Security researchers have discovered a vulnerability that affects almost all AMD CPUs, allowing access to some of the deepest parts of the chip. Named 'Sinkclose', the flaw allows attackers that already have kernel-level access to modify SMM (System Management Mode) settings even with existing protections enabled.
Attackers could use the flaw to install malware that would be virtually undetectable, and extremely difficult to remove. However, gaining kernel access in the first place is no easy task, and AMD has already begun releasing fixes for some of the affected chips (via Bleeping Computer).
The vulnerability was discovered by researchers Enrique Nissim and Krzysztof Okupski, two researchers from security services firm IOActive, who presented their findings at this year's Def Con security conference in Las Vegas over the weekend.
AMD has released an advisory notice detailing chips vulnerable to the attack, along with firmware fixes that are being provided to OEMs for BIOS updates to fix the flaw. However, Ryzen 3000, 2000 and 1000 series chips will not receive updates, as AMD told Tom's Hardware that "there are some older products that are outside our software support window."
Many of AMD's most recent processors have already received updates to remove the vulnerability. It's worth noting that while Kernel-level system access is very difficult to achieve for a would-be-attacker, it's not impossible—so if you own an AMD CPU and haven't updated the BIOS in a while, it'd be worth checking with your motherboard manufacturer to make sure you're completely up-to-date.
Still, it's data center systems and machines holding very sensitive information that would likely be the targets here, so home users shouldn't be too concerned.
AMD's latest Zen 5 9000 series processors like the Ryzen 5 9600X and Ryzen 7 9700X are not included on the list, presumably as they're using the latest BIOS revisions with the fix [[link]] already applied. While this flaw might [[link]] be difficult to leverage, it's still a pretty nasty way for a system to fall prone to malicious actors, so the usual advice applies—keep your BIOS up-to-date, and your antivirus in tip-top condition to prevent attacks in the first place.
