A dangerous vulnerability that has existed for 18 years threatens millions of AMD Ryzen and EPYC CPUs
Millions of computers running AMD Ryzen and EPYC CPUs worldwide are exposed to a dangerous vulnerability that allows attackers to run malicious code on the CPU when they are in System Management Mode, a sensitive mode that contains important firmware files.
The new vulnerability is called 'Sinkclose'. Hackers need to have deep access to computers or servers that operate on AMD processing systems to exploit this vulnerability. They can use bootkit malware - a type of malicious code that is difficult to detect and difficult to patch, to exploit vulnerabilities, thereby penetrating and controlling the system. Hackers will then install malware that is difficult to detect and can even persist even after reinstalling the operating system.
Although only recently reported, Sinkclose appears to have existed in many of AMD's CPU product lines, from desktops, workstations, servers to embedded devices and graphics solutions, for 18 years. pass without being detected.
AMD was notified about this vulnerability 10 months ago. The company has confirmed the existence of the Sinkclose vulnerability and has released patches for EPYC and Ryzen CPUs. The company also provides software and firmware patches to minimize the impact of the vulnerability.
To patch the vulnerability to ensure the safety of your system, AMD recommends that users update the latest BIOS.
- Top best CPU for PC 2020
- Will AMD make last-minute changes to 'save' the Ryzen 9000 CPU line?
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to now
- AMD announced the Ryzen 3 3300X and Ryzen 3 3100 CPUs for desktops
- Are AMD Ryzen CPUs suitable for gaming?
- How to choose AMD CPU