AMD Security Vulnerabilities - April 2026

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On April 14th, 2026, AMD published AMD-SB-7054 Security Bulletins [1], AMD-SB-3034[2] and AMD-SB-3016[3] containing a security vulnerability each. This article contains tables listing measures to address the security vulnerabilities.

Affected systems

AMD Threadripper systems:

  • systems with AMD Ryzen Threadripper PRO 3000WX processors
  • systems with AMD Ryzen Threadripper PRO 5000WX processors
  • systems with AMD Ryzen Threadripper 7000 / PRO 7000WX processors
  • systems with AMD Ryzen Threadripper 9000 / PRO 9000WX processors


AMD EPYC systems:

Solution for the problem

Here is a table listing the relevant CVEs and corrective measures for each EPYC generation, where available.

AMD EPYC 4004 Raphael

Security vulnerability Risk potential: AGESA version
CVE-2025-54502 7.1 (high) ComboAM5PI 1.0.0.d (2025-11-12)

AMD EPYC 7002 Rome

Security vulnerability Risk potential: AGESA version
CVE-2025-54502 7.1 (high) RomePI 1.0.0.P (2025-11-04)


AMD EPYC 7003 Milan:

Security vulnerability Risk potential: AGESA version SEV FW TCB‑Wert for SEV‑certification TCB‑Wert for SNP‑certification
CVE-2025-54502 7.1 (high) MilanPI 1.0.0.J (2025-12-15) N/A N/A N/A
CVE-2025-54510 5.9 (medium) MilanPI 1.0.0.J (2025-12-15) N/A TCB[SNP]>=0x1D

mitigation bit = 4

N/A
CVE-2023-20585 5.6 (medium) MilanPI 1.0.0.H (2025-09-04) + OS update SEV FW 1.37.23 + OS update N/A TCB[SNP]>=0x1B

AMD EPYC 8004 Siena:

Security vulnerability Risk potential: AGESA version SEV FW TCB‑Wert for SEV‑certification TCB‑Wert for SNP‑certification
CVE-2025-54502 7.1 (high) GenoaPI 1.0.0.H (2025-12-15) N/A N/A N/A
CVE-2025-54510 5.9 (medium) GenoaPI 1.0.0.H (2025-12-15) N/A TCB[SNP]>=0x1C N/A
CVE-2023-20585 5.6 (Mittel) GenoaPI_1.0.0.G (2025-06-27) + OS update SEV FW 1.37.31 + OS update N/A TCB[SNP]>=0x1B

AMD EPYC 9004 Genoa:

Security vulnerability Risk potential: AGESA version SEV FW TCB‑Wert für die SEV‑certification TCB‑Wert für die SNP‑certification
CVE-2025-54502 7.1 (high) GenoaPI 1.0.0.H (2025-12-15) N/A N/A N/A
CVE-2025-54510 5.9 (medium) GenoaPI 1.0.0.H (2025-12-15) N/A TCB[SNP]>=0x1C N/A
CVE-2023-20585 5.6 (medium) GenoaPI_1.0.0.G (2025-06-27) + OS update SEV FW 1.37.31 + OS update N/A TCB[SNP]>=0x1B

AMD EPYC 9005 Turin / Turin Dense

Security vulnerability Risk potential: AGESA version SEV FW TCB‑Wert für die SEV‑certification TCB‑Wert für die SNP‑certification
CVE-2025-54502 7.1 (high) TurinPI 1.0.0.9 (2025-12-31) N/A N/A N/A
CVE-2025-54510 5.9 (medium) TurinPI 1.0.0.8 (2025-11-26) N/A TCB[SNP]>=0x5 N/A

Table from CVE-2025-54502 affected Threadripper processors:

CPU AGESA version
AMD Ryzen Threadripper PRO 3000WX ChagallWSPI-sWRX8 1.0.0.D (2025-11-04)

CastlePeakWSPI-sWRX8 1.0.0.I (2025-10-17)

AMD Ryzen Threadripper PRO 5000WX ChagallWSPI-sWRX8 1.0.0.D (2025-11-04)
AMD Ryzen Threadripper 7000 ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)
AMD Ryzen Threadripper PRO 7000WX ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)

StormPeakPI-SP6 1.0.0.1m (2025-12-01)

StormPeakPI-SP6_1.1.0.0k (2025-12-01)

AMD Ryzen Threadripper 9000 ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)
AMD Ryzen Threadripper PRO 9000WX ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)

Supermicro Security Bulletins were published on security vulnerabilities. A list with BIOS-versions of the respective mainboards, to close the gaps, is also included. Below is an extract from this table, which lists all the motherboards available from Thomas-Krenn: [4]

AMD motherboard BIOS version
H12SSW-iN/NT 3.6
H12SSL-i/C/CT/NT 3.6
H12DSi-N6/NT6 3.6
H13SSW 3.9
H13SSL-N/NC 3.9

Updates on Thomas-Krenn products

Updates on the respective system can be found in the Thomas-Krenn download area. The versions in the download area have been tested by us to guarantee the stability and compatibility of our systems.

If you require the latest version for your system and it is not yet available in our download area, you can get it at Asus or Supermicro.

References

  1. Incorrect use of LocateProtocol Service of the EFI_BOOT_Services table in SMI Handler – April 2026 (www.amd.com/en/resources/product-security)
  2. SEV-SNP Routing Misconfiguration – April 2026 (www.amd.com/en/resources/product-security)
  3. IOMMU Write Buffer Vulnerability – April 2026 (www.amd.com/en/resources/product-security)
  4. Supermicro Security Center (www.supermicro.com)


Author: Thomas-Krenn.AG

At Thomas-Krenn.AG we pay attention to the best possible service. To do justice to this, we have created our Thomas-Krenn Wiki. Here we share our knowledge with you and inform you about basics and news from the IT world. You like our knowledge culture and want to become part of the team? Visit our job offers.

 

Translator: Alina Ranzinger

Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.


Related articles

Creating Safety instructions for AMD-SB-7028 AMD SMM Callout Vulnerability
Safety instructions for AMD-SB-3003 server vulnerabilities
Safety instructions for AMD-SB-7028 AMD SMM Callout Vulnerability