Jump to content

Welcome to ExtremeHW

Welcome to ExtremeHW, register to take part in our community, don't worry this is a simple FREE process that requires minimal information for you to signup.

 

Registered users can: 

  • Start new topics and reply to others.
  • Show off your PC using our Rig Creator feature.
  • Subscribe to topics and forums to get updates.
  • Get your own profile page to customize.
  • Send personal messages to other members.
  • Take advantage of site exclusive features.
  • Upgrade to Premium to unlock additional sites features.
IGNORED

CPU, APU & Chipsets AMD confirms security vulnerability in every Zen 1 to Zen 5 processor


Kaz

Recommended Posts

News Editor
338 320
 
  Quote

 

TL;DR: AMD has identified a security flaw, "EntrySign," affecting Zen 1 to Zen 5 CPUs, allowing attackers kernel-level access by bypassing microcode signature verification. A fix has been issued via the ComboAM5PI 1.2.0.3c AGESA update. The risk to general consumers is low, but updates are recommended.
 

AMD has confirmed a flaw within its signature verification for microcode updates within Zen 1 to Zen 5 CPUs. This security flaw has been dubbed "EntrySign" and enables attackers to gain kernel-level access.

 

Last month, AMD confirmed the flaw impacts the first four generations of its Zen CPUs, which include everything from desktop processors to the company's server-based EPYC chips. Now, AMD has confirmed its latest Zen 5 generation is also affected by this security flaw. The crux of the problem can be traced back to AMD's signature verification for microcode updates, which are critical updates AMD rolls out to fix any bugs, improve the stability of the chip, optimize performance, or provide security fixes to vulnerabilities.

 

The typical order of process is that an operating system or firmware loads the microcode that AMD has signed off on as secure and safe by running it through its verification process, but EntrySign is a vulnerability that enables attackers with ring 0 or kernel-level access to bypass safeguards. What is reassuring is that AMD has already rolled out a fix for the vulnerability to motherboard vendors via the ComboAM5PI 1.2.0.3c AGESA update.

 

Expand  

https://www.tweaktown.com/news/104554/amd-confirms-security-vulnerability-in-every-zen-1-to-5-processor/index.html

 

Requires system admin to facilitate.  If someone has system admin the system is already compromised but this might allow for long term persistence.  Just another reason to stay on top of updates.

 

Link to comment
Share on other sites

  On 11/04/2025 at 17:54, Kaz said:
 

https://www.tweaktown.com/news/104554/amd-confirms-security-vulnerability-in-every-zen-1-to-5-processor/index.html

 

Requires system admin to facilitate.  If someone has system admin the system is already compromised but this might allow for long term persistence.  Just another reason to stay on top of updates.

Expand  

But the later AGESA updates lower the max voltage I can set. :sad-smile:

 

Honestly probably for the best. I should probably update. Been on the same 3801 BIOS for my X570 Dark Hero since 2022. Then again, I'll probably forget about this and stay on 3801. Lot of people hate the newer BIOS's for this board.

Edited by Sir Beregond

null

Showcase

 Share

CPU: AMD Ryzen 9 5900X
GPU: Nvidia RTX 3080 Ti Founders Edition
RAM: G.Skill Trident Z Neo 32GB DDR4-3600 (@ 3733 CL14)
MOTHERBOARD: ASUS Crosshair VIII Dark Hero
SSD/NVME: x2 Samsung 970 Evo Plus 2TB
SSD/NVME 2: Crucial MX500 1TB
PSU: be Quiet! Straight Power 12 1500W
MONITOR: LG 42" C4 OLED
Full Rig Info
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

This Website may place and access certain Cookies on your computer. ExtremeHW uses Cookies to improve your experience of using the Website and to improve our range of products and services. ExtremeHW has carefully chosen these Cookies and has taken steps to ensure that your privacy is protected and respected at all times. All Cookies used by this Website are used in accordance with current UK and EU Cookie Law. For more information please see our Privacy Policy