Safety instructions for AMD-SB-4004 client vulnerabilities
On August 13th 2024, AMD published the Security Bulletin AMD-SB-4004. Security vulnerabilities were discovered in ASP (AMD Secure processor) and other platform components.[1]
Affected systems
- systems with AMD Ryzen Threadripper 3000 processors
- systems with AMD Ryzen Threadripper PRO 3000WX processors
- systems with AMD Ryzen Threadripper PRO 5000WX processors
Solution for the problem
Here is a tabular list of the corresponding CVEs and AGESA & firmware updates for the correction, for every Threadripper generation, if available.
AMD Ryzen Threadripper 3000:
| security vulnerability | risk potential: | AGESA version |
|---|---|---|
| CVE-2022-23817 | high | CastlePeakPI-SP3r3
1.0.0.8 (2022-11-30) |
| CVE-2021-46746 | medium | CastlePeakPI-SP3r3
1.0.0.7 (2022-01-28) |
| CVE-2021-26387 | low | CastlePeakPI-SP3r3
1.0.0.7 (2022-01-28) |
| CVE-2023-20518 | low | CastlePeakPI-SP3r3
1.0.0.9 (2023-02-26) |
AMD Ryzen Threadripper PRO 3000WX:
| security vulnerability | risk potential: | AGESA version |
|---|---|---|
| CVE-2021-26344 | high | ChagallWSPI-sWRX8
1.0.0.6 (2023-03-15) |
| CVE-2022-23817 | high | ChagallWSPI-sWRX8
1.0.0.5 (2022-11-23) CastlePeakWSPI-sWRX8 1.0.0.A (2022-11-23) |
| CVE-2021-46746 | medium | ChagallWSPI-sWRX8
1.0.0.2 (2022-01-20) CastlePeakWSPI-sWRX8 1.0.0.9 (2022-01-20) |
| CVE-2021-26387 | low | ChagallWSPI-sWRX8
1.0.0.2 (2022-01-22) CastlePeakWSPI-sWRX8 1.0.0.9 (2022-01-22) |
| CVE-2021-46772 | low | ChagallWSPI-sWRX8
1.0.0.6 (2023-03-15) |
| CVE-2023-20518 | low | ChagallWSPI-sWRX8
1.0.0.6 (2023-03-15) CastlePeakWSPI-sWRX8 1.0.0.B (2023-02-28) |
AMD Ryzen Threadripper PRO 5000WX:
| security vulnerability | risk potential: | AGESA version |
|---|---|---|
| CVE-2021-26344 | high | ChagallWSPI-sWRX8
1.0.0.6 (2023-03-15) |
| CVE-2022-23817 | high | ChagallWSPI-sWRX8
1.0.0.5 (2022-09-29) |
| CVE-2023-20578 | high | ChagallWSPI-sWRX8
1.0.0.7 (2024-01-11) |
| CVE-2021-46746 | medium | ChagallWSPI-sWRX8
1.0.0.2 (2022-01-07) |
| CVE-2021-26387 | low | ChagallWSPI-sWRX8
1.0.0.1 (2021-11-10) |
| CVE-2021-46772 | low | ChagallWSPI-sWRX8
1.0.0.6 (2023-03-15) |
| CVE-2023-20518 | low | ChagallWSPI-sWRX8
1.0.0.6 (2023-03-15) |
Supermicro published a Security Bulletin about security vulnerabilities. A list with BIOS versions of the corresponding mainboards, with an AGESA version to close the gap, is also available:[2]
| AMD motherboard | BIOS version |
|---|---|
| M12SWA | 2.1a |
| H13SAE-MF | 2.0a |
| H13SRD-F | 1.2 |
| H13SRE-F | 1.0 |
Updates for the products of Thomas-Krenn
Updates for the corresponding system can be found in the download area of Thomas-Krenn. The updates in the download area have been tested by us to guarantee the stability and compatibility of our systems.
If you require the latest version for your system and it is not yet available in our download area, you can get it at Asus or Supermicro.
References
- ↑ Client Vulnerabilities – August 2024 (www.amd.com/en/resources/product-security, 13.08.2024)
- ↑ AMD Security Vulnerabilities, August 2024 (www.supermicro.com)
|
Author: Thomas-Krenn.AG At Thomas-Krenn.AG we pay attention to the best possible service. To do justice to this, we have created our Thomas-Krenn Wiki. Here we share our knowledge with you and inform you about basics and news from the IT world. You like our knowledge culture and want to become part of the team? Visit our job offers. |
|
Translator: Alina Ranzinger Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.
|


