Tuesday, May 13, 2025
HomeCyber Security NewsZenbleed - AMD's Zen2 Processor Flaw Allows Attackers to Steal Sensitive Data

Zenbleed – AMD’s Zen2 Processor Flaw Allows Attackers to Steal Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

The CPUs that are based on x86-64 architecture feature XMM registers (128-bit), recently extended to 256-bit (YMM) and 512-bit (ZMM) for greater capacity.

Beyond number crunching, the large registers (YMM and ZMM) are employed in various scenarios, including standard C library functions such as:- 

  • strcmp
  • memcpy
  • strlen

Tavis Ormandy, a Google security researcher, found a fresh AMD Zen2 CPU vulnerability enabling data theft at 30KB/sec per core, risking passwords and encryption keys.

- Advertisement - Google News

Zenbleed Flaw

The AMD’s Zen2 processor vulnerability has been tracked as “CVE-2023-20593,” this results from mishandling ‘vzeroupper’ instruction, impacting modern processors’ speculative execution. 

Ormandy found hardware events with fuzzing and performance counters, confirmed via the “Oracle Serialization” approach.

Using this technique, the author exposed CVE-2023-20593 in Zen2 CPUs by spotting discrepancies between randomly generated programs and serialized oracles. 

The flaw allowed optimized data leakage from various system operations, even in virtual machines, isolated sandboxes, and containers.

On May 15, 2023, the researcher informed AMD of the flaw and now released a PoC exploit for CVE-2023-20593. Though written for Linux, the bug impacts all Zen 2 CPUs regardless of the operating system.

Products affected

Here below, we have mentioned all the products that are affected:-

  • AMD Ryzen 3000 Series Processors
  • AMD Ryzen PRO 3000 Series Processors
  • AMD Ryzen Threadripper 3000 Series Processors
  • AMD Ryzen 4000 Series Processors with Radeon Graphics
  • AMD Ryzen PRO 4000 Series Processors
  • AMD Ryzen 5000 Series Processors with Radeon Graphics
  • AMD Ryzen 7020 Series Processors with Radeon Graphics
  • AMD EPYC “Rome” Processors

For ‘Zenbleed’-affected CPUs, make sure to apply AMD’s microcode update immediately or await a future BIOS fix from your vendor.

It’s been recommended users set up the “chicken bit” to DE_CFG[9] as a mitigation method, but it causes a CPU performance drop. Detecting Zenbleed exploitation is likely impossible since it’s stealthy, needing no elevated privileges or special system calls.

However, the practical impact of Zenbleed is limited to users with local access and specialized knowledge to exploit it.

But, experts have strongly recommended that users keep their systems updated with the latest security patches and BIOS updates.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack

British retail giant Marks & Spencer has officially confirmed that customer personal data was...

Zoom Workplace Apps Flaws Allow Hackers to Gain Elevated Access

Zoom has released multiple security bulletins addressing seven newly discovered vulnerabilities in Zoom Workplace...

PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258)

Security researchers have disclosed a new macOS sandbox escape vulnerability tracked as CVE-2025-31258, accompanied...

Four Hackers Caught Exploiting Old Routers as Proxy Servers

U.S. authorities unsealed charges against four foreign nationals accused of operating a global cybercrime...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack

British retail giant Marks & Spencer has officially confirmed that customer personal data was...

Zoom Workplace Apps Flaws Allow Hackers to Gain Elevated Access

Zoom has released multiple security bulletins addressing seven newly discovered vulnerabilities in Zoom Workplace...

PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258)

Security researchers have disclosed a new macOS sandbox escape vulnerability tracked as CVE-2025-31258, accompanied...