Mouse Razer Viper (Original) on a X-Raypad Equate Plus V2
Keyboard Cooler Master QuickFire Rapid TKL keyboard (Cherry MX Black)
Software Windows 11 Pro (24H2)
As always with these vulnerabilities, they sound scarier than they are and completely irrelevant for home users. If someone has a full physical access to a PC with a local admin privilege… yeah, you have multiple problems to worry about all at once. For enterprise this is obviously a different issue.
 
Joined
Jun 29, 2018
Messages
560 (0.23/day)
As always with these vulnerabilities, they sound scarier than they are and completely irrelevant for home users. If someone has a full physical access to a PC with a local admin privilege… yeah, you have multiple problems to worry about all at once. For enterprise this is obviously a different issue.
Physical access isn't required, local administrative access is enough. That can be theoretically achieved for example by visiting a website with a vulnerable browser and chaining another vulnerability to exploit the host system. This is a complex attack so the severity rating is only 7.2 out of 10 (while it is "high" it's a low high ;) ). As you wrote it's not something a normal PC user should worry about.
I am curious if there's a difference between Ryzen and EPYC microcode loading since Ryzens also can perform runtime updates. Will there be a separate AGESA update to address this?
 
Joined
Jan 14, 2019
Messages
14,100 (6.37/day)
Location
Midlands, UK
Processor Various Intel and AMD CPUs
Motherboard Micro-ATX and mini-ITX
Cooling Yes
Memory Overclocking is overrated
Video Card(s) Various Nvidia and AMD GPUs
Storage A lot
Display(s) Monitors and TVs
Case The smaller the better
Audio Device(s) Speakers and headphones
Power Supply 300 to 750 W, bronze to gold
Mouse Wireless
Keyboard Mechanic
VR HMD Not yet
Software Linux gaming master race
Physical access isn't required, local administrative access is enough. That can be theoretically achieved for example by visiting a website with a vulnerable browser and chaining another vulnerability to exploit the host system. This is a complex attack so the severity rating is only 7.2 out of 10 (while it is "high" it's a low high ;) ). As you wrote it's not something a normal PC user should worry about.
I am curious if there's a difference between Ryzen and EPYC microcode loading since Ryzens also can perform runtime updates. Will there be a separate AGESA update to address this?
But something has to be executed locally on your PC... something you downloaded or obtained from other sources, something with a microcode update in it. Right?

I mean, some basic browsing skills (not clicking on suspicious links, not downloading anything unverified, etc.) should mitigate the issue, I suppose.
 
Joined
Jun 29, 2018
Messages
560 (0.23/day)
But something has to be executed locally on your PC... something you downloaded or obtained from other sources, something with a microcode update in it. Right?
Yes, but "downloaded" in this context doesn't necessarily mean conscious user action.
I mean, some basic browsing skills (not clicking on suspicious links, not downloading anything unverified, etc.) should mitigate the issue, I suppose.
Unfortunately this often isn't enough. There have been instances when browser exploits required no user interaction other than visiting a site. Malicious ads are also a vector of delivery so even if you're careful and visit only "safe sites" you can be infected. Web browsers are extremely complex pieces of software that face constant attack attempts. You can take a look at a few of 0-day vulnerabilities in Chrome just for the first half of 2024. It's an ongoing cat-and-mouse game. Keeping your browser automatically updated mitigates most of those issues, but by no means makes you immune.

On the other hand this particular AMD issue is so specific that the risk to normal users is almost 0. I doubt anyone would bother creating a widespread attack for it, but targeted attacks by state-level agencies are another matter ;)
 
Joined
Jan 14, 2019
Messages
14,100 (6.37/day)
Location
Midlands, UK
Processor Various Intel and AMD CPUs
Motherboard Micro-ATX and mini-ITX
Cooling Yes
Memory Overclocking is overrated
Video Card(s) Various Nvidia and AMD GPUs
Storage A lot
Display(s) Monitors and TVs
Case The smaller the better
Audio Device(s) Speakers and headphones
Power Supply 300 to 750 W, bronze to gold
Mouse Wireless
Keyboard Mechanic
VR HMD Not yet
Software Linux gaming master race
Yes, but "downloaded" in this context doesn't necessarily mean conscious user action.

Unfortunately this often isn't enough. There have been instances when browser exploits required no user interaction other than visiting a site. Malicious ads are also a vector of delivery so even if you're careful and visit only "safe sites" you can be infected. Web browsers are extremely complex pieces of software that face constant attack attempts. You can take a look at a few of 0-day vulnerabilities in Chrome just for the first half of 2024. It's an ongoing cat-and-mouse game. Keeping your browser automatically updated mitigates most of those issues, but by no means makes you immune.

On the other hand this particular AMD issue is so specific that the risk to normal users is almost 0. I doubt anyone would bother creating a widespread attack for it, but targeted attacks by state-level agencies are another matter ;)
In that case, let's hope that motherboard manufacturers come out with updated BIOSes with the new microcode soon enough.
 
Joined
Jun 14, 2020
Messages
4,281 (2.52/day)
System Name Mean machine
Processor AMD 6900HS
Memory 2x16 GB 4800C40
Video Card(s) AMD Radeon 6700S
At it again, sacrificing safety for cheating on performance metrics.

Performance regressions incoming.
 
Joined
Nov 26, 2021
Messages
1,815 (1.56/day)
Location
Mississauga, Canada
Processor Ryzen 7 5700X
Motherboard ASUS TUF Gaming X570-PRO (WiFi 6)
Cooling Noctua NH-C14S (two fans)
Memory 2x16GB DDR4 3200
Video Card(s) Reference Vega 64
Storage Intel 665p 1TB, WD Black SN850X 2TB, Crucial MX300 1TB SATA, Samsung 830 256 GB SATA
Display(s) Nixeus NX-EDG27, and Samsung S23A700
Case Fractal Design R5
Power Supply Seasonic PRIME TITANIUM 850W
Mouse Logitech
VR HMD Oculus Rift
Software Windows 11 Pro, and Ubuntu 20.04
Physical access isn't required, local administrative access is enough. That can be theoretically achieved for example by visiting a website with a vulnerable browser and chaining another vulnerability to exploit the host system. This is a complex attack so the severity rating is only 7.2 out of 10 (while it is "high" it's a low high ;) ). As you wrote it's not something a normal PC user should worry about.
I am curious if there's a difference between Ryzen and EPYC microcode loading since Ryzens also can perform runtime updates. Will there be a separate AGESA update to address this?
Yes, it's surprising that AMD's note only lists EPYC generations, not Ryzens.

Performance regressions incoming.
I doubt that this would cause a performance regression as the fix won't disable or slow down a critical part of the processor's microarchitecture.
 
Joined
Jun 29, 2018
Messages
560 (0.23/day)
Yes, it's surprising that AMD's note only lists EPYC generations, not Ryzens.
I have a suspicion as to why. This particular security bulletin is about SEV (Secured Encrypted Virtualization) which is an enterprise feature absent from Ryzens and even AM5 EPYC 4004.
The microcode runtime update vulnerability is probably also present in Ryzens, is definitely present in Ryzens since Google's PoC worked on a laptop chip, but not disclosed by AMD yet. I guess it will be added to AGESA at a later date.
 

Count von Schwalbe

Nocturnus Moderatus
Staff member
Joined
Nov 15, 2021
Messages
3,284 (2.79/day)
Location
Knoxville, TN, USA
System Name Work Computer | Unfinished Computer
Processor Core i7-6700 | Ryzen 5 5600X
Motherboard Dell Q170 | Gigabyte Aorus Elite Wi-Fi
Cooling A fan? | Truly Custom Loop
Memory 4x4GB Crucial 2133 C17 | 4x8GB Corsair Vengeance RGB 3600 C26
Video Card(s) Dell Radeon R7 450 | RTX 2080 Ti FE
Storage Crucial BX500 2TB | TBD
Display(s) 3x LG QHD 32" GSM5B96 | TBD
Case Dell | Heavily Modified Phanteks P400
Power Supply Dell TFX Non-standard | EVGA BQ 650W
Mouse Monster No-Name $7 Gaming Mouse| TBD
At it again, sacrificing safety for cheating on performance metrics.

Performance regressions incoming.
This doesn't seem to be related to any part of the actual data processing, unlike speculative execution side-channel attacks. Just another security hole in update process code. I can't see how it would affect performance in any way to straight up delete that functionality, let alone patch it.
 
Joined
Jul 31, 2024
Messages
718 (3.80/day)
As always with these vulnerabilities, they sound scarier than they are and completely irrelevant for home users.

I agree on this CVE. Generic I disagree.

If understood correctly what I saw hours ago it is about epyc processors - or milan whatever they call these server cpus.

I wondered if my Ryzen is affected or not.

But something has to be executed locally on your PC... something you downloaded or obtained from other sources, something with a microcode update in it. Right?

I'm very happy that certain package manager use now keys to verify downloads and checksums to verify downloads. A big improvement for a few years. Windows can not do that afaik. You download something and hope that computerbase.de/download has a clean download for software vlc, microsoft windows, intel driver, and so on. Let's trust the windows software download server and companies

This is a generic statement that I have to download every single windows 11 pro 24h2 software by hand, store it and execute the installer by hand.

powershell scripts which install modules which only nerds know about like winget do not count for the usual consumer.

browser exploits

i doubt those websites like pcgameshardware.de to name someone who is not here - check every single advertisement file by a human person.
I'm not implying using an adblocker may be a security enhancement feature.
 
Last edited:
Top