AMD Patches High-Severity SMM Vulnerabilities Affecting EPYC and Ryzen Processors
AMD发布安全补丁修复两个高危漏洞(CVE-2024-0179和CVE-2024-21925),影响多代EPYC、Ryzen处理器及Instinct MI300A GPU。攻击者可利用漏洞执行任意代码并破坏系统完整性。建议用户通过OEM更新固件以缓解风险。 2025-2-16 01:43:37 Author: securityonline.info(查看原文) 阅读量:7 收藏

CVE-2024-0179 and CVE-2024-21925

Source: Quarkslab

AMD has released security patches addressing two high-severity vulnerabilities impacting its System Management Mode (SMM), a privileged execution environment within the firmware of AMD processors. If exploited, these vulnerabilities could allow privileged attackers to execute arbitrary code and potentially compromise system integrity.

The vulnerabilities, tracked as CVE-2024-0179 and CVE-2024-21925, both carry a CVSS score of 8.2 (High). According to AMD, these flaws were reported by Quarkslab and affect multiple generations of AMD EPYC and Ryzen processors.

  • CVE-2024-0179 is an SMM Callout vulnerability within the AmdCpmDisplayFeatureSMM UEFI module. AMD warns that this issue “could allow locally authenticated attackers to overwrite SMRAM, potentially resulting in arbitrary code execution.”
  • CVE-2024-21925 stems from insufficient input validation in the AmdPspP2CmboxV2 UEFI module, which may allow a privileged attacker to overwrite SMRAM, leading to arbitrary code execution.

Both vulnerabilities exploit System Management RAM (SMRAM), a critical memory region used by SMM handlers, which is meant to be isolated from unauthorized access. Attackers with the required privileges could escalate their access to execute malicious payloads at ring-0—the highest level of system privilege.

The vulnerabilities affect multiple processor families, including:

  • 1st to 4th Gen AMD EPYC processors (Naples, Rome, Milan, Genoa)
  • AMD Ryzen 5000/7000 series desktop and mobile processors
  • AMD Ryzen Threadripper PRO and High-End Desktop (HEDT) processors
  • AMD Instinct MI300A Data Center GPUs

AMD acknowledged Gabrielle Viala from Quarkslab for responsibly disclosing these issues.

According to AMD, mitigation requires firmware updates to the Platform Initialization (PI) firmware. The company has provided specific firmware versions for affected processors, including Naples PI 1.0.0.N (2024-09-17), Rome PI 1.0.0.K (2024-09-05), and Milan PI 1.0.0.E (2024-09-05).

To address these security risks, AMD recommends users update their firmware via their OEM vendors. The company notes that patches have been integrated into BIOS updates to mitigate the vulnerabilities at the firmware level.

Related Posts:


文章来源: https://securityonline.info/amd-patches-high-severity-smm-vulnerabilities-affecting-epyc-and-ryzen-processors/
如有侵权请联系:admin#unsafe.sh