How AMD Fixed Vulnerabilities in Processors: Addressing Security Threats for Servers and PCs

watch 1m, 23s
views 2

13:45, 18.02.2025

Article Content
arrow

  • Vulnerabilities in SMM and SEV
  • Security Issues in SEV-SNP and IOMMU

AMD has released updates for its EPYC and Ryzen processors, addressing six serious vulnerabilities that could lead to remote code execution and security risks. Some of these vulnerabilities are related to high-level privileges, allowing attackers to bypass security mechanisms.

Vulnerabilities in SMM and SEV

Three of the identified vulnerabilities (CVE-2023-31342, CVE-2023-31343, and CVE-2023-31345) are related to memory management in System Management Mode (SMM), which has higher priority than the hypervisor. The issues arose due to a lack of input validation in the SMM handler, allowing an attacker to overwrite the contents of SMRAM and gain full control over the system. These vulnerabilities were discovered in both EPYC and Ryzen processors, affecting server and embedded models.

Additionally, another vulnerability, CVE-2023-31352, concerned the AMD SEV (Secure Encrypted Virtualization) mechanism, which is used to protect virtual machines from hypervisor or host system administrator interference. In this case, a firmware flaw could allow an attacker with access to the host to read unencrypted data in memory.

Security Issues in SEV-SNP and IOMMU

Two other vulnerabilities, CVE-2023-20582 and CVE-2023-20581, also pose a threat to systems using the SEV-SNP and IOMMU extensions. In the first case, an attacker could bypass memory protection for virtual machines by triggering exceptions in the Page Table Entry (PTE). In the second case, an attacker could access guest system memory by bypassing the Reverse Map Table (RMP) check.

These flaws were found in 3rd and 4th generation EPYC server chips, embedded processors in the EPYC 7003 and 9004 series, as well as in the Ryzen 3000, 4000, 5000, 7000, and 8000 series, and the Athlon 3000 series. AMD has already released patches to address these vulnerabilities and strengthen the security of its devices.

Share

Was this article helpful to you?

VPS popular offers

Other articles on this topic

cookie

Accept cookies & privacy policy?

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the HostZealot website.