AMD Security Vulnerabilities - May 2026

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On May 12th, 2026, AMD published the security bulletins AMD-SB-3030 [1], AMD-SB-4017[2] and AMD-SB-7052[3] with one security vulnerability each. This article includes tables listing measures to address the security vulnerabilities.

Affected systems

AMD Threadripper systems:

  • systems with AMD Ryzen Threadripper PRO 3000WX processors
  • systems with AMD Ryzen Threadripper 7000 / PRO 7000WX processors
  • systems with AMD Ryzen Threadripper 9000 / PRO 9000WX processors


AMD EPYC systems:

Solution

Here is a table listing the relevant CVEs and corrective measures for the respective EPYC generation, if available.

AMD EPYC 4004 Raphael

Security vulnerability Risk potential: AGESA version
CVE-2024-36315 5.7 (medium) ComboAM5PI_1.0.0.a (2024-09-11)

ComboAM5PI_1.1.0.3c (2024-09-11)

ComboAM5PI_1.2.0.3 (2024-09-11)

AMD EPYC 7002 Rome

Security vulnerability Risk potential: Correction
CVE-2025-54518 7.3 (high) OS update


AMD EPYC 7003 Milan:

Security vulnerability Risk potential: AGESA version TCB‑value for SNP-certification
CVE-2025-61971 5.9 (medium) MilanPI 1.0.0.J (2025-12-15) TCB[SNP]>=0x1D

AMD EPYC 8004 Siena:

Security vulnerability Risk potential: AGESA version Microcode TCB‑value for SNP-certification
CVE-2024-36315 5.7 (medium) GenoaPI 1.0.0.E (2024-12-18) A2: 0AA00216 N/A
CVE-2025-61971 5.9 (medium) Genoa++_1.0.0.H (2025-12-15) N/A TCB[BL]>=0xC
CVE-2025-61972 8.5 (high) Genoa++_1.0.0.H (2025-12-15) N/A TCB[BL]>=0xC

AMD EPYC 9004 Genoa:

Security vulnerability Risk potential: AGESA version Microcode TCB‑value for SNP-certification
CVE-2024-36315 5.7 (medium) GenoaPI 1.0.0.E (2024-12-18) A2: 0x0AA00219

B1: 0x0A101154

B2: 0x0A10124F

N/A
CVE-2025-61971 5.9 (medium) Genoa++_1.0.0.H (2025-12-15) N/A TCB[BL]>=0xC
CVE-2025-61972 8.5 (high) Genoa++_1.0.0.H (2025-12-15) N/A TCB[BL]>=0xC

AMD EPYC 9005 Turin / Turin Dense

Security vulnerability Risk potential: AGESA version TCB‑value for SNP-certification
CVE-2025-61971 5.9 (medium) TurinPI_1.0.0.8 (2025-11-26) TCB[TEE]>=0x2
CVE-2025-61972 8.5 (high) TurinPI_1.0.0.8 (2025-11-26) TCB[TEE]>=0x2

AMD Ryzen Threadripper PRO 3000WX

Security vulnerability Risk potential: AGESA version
CVE-2021-46747 7.1 (high) CastlePeakWSPI-sWRX8 1.0.0.9 (2022-01-20)

ChagallWSPI-sWRX8 1.0.0.2 (2022-01-20)

CVE-2025-48516 6.9 (medium) no specific plans
CVE-2021-26380 1.8 (low) ChagallWSPI-sWRX8 1.0.0.2 (2022-01-20)
CVE-2025-54518 7.3 (high) ChagallWSPI-sWRX8-1.0.0.D (11-04-2025)

CastlePeakWSPI-sWRX8 1.0.0.I (10-17-2025)

AMD Ryzen Threadripper 7000 / PRO 7000WX

Security vulnerability Risk potential: AGESA version
CVE-2026-0438 5.4 (medium) ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)

StormPeakPI-SP6 1.0.0.1m (2025-12-01)

StormPeakPI-SP6_1.1.0.0k (2025-12-01)

CVE-2025-48516 6.9 (medium) ShimadaPeakPI-SP6 1.0.0.1b (2025-08-04)
CVE-2024-36345 4.6 (medium) StormPeakPI-SP6 1.1.0.0k (2025-12-01)

StormPeakPI-SP6 1.0.0.1m (2025-12-01)

CVE-2024-36343 4.6 (medium) StormPeakPI-SP6 1.1.0.0k (2025-12-01)

StormPeakPI-SP6 1.0.0.1m (2025-12-01)

AMD Ryzen Threadripper 9000 / PRO 9000WX

Security vulnerability Risk potential: AGESA version
CVE-2026-0438 5.4 (medium) ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)
CVE-2025-48516 6.9 (medium) ShimadaPeakPI-SP6 1.0.0.1b (2025-08-04)

Supermicro security bulletins were published for security vulnerabilities. A list with BIOS-versions for the respective mainboards, to close the gaps, is also included. In the following, there is an excerpt from this table, in which all mainboards are listed that are offered by Thomas Krenn: [4]

AMD motherboard BIOS version
H12SSW-iN/NT 3.6
H12SSL-i/C/CT/NT 3.6
H12DSi-N6/NT6 3.6
H13SSW 3.8
H13SSL-N/NC 3.8

Updates for Thomas-Krenn products

Updates on the corresponding system can be found in the download area of Thomas-Krenn. The versions in the download area have been tested to guarantee the stability and compatibility of our systems.

If you require the latest version for your system and it is not yet available in our download area, you can get it at Asus or Supermicro.

References

  1. AMD EPYC and AMD EPYC Embedded Series Processor Vulnerabilities – May 2026 (www.amd.com/en/resources/product-security)
  2. AMD Athlon, AMD Ryzen, and AMD Ryzen Embedded Series Processor Vulnerabilities – May 2026 (www.amd.com/en/resources/product-security)
  3. CPU OP Cache Corruption - May 2026 (www.amd.com/en/resources/product-security)
  4. Supermicro Security Center (www.supermicro.com)


Author: Thomas-Krenn.AG

At Thomas-Krenn.AG we pay attention to the best possible service. To do justice to this, we have created our Thomas-Krenn Wiki. Here we share our knowledge with you and inform you about basics and news from the IT world. You like our knowledge culture and want to become part of the team? Visit our job offers.

 

Translator: Alina Ranzinger

Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.


Related articles

Safety Instructions for AMD-SB-7027 AMD SMM vulnerabilities
Safety instructions for AMD-SB-7028 AMD SMM Callout Vulnerability
Security Advisories for AMD-SB-3029