How AMD Fixed Vulnerabilities in Processors: Addressing Security Threats for Servers and PCs
13:45, 18.02.2025
AMD has released updates for its EPYC and Ryzen processors, addressing six serious vulnerabilities that could lead to remote code execution and security risks. Some of these vulnerabilities are related to high-level privileges, allowing attackers to bypass security mechanisms.
Vulnerabilities in SMM and SEV
Three of the identified vulnerabilities (CVE-2023-31342, CVE-2023-31343, and CVE-2023-31345) are related to memory management in System Management Mode (SMM), which has higher priority than the hypervisor. The issues arose due to a lack of input validation in the SMM handler, allowing an attacker to overwrite the contents of SMRAM and gain full control over the system. These vulnerabilities were discovered in both EPYC and Ryzen processors, affecting server and embedded models.
Additionally, another vulnerability, CVE-2023-31352, concerned the AMD SEV (Secure Encrypted Virtualization) mechanism, which is used to protect virtual machines from hypervisor or host system administrator interference. In this case, a firmware flaw could allow an attacker with access to the host to read unencrypted data in memory.
Security Issues in SEV-SNP and IOMMU
Two other vulnerabilities, CVE-2023-20582 and CVE-2023-20581, also pose a threat to systems using the SEV-SNP and IOMMU extensions. In the first case, an attacker could bypass memory protection for virtual machines by triggering exceptions in the Page Table Entry (PTE). In the second case, an attacker could access guest system memory by bypassing the Reverse Map Table (RMP) check.
These flaws were found in 3rd and 4th generation EPYC server chips, embedded processors in the EPYC 7003 and 9004 series, as well as in the Ryzen 3000, 4000, 5000, 7000, and 8000 series, and the Athlon 3000 series. AMD has already released patches to address these vulnerabilities and strengthen the security of its devices.