Sunday, April 27, 2025
HomeCVE/vulnerabilityAMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

Published on

SIEM as a Service

Follow Us on Google News

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to bypass microcode signature verification and execute malicious code.

Designated as CVE-2024-36347 (CVSS score: 6.4, Medium), the flaw impacts multiple generations of AMD EPYC™ server processors and select consumer Ryzen™ chips.

Vulnerability Overview

Google researchers identified a weakness in AMD’s microcode patch verification algorithm, allowing attackers to falsify signatures and load unauthorized updates.

- Advertisement - Google News

This could compromise the integrity of x86 instruction execution, expose privileged data, and even hijack the System Management Mode (SMM) environment—a high-privilege layer used for firmware operations.

AMD confirmed the flaw stems from an “improper signature verification” in the CPU’s ROM loader but emphasized no active exploits have been observed. The company is collaborating with OEMs to release firmware updates.

Affected Products

The vulnerability impacts the following AMD EPYC™ and Ryzen™ processors:

Code NameProduct FamilyCPUID
NaplesEPYC™ 7000 Series0x00800F12
RomeEPYC™ 7002 Series0x00830F10
Milan/Milan-XEPYC™ 7003 Series0x00A00F11/12
Genoa/Genoa-XEPYC™ 9004 Series0x00A10F11/12
Bergamo/SienaEPYC™ 9004 Series0x00AA0F02
RaphaelRyzen™ Embedded 4004 Series0x00A60F12
TurinEPYC™ 9005 Series (Upcoming)0x00B00F21

Mitigation and Firmware Updates

AMD has released Platform Initialization (PI) firmware patches to address the flaw. System administrators must update their BIOS via OEM providers using the minimum microcode versions below:

  • EPYC™ 7000 Series (Naples): PI version 1.0.0.P1 (Microcode: 0x08001278)
  • EPYC™ 7002 Series (Rome): PI version 1.0.0.L1 (Microcode: 0x0830107D)
  • EPYC™ 7003 Series (Milan): PI version 1.0.0.F2 (Microcode: 0x0A0011DB/0A001244)
  • EPYC™ 9004 Series (Genoa): PI version 1.0.0.E3 (Microcode: 0x0A101154/0A10124F/0AA00219)

Post-update, hot-loading microcode patches is blocked on older BIOS versions. Systems running MilanPI below 1.0.0.F or GenoaPI below 1.0.0.E will trigger a #GP fault during hot-load attempts.

Recommendations

  1. Contact OEMs Immediately: Reach out to hardware vendors for BIOS updates tailored to your system.
  2. Audit Privileged Access: Limit administrative privileges to minimize exploitation risk.
  3. Monitor Firmware Updates: AMD advises against hot-loading microcode until PI versions are fully deployed.

While the flaw poses significant risks, AMD’s proactive patches and collaboration with researchers highlight a swift response. Enterprises and data centers should prioritize updates to safeguard against potential privilege escalation attacks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...

Compliance And Governance: What Every CISO Needs To Know About Data Protection Regulations

The cybersecurity landscape has changed dramatically in recent years, largely due to the introduction...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...