Safety instructions for AMD-SB-3003 server vulnerabilities

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On August 13th 2024 , AMD published the Security Bulletin AMD-SB-3003. Security vulnerabilities were discovered in ASP (AMD Secure Processor), SEV (AMD Secure Encrypted Virtualization), SEV-SNP (AMD Secure Encrypted Virtualization – Secure Nested Paging) and in other platform components. [1]

Affected systems

Problem solution

Here is a tabular list of the corresponding CVEs and AGESA & firmware updates for the correction, for every EPYC generation, if available.

AMD EPYC 7001 Naples:

security vulnerability risk potential: AGESA version SEV Firmware
CVE-2023-20578 high NaplesPI 1.0.0.K

(2023-06-14)

N/A

AMD EPYC 7002 Rome:

security vulnerability risk potential: AGESA version SEV Firmware
CVE-2021-26344 high RomePI 1.0.0.C

(2021-07-22)

N/A
CVE-2023-20578 high RomePI 1.0.0.G

(2023-05-05)

N/A
CVE-2021-46772 low RomePI 1.0.0.E

(2022-06-17)

N/A

AMD EPYC 7003 Milan:

security vulnerability risk potential: AGESA version SEV Firmware
CVE-2021-26344 high MilanPI 1.0.0.5

(2021-08-05)

N/A
CVE-2023-20578 high MilanPI 1.0.0.B

(2023-06-08)

N/A
CVE-2023-20584 medium MilanPI 1.0.0.C

(2023-12-18)

SEV 1.55.9

[hex 1.37.09]

CVE-2023-20591 medium MilanPI 1.0.0.B

(2023-06-08)

N/A
CVE-2023-31356 medium MilanPI 1.0.0.C

(2023-12-18)

SEV 1.55.17

[hex 01.37.11]

CVE-2021-46772 low MilanPI 1.0.0.9

(2022-05-21)

N/A

AMD EPYC 9004 Genoa and Bergamo:

security vulnerability risk potential: AGESA version SEV Firmware
CVE-2023-20578 high GenoaPI 1.0.0.2

(2022-10-04)

N/A
CVE-2023-20584 medium GenoaPI 1.0.0.B

(2023-12-15)

SEV 1.55.23

[hex 1.37.17]

CVE-2023-20591 medium Genoa 1.0.0.8

(2023-06-09)

N/A
CVE-2023-31356 medium GenoaPI 1.0.0.B

(2023-12-15)

SEV 1.55.31

[hex 1.37.1F]

CVE-2023-20518 low GenoaPI 1.0.0.4

(2022-12-22)

N/A

Supermicro published a Security Bulletin for the security vulnerabilities. A list with BIOS versions of the corresponding mainboards, with an AGESA version to close the gaps, is also available:[2]

AMD motherboard generation BIOS version
H11 – Naples (unsigned) 1.4
H11 – Naples/Rome (signed) 2.8
H12 – Rome/Milan 2.8
H13 – Genoa 1.8
H13 – Siena (H13SVW) 1.2

Updates for products of Thomas-Krenn

Updates for the corresponding system can be found in the download area of Thomas-Krenn. The updates in the download area have been tested by us to guarantee the stability and compatibility of our systems.

If you require the latest version for your system and it is not yet available in our download area, you can get it at Asus or Supermicro.

References

  1. AMD Server Vulnerabilities – August 2024 (www.amd.com/en/resources/product-security, 13.08.2024)
  2. AMD Security Vulnerabilities, August 2024 (www.supermicro.com)

Translator: Alina Ranzinger

Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.


Related articles

Creating Safety instructions for AMD-SB-7028 AMD SMM Callout Vulnerability
Safety instructions for AMD SB-7033 CPU Microcode Signature Verification Vulnerability
Safety instructions for AMD-SB-3005 CacheWarp