Safety instructions for AMD-SB-4008 AMD Client Processor Vulnerabilities

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On February 13th 2025, AMD published the security bulletin AMD-SB-4008. Security vulnerabilities have been discovered in ASP (AMD Secure Processor) and other platform components. [1]

Affected systems

  • systems with AMD Ryzen Threadripper 3000 processors
  • systems with AMD Ryzen Threadripper PRO 3000WX processors
  • systems with AMD Ryzen Threadripper PRO 5000WX processors

Troubleshooting

Here is a tabulation of the relevant CVEs and AGESA & firmware updates to fix for each Threadripper generation, if available.

AMD Ryzen Threadripper 3000:

safety vulnerability risk potential AGESA version
CVE-2023-31342 high not affected
CVE-2023-31343 high not affected
CVE-2023-31345 high not affected
CVE-2023-20515 medium CastlePeakPI-SP3r3

1.0.0.C

(2024-09-03)

CVE-2021-26387 low not affected
CVE-2023-20507 low not affected

AMD Ryzen Threadripper PRO 3000WX:

safety vulnerability risk potential AGESA version
CVE-2023-31342 high not affected
CVE-2023-31343 high not affected
CVE-2023-31345 high not affected
CVE-2023-20515 medium CastlePeakWSPI-sWRX8

1.0.0.E (2024-09-03)

ChagallWSPI-sWRX8 1.0.0.9 (2024-09-18)

CVE-2023-31331 low not affected
CVE-2023-20507 low not affected

AMD Ryzen Threadripper PRO 5000WX:

safety vulnerability risk potential AGESA version
CVE-2023-31342 high ChagallWSPI-sWRX8

1.0.0.7

(2024-01-11)

CVE-2023-31343 high ChagallWSPI-sWRX8

1.0.0.7

(2024-01-11)

CVE-2023-31345 high ChagallWSPI-sWRX8

1.0.0.7

(2024-01-11)

CVE-2023-20515 medium ChagallWSPI-sWRX8

1.0.0.7

(2024-01-11)

CVE-2023-31331 low not affected
CVE-2023-20507 low not affected

Supermicro published a security bulletin about the security vulnerabilities. A list of BIOS versions for the corresponding mainboards with an AGESA version to close the gaps is also available:[2]

AMD Motherboard BIOS version
M11SDV-4/8C(T)-LN4F not affected
M12SWA v2.1a
H13SAE-MF not affected
H13SRD-F not affected
H13SRE-F not affected
H13SRH not affected
H13SRA-F not affected
H13SRA-TF not affected

Updates for products of Thomas-Krenn

Updates for the corresponding systems can be found in the download area of Thomas-Krenn.

The updates in the download area were tested by us to guarantee the stability and compatibility of our systems.

If you need the latest version for your system and it is not yet available in our download area, you can get it at Asus or Supermicro.

More information

References

  1. AMD Client Processor Vulnerabilities – February 2025 (www.amd.com/en/resources/product-security, 13.02.2025)
  2. AMD Security Vulnerabilities, Februar 2025 (www.supermicro.com)

Author: Thomas-Krenn.AG

At Thomas-Krenn.AG we pay attention to the best possible service. To do justice to this, we have created our Thomas-Krenn Wiki. Here we share our knowledge with you and inform you about basics and news from the IT world. You like our knowledge culture and want to become part of the team? Visit our job offers.

 

Related articles

Safety instructions for AMD SB-7033 CPU Microcode Signature Verification Vulnerability
Safety instructions for AMD-SB-7028 AMD SMM Callout Vulnerability
Security instructions for AMD-SB-7039 Unauthorized access to the AMD Secure Processor crypto co-processor