- AMD chips malware exploit has been identified due to a vulnerability in the System Management Mode of AMD processors, allowing malware installation that survives OS reinstalls.
- The “Sinkclose” vulnerability grants attackers high system privileges, enabling them to embed malware in firmware, making it difficult to detect or remove.
- AMD has started releasing patches for affected Ryzen and Epyc processors, but the flaw has a “high” severity rating and is not easy to exploit without kernel-level access.
- Researchers warn that while exploiting Sinkclose requires existing privileges, the potential for elite hackers to misuse it poses a significant threat.
- IOActive plans to discuss the vulnerability further at the DEF CON security conference, withholding proof-of-concept code temporarily to allow AMD time to address the issue.
Related Video
Published on: June 24, 2020
Description: In this video I discuss the Intel Management Engine and AMD's Platform Security Processor, both of which are hardware level ...
Spyware at The Hardware Level - Intel ME & AMD PSP
Related Wikipedia Articles
Topics: No responseResponse
Response may refer to: Call and response (music), musical structure Reaction (disambiguation) Request–response Output or response, the result of telecommunications input Response (liturgy), a line answering a versicle Response (music) or antiphon, a response to a psalm or other part of a religious service Response, a phase in emergency management...
Read more: Response