AMD confirms security vulnerability in every Zen 1 to Zen 5 processor

AMD has confirmed that its entire product line of CPUs, ranging from Zen 1 all the way up to Zen 5 processors, are vulnerable to a security flaw.

AMD confirms security vulnerability in every Zen 1 to Zen 5 processor
Comment IconFacebook IconX IconReddit Icon
Tech and Science Editor
Published
1 minute & 45 seconds read time

As an Amazon Associate, we earn from qualifying purchases. TweakTown may also earn commissions from other affiliate partners at no extra cost to you.

TL;DR: AMD has identified a security flaw, "EntrySign," affecting Zen 1 to Zen 5 CPUs, allowing attackers kernel-level access by bypassing microcode signature verification. A fix has been issued via the ComboAM5PI 1.2.0.3c AGESA update. The risk to general consumers is low, but updates are recommended.

AMD has confirmed a flaw within its signature verification for microcode updates within Zen 1 to Zen 5 CPUs. This security flaw has been dubbed "EntrySign" and enables attackers to gain kernel-level access.

AMD confirms security vulnerability in every Zen 1 to Zen 5 processor 6516565

Last month, AMD confirmed the flaw impacts the first four generations of its Zen CPUs, which include everything from desktop processors to the company's server-based EPYC chips. Now, AMD has confirmed its latest Zen 5 generation is also affected by this security flaw. The crux of the problem can be traced back to AMD's signature verification for microcode updates, which are critical updates AMD rolls out to fix any bugs, improve the stability of the chip, optimize performance, or provide security fixes to vulnerabilities.

The typical order of process is that an operating system or firmware loads the microcode that AMD has signed off on as secure and safe by running it through its verification process, but EntrySign is a vulnerability that enables attackers with ring 0 or kernel-level access to bypass safeguards. What is reassuring is that AMD has already rolled out a fix for the vulnerability to motherboard vendors via the ComboAM5PI 1.2.0.3c AGESA update.

Researchers from Google have provided AMD with a report titled "AMD Microcode Signature Verification Vulnerability." This vulnerability may allow an attacker with system administrative privilege to load malicious CPU microcode patches. In the report, the researchers describe how they were able to load patches that were not signed by AMD. The researchers also demonstrate how they falsified signatures for arbitrary microcode patches. AMD has not received any reports of this attack occurring in any system.

AMD believes this issue is caused by a weakness in signature verification algorithm that could allow an administrator privileged attacker to load arbitrary microcode patches. AMD plans to issue mitigations to fix this issue. Please see below for additional details.

What is also good news for general consumers is that a system restart flushes any malicious code that is loaded onto a system through this method. Additionally, a hack through this method will also already need high-level system privileges, meaning the risk for general consumers here is relatively low. However, it's still advised to carry out the update as soon as possible.

Photo of the AMD Ryzen 5 9600X Desktop Processor
Best Deals: AMD Ryzen 5 9600X Desktop Processor
Country flagToday7 days ago30 days ago
$225.99 USD$223 USD
$229.99 USD$227.99 USD
$338.98 CAD$338.98 CAD
-$339 CAD
£198.50£202.28
$225.99 USD$223 USD
$399 AUD-
* Prices last scanned on 4/25/2025 at 12:04 am CDT - prices may not be accurate, click links above for the latest price. We may earn an affiliate commission from any sales.
NEWS SOURCES:techspot.com, amd.com

Tech and Science Editor

Email IconX IconLinkedIn Icon

Jak joined the TweakTown team in 2017 and has since reviewed 100s of new tech products and kept us informed daily on the latest science, space, and artificial intelligence news. Jak's love for science, space, and technology, and, more specifically, PC gaming, began at 10 years old. It was the day his dad showed him how to play Age of Empires on an old Compaq PC. Ever since that day, Jak fell in love with games and the progression of the technology industry in all its forms.

Related Topics

Newsletter Subscription