Safety instructions for AMD SB-7033 CPU Microcode Signature Verification Vulnerability

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On March 5th 2025, AMD published the security bulletin AMD-SB-7033. Google researchers provided a report with the title AMD microcode “Signature Verification Vulnerability“ for AMD. This vulnerability allows an attacker with system administration rights to load malignant CPU microcode patches. AMD assumes that this problem is caused by a vulnerability of the algorithm for the signature verification that could allow an attacker with administrator rights to load microcode patches. AMD plans to publish remedial measures to solve this problem. [1]

Affected systems

Code Names Serie CPUID
Naples AMD EPYC™ 7001 Series 0x00800F12
Rome AMD EPYC™ 7002 Series 0x00830F10
Milan AMD EPYC™ 7003 Series 0x00A00F11
Milan-X AMD EPYC™ 7003 Series 0x00A00F12
Genoa AMD EPYC™ 9004 Series 0x00A10F11
Genoa-X AMD EPYC™ 9004 Series 0x00A10F12
Bergamo/Siena AMD EPYC™ 9004 Series 0x00AA0F02
Raphael AMD EPYC™ 4004 Series 0x00A60F12

Solution

AMD recommends to update the microcode of the affected platforms.

CVE Mitigation (Minimum Versions)
AMD EPYC™ 7001 Series

“Naples”

AMD EPYC™ 7002 Series

“Rome”

AMD EPYC™ 7003 Series

“Milan”

AMD EPYC™ 9004 Series

“Genoa”

AMD EPYC™ 9004 Series

“Raphel”

CVE-2024-56161 7.2 (High) Naples B2 uCode: 0x08001278



Delivered in NaplesPI 1.0.0.P1

(Release: 2024-12-13)

Rome B0 uCode: 0x0830107D



Delivered in RomePI 1.0.0.L1

(Release: 2024-12-13)

SEV FW

1.55.29 (hex 1.37.1D)

TCB[SNP] = 0x18


uCode

Milan: 0x0A0011DB

Milan-X: 0x0A001244



Delivered in: MilanPI 1.0.0.F2

(Release: 2024-12-13)

SEV FW

1.55.40 (hex 1.37.28)

TCB[SNP] = 0x17


uCode

Genoa: 0x0A101154

Genoa-X: 0x0A10124F

Bergamo/Siena: 0x0AA00219


Delivered in: Genoa 1.0.0.E3

(Release: 2024-12-16)

ComboAM5PI

1.0.0.a

(Release: 2025-01-07)

ComboAM5PI

1.0.0.4

(Release: Jan’25)

ComboAM5PI

1.2.0.3

(Release: 2025-01-08)

Supermicro has published new BIOS versions with the patches for these safety gaps.[2]

Updates of products for Thomas-Krenn

Updates for the corresponding system can be found in the download area of Thomas-Krenn. The updates in the download area have been tested by us to ensure the stability and the compatibility of our systems.

If you need the latest version for your system and it is not yet available in our download area, you can get this version in the downloading area at Asus or Supermicro

References

Related articles

Safety instructions for AMD-SB-7028 AMD SMM Callout Vulnerability
Security Advisories for AMD-SB-3009 AMD Server Processor Vulnerabilities, February 2025
Security instructions for AMD-SB-7039 Unauthorized access to the AMD Secure Processor crypto co-processor