Safety instructions for AMD-SB-3005 CacheWarp

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On November 14th, 2023, AMD published the Security Bulletin AMD-SB-3005. The Trusted-Computing-Technology AMD Secure Encrypted Virtualization (SEV) for EPYC processors of the generations 1 to 3, that are used for encrypting data on virtual machines, are affected. By resetting data changes in the cache, it is possible, for example, to trick the system into accepting a login as successful.[1]

Affected systems

Solution for the problem

AMD provides for AMD EPYC 7003 processors of the "Milan B1" series the microcode update 0x0A0011D1 and for processors of the "Milan-X B2" series the microcode update 0x0A001234. We recommend to install the updated microcode via operating system.

Supermicro is working on new BIOS versions for H11 and H12 mainboards to minimize risks: Supermicro CVE-2023-20592: [1]

Updates for products of Thomas-Krenn

Updates for the corresponding system can be found in the download area of Thomas-Krenn. The updates in the download area have been tested by us to guarantee the stability and compatibility of our systems.

If you need the latest version for your system and it is not yet available in our download area, you can get it at Asus or Supermicro.

More information

References

  1. Memory Integrity Loss (www.amd.com/en/resources/product-security, 14.11.2023)

Translator: Alina Ranzinger

Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.


Related articles

Safety instructions for AMD-SB-3020
Safety instructions for AMD-SB-4008 AMD Client Processor Vulnerabilities
Security instructions for AMD-SB-7039 Unauthorized access to the AMD Secure Processor crypto co-processor