AMD discloses slew of high severity security vulnerabilities that attacks BIOS chips on Zen systems — updates aren't available for all chips, finally a fix Zenbleed

AMD
(Image credit: AMD)

AMD has disclosed four vulnerabilities found in its Zen-based CPUs, ranging from the original Zen chips to the latest Zen 4 processors, and not all impacted chips have a readily available BIOS version to correct the issue. The vulnerabilities, which compromise the security of the SPI interface that connects to the flash chip that stores your BIOS, affect different generations of different Zen CPUs — not all processors are vulnerable to all four bugs. AMD is patching the vulnerabilities through new versions of AGESA, which is the base code for motherboard BIOSes. However, not all motherboard vendors have released new updates with the patched AGESA.

Though distinct, the four vulnerabilities hinge on the SPI interface that connects the CPU to the chip on the motherboard where the system firmware is stored. Exploiting these vulnerabilities could allow hackers to perform denial of service attacks, escalate privileges, and even execute arbitrary code. That last one can be particularly scary, as arbitrary code execution essentially means tricking a computer into running code, and that code could really be anything. However, any attack would require local access to the affected system, meaning that it would take an especially vigilant attacker to exploit the vulnerability. 

Fixing these vulnerabilities involves updating the AGESA, which is an integral part of the BIOS for AMD CPUs. AMD has already released new AGESA versions for nearly all of its processors. For Zen 2-based chips, in particular, many of these new AGESAs also patch Zenbleed, which was disclosed last year. However, while AGESA 1.2.0.B will patch these latest exploits for Ryzen CPUs using the Zen 2 architecture, you'll also need version 1.2.0.C to protect against Zenbleed.

Swipe to scroll horizontally
Processor SeriesPatched AGESAAvailability to OEMs
Ryzen 3000ComboAM4v2PI 1.2.0.BSince August 25
Ryzen 3000 MobilePicassoPI-FP5 1.0.1.0Since May 31
Athlon 3000ComboAM4v2PI 1.2.0.BSince August 25
Ryzen 4000RenoirPI-FP6 1.0.0.DTarget February
Ryzen 4000GComboAM4v2PI 1.2.0.CSince February 7
Ryzen 5000ComboAM4v2PI 1.2.0.BSince August 25
Ryzen 5000GComboAM4v2PI 1.2.0.CSince February 7
Ryzen 5000 MobileCezannePI-FP6 1.0.1.0Since January 25
Ryzen 6000/7035RembrandtPI-FP7 1.0.0.ASince December 28
Ryzen 7000ComboAM5PI 1.0.0.8Since August 29
Ryzen 7020MendocinoPI-FT6 1.0.0.6Since January 3
Ryzen 7040PhoenixPI-FP8-FP7 1.1.0.0Since October 6
Ryzen 7045DragonRangeFL1PI 1.0.0.3bSince August 30

The latest AGESA versions from months ago also protect Epyc CPUs, and Threadripper received its AGESA update in January. Threadripper 7000, however, isn't mentioned in the disclosure, which may mean AMD learned of the vulnerabilities in time to ensure its latest HEDT CPUs never shipped with a buggy AGESA. Only two of AMD's embedded CPUs don't yet have a secure AGESA, which is scheduled to arrive in April.

Swipe to scroll horizontally
Processor SeriesPatched AGESAAvailability to OEMs
1st Gen EpycNaplesPI 1.0.0.KSince April 27
2nd Gen EpycRomePI 1.0.0.HSince November 11
3rd Gen EpycMilanPI 1.0.0.CSince December 18
4th Gen EpycGenoaPI 1.0.0.8Since June 9
Threadripper 3000CastlePeakPI-SP3r3 1.0.0.ASince November 21
Threadripper Pro 3000WXCastlePeakWSPI-sWRX8 1.0.0.CSince November 29
Threadripper Pro 5000WXChagallWSPI-sWRX8 1.0.0.7Since January 11
Epyc Embedded 3000Snowyowl PI 1.1.0.BSince December 15
Epyc Embedded 7002EmbRomePI-SP3 1.0.0.BSince December 15
Epyc Embedded 7003EmbMilanPI-SP3 1.0.0.8Since January 15
Epyc Embedded 9003EmbGenoaPI-SP5 1.0.0.3Since September 15
Ryzen Embedded R1000EmbeddedPI-FP5 1.2.0.ASince July 31
Ryzen Embedded R2000EmbeddedPI-FP5 1.0.0.2Since July 31
Ryzen Embedded 5000EmbAM4PI 1.0.0.4Since September 22
Ryzen Embedded V1000EmbeddedPI-FP5 1.2.0.ASince July 31
Ryzen Embedded V2000EmbeddedPI-FP6 1.0.0.9Target April
Ryzen Embedded V3000EmbeddedPI-FP7r2 1.0.0.9Target April

Of course, new AGESA versions have to be distributed via new BIOS versions, which means even if a new AGESA is technically available, it could be a while before it reaches motherboards. For Epyc, embedded, and mobile CPUs, it's difficult to say how many motherboards offer a BIOS with the latest AGESA version, but for consumer Ryzen and Threadripper boards, this info is far more available and easier to find. We've looked at desktop motherboards from the big four vendors, and here's how they stand when it comes to AGESA versions.

Swipe to scroll horizontally
AGESA Versions For Major AMD Motherboard Vendors*
Row 0 - Cell 0 300 Series400 Series500 SeriesTRX40WRX80600 Series
AsusComboAM4v2PI 1.2.0.AComboAM4v2PI 1.2.0.BComboAM4v2PI 1.2.0.BCastlePeakPI-SP3r3 1.0.0.7ChagallPI-SP3r3 1.0.0.5ComboAM5PI 1.1.0.2b
ASRockComboAM4v2PI 1.2.0.BComboAM4v2PI 1.2.0.BComboAM4v2PI 1.2.0.BCastlePeakPI-SP3r3 1.0.0.9ChagallPI-SP3r3 1.0.0.6ComboAM5PI 1.1.0.2b
GigabyteComboAM4v2PI 1.2.0.BComboAM4v2PI 1.2.0.BComboAM4v2PI 1.2.0.BCastlePeakPI-SP3r3 1.0.0.7ChagallPI-SP3r3 1.0.0.6ComboAM5PI 1.1.0.2b
MSIComboAM4v2PI 1.2.0.AComboAM4v2PI 1.2.0.AComboAM4v2PI 1.2.0.BCastlePeakPI-SP3r3 1.0.0.4Unknown, but unpatchedComboAM5PI 1.1.0.2b

* Not a comprehensive list and may not be true for all motherboards

AM5 motherboards are seemingly completely patched for the four vulnerabilities, which means computers using Ryzen 7000 and Ryzen 8000 chips should be fine. As mentioned previously, AMD didn't make any disclosures for Threadripper 7000, which should mean TRX50 and WRX90 motherboards are also in the clear.

Unfortunately, for users of AMD's last-generation sockets, updates haven't been as rapid as they have been for AM5. As far as we could tell, no AM4 motherboards thus far offer a BIOS using AGESA version 1.2.0.C, which means Ryzen 4000G and 5000G APUs are vulnerable no matter who your motherboard maker is. AGESA version 1.2.0.B is broadly available on every 500 series board from the four big vendors, but the same can't be said for the 300 and 400 series. Asus's and MSI's 300 series boards are still on version 1.2.0.A, as are MSI's 400 series boards.

Meanwhile, TRX40 for the Threadripper 3000 series is mostly safe, except MSI hasn't updated its TRX40 boards since version 1.0.0.4. However, it seems Threadripper Pro 3000WX and 5000WX have gotten the short end of the stick by far, as the WRX80 socket is completely vulnerable no matter what vendor you're with. Hopefully, this is just because the AGESA versions haven't been out for very long.

Matthew Connatser

Matthew Connatser is a freelancing writer for Tom's Hardware US. He writes articles about CPUs, GPUs, SSDs, and computers in general.

  • HopefulToad
    Are these the type of "vulnerabilities" where an attacker basically needs to already have access to your system to take advantage of them?

    If not, could someone more knowledgeable on this type of thing give an example scenario of how an unsuspecting user could fall victim to one of these vulnerabilities?
    Reply
  • FunSurfer
    ^ Yes, how exactly the hacker access the SPI interface that connects the CPU to the chip on the motherboard?
    Reply
  • Order 66
    HopefulToad said:
    Are these the type of "vulnerabilities" where an attacker basically needs to already have access to your system to take advantage of them?

    If not, could someone more knowledgeable on this type of thing give an example scenario of how an unsuspecting user could fall victim to one of these vulnerabilities?
    Good luck getting physical access to a system if it is at a user's house. I don't understand why these vulnerabilities even matter for most people with desktop PCs at work or home.
    Reply
  • AgentBirdnest
    HopefulToad said:
    Are these the type of "vulnerabilities" where an attacker basically needs to already have access to your system to take advantage of them?

    If not, could someone more knowledgeable on this type of thing give an example scenario of how an unsuspecting user could fall victim to one of these vulnerabilities?
    Wondering the same thing. I generally don't like to update my BIOS if I don't need to, so I'd like to know if I really should or not.
    Because if the hacker has to physically be sitting at my PC, here in my bedroom, then I've got much bigger problems to worry about than being hacked.
    Reply
  • Order 66
    AgentBirdnest said:
    Wondering the same thing. I generally don't like to update my BIOS if I don't need to, so I'd like to know if I really should or not.
    Because if the hacker has to physically be sitting at my PC, here in my bedroom, then I've got much bigger problems to worry about than being hacked.
    exactly my point. I don't really think about updating my bios very often, even though I probably should, now that you mention it.
    Reply
  • Makaveli
    Still waiting for AGESA version 1.2.0.C for my asus board which I thought they said was going to be released end of 2023 I guess not!

    FunSurfer said:
    ^ Yes, how exactly the hacker access the SPI interface that connects the CPU to the chip on the motherboard?
    Physical access?
    Reply
  • Notton
    I didn't see ryzen 4000 mobile on the list.
    Is the list incomplete, or is 4000 mobile somehow not affected?
    Reply
  • USAFRet
    Order 66 said:
    Good luck getting physical access to a system if it is at a user's house. I don't understand why these vulnerabilities even matter for most people with desktop PCs at work or home.
    Amazingly, there are LOTS of systems that exist in places other than your bedroom.

    Aircraft manufacturer offices, nighttime cleaning crew...
    Reply
  • Order 66
    USAFRet said:
    Amazingly, there are LOTS of systems that exist in places other than your bedroom.

    Aircraft manufacturer offices, nighttime cleaning crew...
    Which is why I said for most users with desktop PCs at home or work. I understand that there are systems that are vulnerable to this type of attack, but I was trying to make the point that for the vast majority of people who have their PCs at home, this is not a concern. You could make the argument that desktop PCs at the workplace are more vulnerable, I guess.
    Reply
  • USAFRet
    Order 66 said:
    Which is why I said for most users with desktop PCs at home or work. I understand that there are systems that are vulnerable to this type of attack, but I was trying to make the point that for the vast majority of people who have their PCs at home, this is not a concern. You could make the argument that desktop PCs at the workplace are more vulnerable, I guess.
    Right.
    For your system and my system at home, not really a concern.

    For other people, it IS a concern.

    Not everything revolves around you or the typical home user.
    Reply