Yesterday, AMD disclosed the SMM Callout Privilege Escalation (opens in new tab) (CVE-2020-12890) vulnerability that affects the chipmaker's client and embedded APUs that came out between 2016 and 2019.
SMM Callout Privilege Escalation, which security research Danny Odler discovered, enables an attacker with physical or administrative access to the victim system to manipulate the AMD Generic Encapsulated Software Architecture (AGESA) microcode inside the motherboard's firmware (opens in new tab). This allows for the execution of malicious code that's not detectable by the operating system.
Luckily, this vulnerability can be mitigated with a simple microcode update, which seemingly doesn't bear a performance impact on the system. AMD has already distributed updated versions of its AGESA microcodes to its motherboard partners and will deliver the remaining versions by the end of this month.
As usual, AMD recommends users to update their systems to the latest firmware once it's available.