AMD confirms security vulnerability on Zen 5-based CPUs that generates potentially predictable keys — RDSEED fix coming through an AGESA firmware update for desktop chips

EPYC Turin
(Image credit: AMD)

AMD has confirmed the existence of RDSEED failure on CPUs based on its latest Zen 5 architecture, a critical security vulnerability in its hardware-based random number generator. The company has confirmed the fault could lead to the random number generator putting out keys that aren't fully unpredictable, opening up a vulnerability to users.

AMD is labeling the fault "AMD-SB-7055" and classifying it as a high-severity issue. Mitigations for the issues are rolling out now through January 2026, depending on the CPU mode. For instance, AMD has already rolled out mitigations of the issue for EPYC 9005 CPUs. Mitigations for AMD's consumer-based Zen 5 chips, including the Ryzen 9000 series, AI Max 300 series, Threadripper 9000 series, and Ryzen Z2 series, are coming out on November 25th.

Google Preferred Source

Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.

TOPICS
Aaron Klotz
Contributing Writer

Aaron Klotz is a contributing writer for Tom’s Hardware, covering news related to computer hardware such as CPUs, and graphics cards.

  • JRStern
    >hardware-based random number generator

    Kinky. How long has this been going on?

    Computer processors have offered hardware-based random number generators since at least 1951 with the Ferranti Mark 1, which used electrical noise to generate random bits. However, more modern, widely available on-chip hardware random number generators like Intel's RDRAND instruction were introduced much later, starting around 2012 with the Ivy Bridge architecture, with AMD adding support in 2015.
    Hah! Who knew, not me.

    I did test out Microsoft's random number generator API a few years back and was pretty amazed, I didn't test its randomness but at least I was able to generate millions without a duplicate. Didn't know it was done with hardware support but looks like it would have been.
    Reply
  • DS426
    Two questions for the Linux community: why wouldn't devs switch the Linux kernel to forced used of 64-bit RDSEED instead of disabling it entirely on Zen 5? What is used as the next-in-line alternative as a truly random number seed generator?

    Just curious.
    Reply
  • DS426
    JRStern said:
    >hardware-based random number generator

    Kinky. How long has this been going on?


    Hah! Who knew, not me.

    I did test out Microsoft's random number generator API a few years back and was pretty amazed, I didn't test its randomness but at least I was able to generate millions without a duplicate. Didn't know it was done with hardware support but looks like it would have been.
    It gets even more sexy when they starting talking about entropy.
    Reply
  • JRStern
    DS426 said:
    It gets even more sexy when they starting talking about entropy.
    Yah. I know some about this, and some small amount about encryption keys, and have been noodling around prime numbers for the last week. There is some strange and wonderful stuff floating around, that people have done. If your keys are so long, and so hard to break, then why do they have to be random, too? I don't care so much about crypto, my main concern was generating globally unique keys, a somewhat different game, but hey.
    Reply
  • DS426
    JRStern said:
    ...If your keys are so long, and so hard to break, then why do they have to be random, too?...
    Long keys and hard to break are two different things. Long numbers or character strings are hard to guess using brute force. Keys are hard to break when they are both long and their seed is unpredictable. If you can predict the seed, you can calculate the long number or character string of the key just as cryptography uses in the first place to initially generate the key. If the seed is unpredictable due to high entropy, you're able to have proper crypto, such as the Public Key Cryptography like TLS (previously SSL) that secures data across the dangerous internet.

    If you're just looking to get a random value from whatever input and don't need reversible encryption, you can use something like SHA256 or higher to generate a character string from a file or whatever binary object. As long as the binary data is different, the result will always be different (ignoring collisions which become exponentially less likely for longer SHA functions like SHA512). Just be aware it's a deterministic function.

    Might not be practical for what you're trying to do but just some food for thought.
    Reply
  • phxrider
    What does this affect that the average person would use (not cryptography developers)?

    Not arguing against keeping chipset drivers up to date, just determining what the rational freak-out level is.
    Reply