A team of Google researchers working with AMD recently discovered a major CPU exploit on Zen-based processors. The exploit allows anyone with local admin privileges to write and push custom microcode updates to affected CPUs. The same Google team has released the full deep-dive on the exploit, including how to write your own microcode. Anyone can now effectively jailbreak their own AMD CPUs.

The exploit affects all AMD CPUs using the Zen 1 to Zen 4 architectures. AMD released a BIOS patch plugging the exploit shortly after its discovery, but any of the above CPUs with a BIOS patch before 2024-12-17 will be vulnerable to the exploit. Though a malicious actor wishing to abuse this vulnerability needs an extremely high level of access to a system to exploit it, those concerned should update their or their organization’s systems to the most recent BIOS update.

  • Skull giver@popplesburger.hilciferous.nl
    link
    fedilink
    arrow-up
    3
    ·
    10 months ago

    Some companies refuse to boot games that aren’t running Windows 11 in secure boot mode with TPM 2.0 for remote attestation, using the TPM as a hardware ID that’s difficult to fake. Ignoring half the PC gamers who are on Windows 10 is worth it for them for fighting cheaters alone.

    I don’t think they will ban anyone until the first microcode cheats are proven to exist, but after that things may turn sideways for some AMD owners in some games.