AMD discloses slew of high severity security vulnerabilities that attacks BIOS chips on Zen systems — updates aren't available for all chips, finally a fix Zenbleed
Update your BIOS ASAP.
AMD has disclosed four vulnerabilities found in its Zen-based CPUs, ranging from the original Zen chips to the latest Zen 4 processors, and not all impacted chips have a readily available BIOS version to correct the issue. The vulnerabilities, which compromise the security of the SPI interface that connects to the flash chip that stores your BIOS, affect different generations of different Zen CPUs — not all processors are vulnerable to all four bugs. AMD is patching the vulnerabilities through new versions of AGESA, which is the base code for motherboard BIOSes. However, not all motherboard vendors have released new updates with the patched AGESA.
Though distinct, the four vulnerabilities hinge on the SPI interface that connects the CPU to the chip on the motherboard where the system firmware is stored. Exploiting these vulnerabilities could allow hackers to perform denial of service attacks, escalate privileges, and even execute arbitrary code. That last one can be particularly scary, as arbitrary code execution essentially means tricking a computer into running code, and that code could really be anything. However, any attack would require local access to the affected system, meaning that it would take an especially vigilant attacker to exploit the vulnerability.
Fixing these vulnerabilities involves updating the AGESA, which is an integral part of the BIOS for AMD CPUs. AMD has already released new AGESA versions for nearly all of its processors. For Zen 2-based chips, in particular, many of these new AGESAs also patch Zenbleed, which was disclosed last year. However, while AGESA 1.2.0.B will patch these latest exploits for Ryzen CPUs using the Zen 2 architecture, you'll also need version 1.2.0.C to protect against Zenbleed.
Processor Series | Patched AGESA | Availability to OEMs |
Ryzen 3000 | ComboAM4v2PI 1.2.0.B | Since August 25 |
Ryzen 3000 Mobile | PicassoPI-FP5 1.0.1.0 | Since May 31 |
Athlon 3000 | ComboAM4v2PI 1.2.0.B | Since August 25 |
Ryzen 4000 | RenoirPI-FP6 1.0.0.D | Target February |
Ryzen 4000G | ComboAM4v2PI 1.2.0.C | Since February 7 |
Ryzen 5000 | ComboAM4v2PI 1.2.0.B | Since August 25 |
Ryzen 5000G | ComboAM4v2PI 1.2.0.C | Since February 7 |
Ryzen 5000 Mobile | CezannePI-FP6 1.0.1.0 | Since January 25 |
Ryzen 6000/7035 | RembrandtPI-FP7 1.0.0.A | Since December 28 |
Ryzen 7000 | ComboAM5PI 1.0.0.8 | Since August 29 |
Ryzen 7020 | MendocinoPI-FT6 1.0.0.6 | Since January 3 |
Ryzen 7040 | PhoenixPI-FP8-FP7 1.1.0.0 | Since October 6 |
Ryzen 7045 | DragonRangeFL1PI 1.0.0.3b | Since August 30 |
The latest AGESA versions from months ago also protect Epyc CPUs, and Threadripper received its AGESA update in January. Threadripper 7000, however, isn't mentioned in the disclosure, which may mean AMD learned of the vulnerabilities in time to ensure its latest HEDT CPUs never shipped with a buggy AGESA. Only two of AMD's embedded CPUs don't yet have a secure AGESA, which is scheduled to arrive in April.
Processor Series | Patched AGESA | Availability to OEMs |
1st Gen Epyc | NaplesPI 1.0.0.K | Since April 27 |
2nd Gen Epyc | RomePI 1.0.0.H | Since November 11 |
3rd Gen Epyc | MilanPI 1.0.0.C | Since December 18 |
4th Gen Epyc | GenoaPI 1.0.0.8 | Since June 9 |
Threadripper 3000 | CastlePeakPI-SP3r3 1.0.0.A | Since November 21 |
Threadripper Pro 3000WX | CastlePeakWSPI-sWRX8 1.0.0.C | Since November 29 |
Threadripper Pro 5000WX | ChagallWSPI-sWRX8 1.0.0.7 | Since January 11 |
Epyc Embedded 3000 | Snowyowl PI 1.1.0.B | Since December 15 |
Epyc Embedded 7002 | EmbRomePI-SP3 1.0.0.B | Since December 15 |
Epyc Embedded 7003 | EmbMilanPI-SP3 1.0.0.8 | Since January 15 |
Epyc Embedded 9003 | EmbGenoaPI-SP5 1.0.0.3 | Since September 15 |
Ryzen Embedded R1000 | EmbeddedPI-FP5 1.2.0.A | Since July 31 |
Ryzen Embedded R2000 | EmbeddedPI-FP5 1.0.0.2 | Since July 31 |
Ryzen Embedded 5000 | EmbAM4PI 1.0.0.4 | Since September 22 |
Ryzen Embedded V1000 | EmbeddedPI-FP5 1.2.0.A | Since July 31 |
Ryzen Embedded V2000 | EmbeddedPI-FP6 1.0.0.9 | Target April |
Ryzen Embedded V3000 | EmbeddedPI-FP7r2 1.0.0.9 | Target April |
Of course, new AGESA versions have to be distributed via new BIOS versions, which means even if a new AGESA is technically available, it could be a while before it reaches motherboards. For Epyc, embedded, and mobile CPUs, it's difficult to say how many motherboards offer a BIOS with the latest AGESA version, but for consumer Ryzen and Threadripper boards, this info is far more available and easier to find. We've looked at desktop motherboards from the big four vendors, and here's how they stand when it comes to AGESA versions.
Row 0 - Cell 0 | 300 Series | 400 Series | 500 Series | TRX40 | WRX80 | 600 Series |
Asus | ComboAM4v2PI 1.2.0.A | ComboAM4v2PI 1.2.0.B | ComboAM4v2PI 1.2.0.B | CastlePeakPI-SP3r3 1.0.0.7 | ChagallPI-SP3r3 1.0.0.5 | ComboAM5PI 1.1.0.2b |
ASRock | ComboAM4v2PI 1.2.0.B | ComboAM4v2PI 1.2.0.B | ComboAM4v2PI 1.2.0.B | CastlePeakPI-SP3r3 1.0.0.9 | ChagallPI-SP3r3 1.0.0.6 | ComboAM5PI 1.1.0.2b |
Gigabyte | ComboAM4v2PI 1.2.0.B | ComboAM4v2PI 1.2.0.B | ComboAM4v2PI 1.2.0.B | CastlePeakPI-SP3r3 1.0.0.7 | ChagallPI-SP3r3 1.0.0.6 | ComboAM5PI 1.1.0.2b |
MSI | ComboAM4v2PI 1.2.0.A | ComboAM4v2PI 1.2.0.A | ComboAM4v2PI 1.2.0.B | CastlePeakPI-SP3r3 1.0.0.4 | Unknown, but unpatched | ComboAM5PI 1.1.0.2b |
* Not a comprehensive list and may not be true for all motherboards
AM5 motherboards are seemingly completely patched for the four vulnerabilities, which means computers using Ryzen 7000 and Ryzen 8000 chips should be fine. As mentioned previously, AMD didn't make any disclosures for Threadripper 7000, which should mean TRX50 and WRX90 motherboards are also in the clear.
Stay On the Cutting Edge: Get the Tom's Hardware Newsletter
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
Unfortunately, for users of AMD's last-generation sockets, updates haven't been as rapid as they have been for AM5. As far as we could tell, no AM4 motherboards thus far offer a BIOS using AGESA version 1.2.0.C, which means Ryzen 4000G and 5000G APUs are vulnerable no matter who your motherboard maker is. AGESA version 1.2.0.B is broadly available on every 500 series board from the four big vendors, but the same can't be said for the 300 and 400 series. Asus's and MSI's 300 series boards are still on version 1.2.0.A, as are MSI's 400 series boards.
Meanwhile, TRX40 for the Threadripper 3000 series is mostly safe, except MSI hasn't updated its TRX40 boards since version 1.0.0.4. However, it seems Threadripper Pro 3000WX and 5000WX have gotten the short end of the stick by far, as the WRX80 socket is completely vulnerable no matter what vendor you're with. Hopefully, this is just because the AGESA versions haven't been out for very long.
Matthew Connatser is a freelancing writer for Tom's Hardware US. He writes articles about CPUs, GPUs, SSDs, and computers in general.
-
Are these the type of "vulnerabilities" where an attacker basically needs to already have access to your system to take advantage of them?Reply
If not, could someone more knowledgeable on this type of thing give an example scenario of how an unsuspecting user could fall victim to one of these vulnerabilities? -
FunSurfer ^ Yes, how exactly the hacker access the SPI interface that connects the CPU to the chip on the motherboard?Reply -
Order 66
Good luck getting physical access to a system if it is at a user's house. I don't understand why these vulnerabilities even matter for most people with desktop PCs at work or home.HopefulToad said:Are these the type of "vulnerabilities" where an attacker basically needs to already have access to your system to take advantage of them?
If not, could someone more knowledgeable on this type of thing give an example scenario of how an unsuspecting user could fall victim to one of these vulnerabilities? -
AgentBirdnest
Wondering the same thing. I generally don't like to update my BIOS if I don't need to, so I'd like to know if I really should or not.HopefulToad said:Are these the type of "vulnerabilities" where an attacker basically needs to already have access to your system to take advantage of them?
If not, could someone more knowledgeable on this type of thing give an example scenario of how an unsuspecting user could fall victim to one of these vulnerabilities?
Because if the hacker has to physically be sitting at my PC, here in my bedroom, then I've got much bigger problems to worry about than being hacked. -
Order 66
exactly my point. I don't really think about updating my bios very often, even though I probably should, now that you mention it.AgentBirdnest said:Wondering the same thing. I generally don't like to update my BIOS if I don't need to, so I'd like to know if I really should or not.
Because if the hacker has to physically be sitting at my PC, here in my bedroom, then I've got much bigger problems to worry about than being hacked. -
Makaveli Still waiting for AGESA version 1.2.0.C for my asus board which I thought they said was going to be released end of 2023 I guess not!Reply
Physical access?FunSurfer said:^ Yes, how exactly the hacker access the SPI interface that connects the CPU to the chip on the motherboard? -
Notton I didn't see ryzen 4000 mobile on the list.Reply
Is the list incomplete, or is 4000 mobile somehow not affected? -
USAFRet
Amazingly, there are LOTS of systems that exist in places other than your bedroom.Order 66 said:Good luck getting physical access to a system if it is at a user's house. I don't understand why these vulnerabilities even matter for most people with desktop PCs at work or home.
Aircraft manufacturer offices, nighttime cleaning crew... -
Order 66
Which is why I said for most users with desktop PCs at home or work. I understand that there are systems that are vulnerable to this type of attack, but I was trying to make the point that for the vast majority of people who have their PCs at home, this is not a concern. You could make the argument that desktop PCs at the workplace are more vulnerable, I guess.USAFRet said:Amazingly, there are LOTS of systems that exist in places other than your bedroom.
Aircraft manufacturer offices, nighttime cleaning crew... -
USAFRet
Right.Order 66 said:Which is why I said for most users with desktop PCs at home or work. I understand that there are systems that are vulnerable to this type of attack, but I was trying to make the point that for the vast majority of people who have their PCs at home, this is not a concern. You could make the argument that desktop PCs at the workplace are more vulnerable, I guess.
For your system and my system at home, not really a concern.
For other people, it IS a concern.
Not everything revolves around you or the typical home user.