AMD Ryzen CPU Sinkclose

Sinkclose: A recently discovered vulnerability that compromises most AMD processes manufactured since 2006

Sinkclose, a newly identified vulnerability, affects nearly all AMD processors released since 2006. It allows attackers to install bootkits, a type of hard-to-detect malware that infiltrates the Master Boot Record and is activated when the operating system is initialized. More alarming is the fact that this malware cannot be identified by common anti-malware solutions and can persist even after reinstalling the operating system.

However, exploiting the vulnerability is not straightforward, requiring kernel-level permissions. However, an attacker with experience and resources can exploit this weakness. Surprisingly, the exploit remained undetected for 18 years, and there is no evidence that it has been used in attacks until now.

AMD was notified 10 months ago and recently issued a statement regarding the issue. All AMD processors, including those intended for data centers and embedded systems, are vulnerable. However, the company reacted quickly, releasing patches that fixed the problem for most processors of recent generations without impacting performance. Unfortunately, Ryzen 3000, 2000 and 1000 series processors will not receive these patches as they are considered EoL (End of Life) and no longer receive software support. However, the likelihood of Sinkclose-based attacks is extremely low for users of these processors, so there is no major cause for concern.

sinkclose amd vulnerability

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top