The Register: Asus lets processor security fix slip out early, AMD confirms patch in progress

Source URL: https://www.theregister.com/2025/01/23/asus_amd_processor_fix/
Source: The Register
Title: Asus lets processor security fix slip out early, AMD confirms patch in progress

Feedly Summary: Answers on a postcard to what ‘Microcode Signature Verification Vulnerability’ might mean
AMD has confirmed at least some of its microprocessors suffer a microcode-related security vulnerability, the existence of which accidentally emerged this month after a fix for the flaw appeared in a beta BIOS update from PC maker Asus.…

AI Summary and Description: Yes

**Summary:** AMD has acknowledged a security vulnerability related to microcode signature verification in its processors, which was inadvertently revealed by a beta BIOS update from Asus. This vulnerability could allow unauthorized microcode to be loaded, posing risks to system integrity, although current assessments suggest the issue may not be critically severe.

**Detailed Description:** The recent disclosure about AMD’s microprocessor vulnerability highlights significant implications for security in hardware systems. Here are the key points related to the discovery and its potential impact:

– **Type of Vulnerability:** AMD has indicated that certain microprocessors have a microcode signature verification vulnerability. Microcode is crucial for managing processor functionality and is typically proprietary to the processor manufacturer.

– **Public Disclosure Concerns:** The vulnerability became public when Tavis Ormandy from Google’s Project Zero pointed out the issue after a beta BIOS update from Asus included references to the vulnerability, well before AMD could formally disclose it. This raises questions about communication protocols between manufacturers and OEMs regarding vulnerabilities.

– **Potential Exploitation:** The vulnerability might allow unauthorized microcode manipulation if detected. Given that loading microcode requires privileged access, an attacker with local administrator rights could exploit this vulnerability through malicious code, jeopardizing the fundamental security mechanisms of the CPU.

– **Patch and Mitigation:** AMD confirmed that it is aware of the vulnerability and is actively working on mitigations while advising customers to adhere to standard security practices. The company plans to release a security bulletin soon detailing impacted products and recommended actions.

– **Community Speculation:** The security community has begun speculating on the risks, particularly concerning whether the fixes provided will be effective against potential downgrade attacks or other forms of exploitation. Experts like Demi Marie Obenour have highlighted concerns regarding the implications of arbitrary microcode execution on system security layers.

– **Overall Risk Assessment:** While AMD’s statements suggest that the actual risk might be limited to systems with highly privileged users, the capacity to load arbitrary microcode remains a severe risk that could undermine extensive security measures.

Understanding and addressing this type of hardware vulnerability is crucial for security professionals who manage infrastructure and cloud systems, as it directly impacts system reliability and user data protection. Such vulnerabilities underscore the importance of stringent firmware and microcode verification practices, especially when dealing with trusted suppliers and installation processes.