Yesterday, AMD disclosed the SMM Callout Privilege Escalation (CVE-2020-12890) vulnerability that affects the chipmaker's client and embedded APUs that came out between 2016 and 2019.
SMM Callout Privilege Escalation, which security research Danny Odler discovered, enables an attacker with physical or administrative access to the victim system to manipulate the AMD Generic Encapsulated Software Architecture (AGESA) microcode inside the motherboard's firmware. This allows for the execution of malicious code that's not detectable by the operating system.
Luckily, this vulnerability can be mitigated with a simple microcode update, which seemingly doesn't bear a performance impact on the system. AMD has already distributed updated versions of its AGESA microcodes to its motherboard partners and will deliver the remaining versions by the end of this month.
As usual, AMD recommends users to update their systems to the latest firmware once it's available.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.

Zhiye Liu is a news editor and memory reviewer at Tom’s Hardware. Although he loves everything that’s hardware, he has a soft spot for CPUs, GPUs, and RAM.