Serious vulnerability 'Sinkclose' discovered in many AMD CPUs, AMD distributes patch but it does not apply to some older models



Cybersecurity company IOActive announced the existence of a critical security vulnerability called '

Sinkclose ' that affects many AMD CPUs on August 10, 2024. In response to this, AMD has provided patches to mitigate the vulnerability for relatively new CPUs. However, AMD has said that it has no plans to update older models, such as the Ryzen 1000 series produced in 2017.

DEF CON Official Talk | AMD Sinkclose: Universal Ring-2 Privilege Escalation | Las Vegas, NV – IOActive
https://ioactive.com/event/def-con-talk-amd-sinkclose-universal-ring-2-privilege-escalation/

SMM LOCK BYPASS
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html



AMD won't patch all chips affected by severe data theft vulnerability — older Ryzen models will not get patched for 'Sinkclose' [Updated] | Tom's Hardware

https://www.tomshardware.com/pc-components/cpus/amd-wont-patch-all-chips-affected-by-severe-data-theft-vulnerability-ryzen-1000-2000-and-3000-will-not-get-patched-among-others

AMD addresses Sinkclose vulnerability but older processors left unattended | CSO Online
https://www.csoonline.com/article/3485621/amd-addresses-sinkclose-vulnerability-but-older-processors-left-unattended.html

Researchers discover potentially catastrophic exploit present in AMD chips for decades
https://www.engadget.com/cybersecurity/researchers-discover-potentially-catastrophic-exploit-present-in-amd-chips-for-decades-161541359.html

The vulnerability, 'Sinkclose,' discovered by IOActive allows malicious code to be executed in System Management Mode (SMM), a region used for processing operations necessary for system stability, such as power management, hardware control, and security.

According to IOActive, Sinkclose exploits AMD's CPU compatibility maintenance feature 'TClose' to deceive the processor and enable code execution at the SMM level. Since exploiting the vulnerability requires access to the kernel level, attackers who exploit Sinkclose essentially target PCs that have previously been subject to another cyber attack. AMD speculates that 'it would be difficult to actually exploit, as it would be like accessing a safe deposit box in a bank where alarms, security guards, safe doors, and other security measures have already been eliminated,' but IOActive security researcher Enrique Nishim warned, 'Vulnerabilities that allow access to the kernel level exist in all systems. Therefore, Sinkclose is not an armchair theory, but is actually available to attackers.'

PCs attacked by Sinkclose may have malware installed that is extremely difficult to detect with normal antivirus software. In addition, in systems that do not properly implement AMD's Platform Secure Boot (PSB) hardware defense layer, it has been pointed out that the malware infection may not be removed even by reinstalling the OS.



Sinkclose may affect most AMD chips manufactured since 2006, potentially putting hundreds of millions of chips at risk. AMD has applied patches to some of its CPUs to mitigate the vulnerability. Below is a table showing which models are covered by the patches.

category Affected CPUs
For Data Centers

1st Gen AMD EPYC
2nd Gen AMD EPYC
3rd Gen AMD EPYC
4th Gen AMD EPYC
AMD Instinct MI300A

For embedded PCs

AMD EPYC Embedded 3000
AMD EPYC Embedded 7002
AMD EPYC Embedded 7003
AMD EPYC Embedded 9003
AMD Ryzen Embedded R1000
AMD Ryzen Embedded R2000
AMD Ryzen Embedded 5000
AMD Ryzen Embedded 7000
AMD Ryzen Embedded V1000
AMD Ryzen Embedded V2000
AMD Ryzen Embedded V3000

For Desktop

AMD Ryzen 5000 Series
AMD Ryzen 7000 Series
AMD Ryzen 4000 Series with Radeon Graphics
AMD Ryzen 8000 Series with Radeon Graphics

For high-end desktops

AMD Ryzen Threadripper 3000 Series
AMD Ryzen Threadripper 7000 Series

For Workstations

AMD Ryzen Threadripper PRO
AMD Ryzen Threadripper PRO 3000WX

For Notebook PCs

AMD Athlon 3000 Series with Radeon Graphics
AMD Ryzen 3000 Series with Radeon Graphics
AMD Ryzen 4000 Series with Radeon Graphics
AMD Ryzen 5000 Series with Radeon Graphics
AMD Ryzen 6000 Series with Radeon Graphics
AMD Ryzen 7020 Series with Radeon Graphics
AMD Ryzen 7030 Series with Radeon Graphics
AMD Ryzen 7035 Series with Radeon Graphics
AMD Ryzen 7040 Series with Radeon Graphics
AMD Ryzen 7045 Series
AMD Ryzen with Radeon Graphics



On the other hand, patches have not been distributed to relatively old models such as the Ryzen 1000, 2000, and 3000 series, and the Threadripper 1000 and 2000 series. AMD has positioned these products as 'out of software support' and are not eligible for security updates. Arjun Chauhan, a senior analyst at market research firm Everest Group, criticized, 'The fact that AMD has now excluded older processors from the scope of patch application may undermine customer trust. There are still many companies using chips that are out of software support, and they are more likely to introduce competitor products that offer longer support lifecycles.'

in Hardware,   Security, Posted by log1r_ut