AMD Client Vulnerabilities – May 2022

Bulletin ID: AMD-SB-1027
Potential Impact: Varies by CVE, see descriptions below
Severity: Varies by CVE, see descriptions below

Summary

During security reviews in collaboration with Google, Microsoft, and Oracle, potential vulnerabilities in the AMD Secure Processor (ASP), AMD System Management Unit (SMU), AMD Secure Encrypted Virtualization (SEV) and other platform components were discovered and have been mitigated in AMD EPYC™ AGESA™ PI packages.

CVE Details

Refer to Glossary for explanation of terms

CVE

Severity

CVE Description

CVE-2021-26317

7.9 (High)

Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.

CVE-2021-26335

7.5 (High)

Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.

CVE-2021-39298

7.5 (High)

A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.

CVE-2023-20558

High

Insufficient control flow management in AmdCpmOemSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to an escalation of privileges.

CVE-2023-20559

High

Insufficient control flow management in AmdCpmGpioInitSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to escalation of privileges.

CVE-2021-26373

7.2 (High)

Insufficient bound checks in System Management Unit (SMU) may result in system voltage malfunction that could result in denial of resources and/or possibly denial of service.

CVE-2020-12946

6.8 (Medium)

Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service.

CVE-2021-26361

6.4 (Medium)

A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.

CVE-2021-26363

6.4 (Medium)

A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.

CVE-2021-26366

6.4 (Medium)

An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.

CVE-2021-26369

6.4 (Medium)

A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.

CVE-2021-26386

6.4 (Medium)

A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call to the Stage 2 Bootloader potentially leading to corrupt memory and code execution.

CVE-2021-26336

6.1 (Medium)

Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.

CVE-2021-26337

6.1 (Medium)

Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.

CVE-2020-12951

6.1 (Medium)

Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations.

CVE-2021-26376

6.1 (Medium)

Insufficient checks in System Management Unit (SMU) FeatureConfig may result in reenabling features potentially resulting in denial of resources and/or denial of service.

CVE-2021-26352

6.1 (Medium)

Insufficient bound checks in System Management Unit (SMU) PCIe Hot Plug table may result in access/updates from/to invalid address space that could result in denial of service.

CVE-2021-26375

6.1 (Medium)

Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.

CVE-2021-26378

6.1 (Medium)

Insufficient bound checks in System Management Unit (SMU) hot plug PCIe ports may result in access/updates from/to invalid address space that could result in denial of service.

CVE-2021-26372

6.1 (Medium)

Insufficient bound checks in System Management Unit (SMU) PCIe Hot Plug Config Table may result in an out of bounds access/updates from/to invalid address space that could result in denial of service.

CVE-2021-26351

6.1 (Medium)

Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.

CVE-2021-26390

6.0 (Medium)

A malicious or compromised UApp or ABL may coerce the bootloader into corrupting arbitrary memory potentially leading to loss of integrity of data.

CVE-2021-26362

5.7 (Medium)

A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.

CVE-2021-26339

5.5 (Medium)

A bug in AMD CPU’s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.

CVE-2020-12944

5.5 (Medium)

Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution.

CVE-2021-26368

4.1 (Medium)

Insufficient check of the process type in Trusted OS (TOS) may allow an attacker with privileges to enable a lesser privileged process to unmap memory owned by a higher privileged process resulting in a denial of service.

CVE-2021-26388

4.1 (Medium)

Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service.

CVE-2021-26312

4.1 (Medium)

Improper ECC (error correction code) protections implemented in ASP hardware may allow side-channel exposure potentially resulting in information disclosure.

CVE-2021-26384

3.0 (Low)

A malformedSMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of resources.

CVE-2021-26382

1.9 (Low)

An attacker with root account privileges can load any legitimately signed firmware image into the Audio Co-Processor (ACP,) irrespective of  the respective signing key being declared as usable for authenticating an ACP firmware image, potentially resulting in a denial of service.

Affected Products

See Tables

Mitigation

AMD recommends updating to the AGESA™ PI software version indicated below.

Platform

Internal Name

PI Version

Release Date

Applicable CVEs

DESKTOP

AMD Ryzen™ 2000 Series Desktop Processor

“Raven Ridge” AM4

Raven-FP5-AM4 1.1.0.E

02/14/2022

CVE-2020-12944
CVE-2020-12951
CVE-2021-26312
CVE-2021-26361
CVE-2021-26362
CVE-2021-26366
CVE-2021-26368
CVE-2021-26369
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2021-26390
CVE-2021-26317
CVE-2021-39298
CVE-2021-26384
CVE-2023-20558
CVE-2023-20559

Raven-FP5-AM4 1.1.0.D

10/10/2021

PinnaclePI-AM4 1.0.0.C

02/17/2022

ComboAM4PI 1.0.0.8

02/28/2022

ComboAM4v2 PI 1.2.0.6c

01/6/2022

ComboAM4v2 PI 1.2.0.4

8/25/2021

AMD Ryzen™ 2000 Series Desktop Processor

“Pinnacle Ridge”

PinnaclePI-AM4 1.0.0.C

02/17/2022

CVE-2020-12944
CVE-2021-26352
CVE-2021-26361
CVE-2021-26362
CVE-2021-26366
CVE-2021-26369
CVE-2021-26372
CVE-2021-26373
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2021-26317
CVE-2021-39298
CVE-2023-20558
CVE-2023-20559

ComboAM4PI 1.0.0.8

02/28/2022

ComboAM4 V2 PI 1.2.0.6c

02/22/2022

ComboAM4v2 PI 1.2.0.4

08/25/2021

AMD Ryzen™ 3000 Series Desktop Processor

“Matisse” AM4

ComboAM4PI 1.0.0.8

02/28/2022

CVE-2021-26317
CVE-2020-12944
CVE-2020-12951
CVE-2021-26312
CVE-2021-26335
CVE-2021-26336
CVE-2021-26337
CVE-2021-26351
CVE-2021-26352
CVE-2021-26366
CVE-2021-26368
CVE-2021-26372
CVE-2021-26373
CVE-2021-26375
CVE-2021-26376
CVE-2021-26378
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2023-20558
CVE-2023-20559

ComboAM4 V2 PI 1.2.0.6c

02/22/2022

ComboAM4v2 PI 1.2.0.4

08/25/2021

AMD Ryzen™ 5000 Series Desktop Processor

“Vermeer” AM4

ComboAM4 V2 PI 1.2.0.6c

02/22/2022

CVE-2020-12944
CVE-2020-12951
CVE-2021-26312
CVE-2021-26335
CVE-2021-26336
CVE-2021-26337
CVE-2021-26351
CVE-2021-26352
CVE-2021-26366
CVE-2021-26368
CVE-2021-26372
CVE-2021-26373
CVE-2021-26375
CVE-2021-26376
CVE-2021-26378
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2023-20558
CVE-2023-20559

ComboAM4v2 PI 1.2.0.4

08/25/2021

AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics 

“Cezanne” AM4

ComboAM4 V2 PI 1.2.0.6c

02/22/2022

CVE-2021-26361
CVE-2021-26362
CVE-2021-26363
CVE-2021-26366
CVE-2021-26368
CVE-2021-26373
CVE-2021-26386
CVE-2021-26382
CVE-2021-26317
CVE-2021-39298
CVE-2021-26339
CVE-2021-26384
CVE-2023-20558
CVE-2023-20559

ComboAM4v2 PI 1.2.0.4 08/25/2021

HEDT (High End Desktop)

 2nd Gen AMD Ryzen™ Threadripper™ Processor

“Colfax”

SummitPI-SP3r2 1.1.0.5

01/12/2022

CVE-2020-12944
CVE-2021-26352
CVE-2021-26361
CVE-2021-26362
CVE-2021-26366
CVE-2021-26369
CVE-2021-26372
CVE-2021-26373
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2021-26317
CVE-2023-20558
CVE-2023-20559

 3rd Gen AMD Ryzen™ Threadripper™ Processors

“Castle Peak” HEDT

CastlePeakPI-SP3r3 1.0.0.7

01/28/2022

CVE-2020-12944
CVE-2020-12951
CVE-2021-26312
CVE-2021-26336
CVE-2021-26337
CVE-2021-26351
CVE-2021-26352
CVE-2021-26366
CVE-2021-26368
CVE-2021-26372
CVE-2021-26373
CVE-2021-26375
CVE-2021-26376
CVE-2021-26378
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2021-26317
CVE-2021-39298
CVE-2023-20558
CVE-2023-20559

CastlePeakPI-SP3r3 1.0.0.6 09/08/2021

WORKSTATION

 AMD Ryzen™ Threadripper™ PRO Processor

“Castle Peak” WS

ChagallWSPI-sWRX8 1.0.0.2

01/7/2022

CVE-2020-12944
CVE-2020-12951
CVE-2021-26312
CVE-2021-26336
CVE-2021-26337
CVE-2021-26351
CVE-2021-26352
CVE-2021-26366
CVE-2021-26368
CVE-2021-26372
CVE-2021-26373
CVE-2021-26375
CVE-2021-26376
CVE-2021-26378
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2021-26317
CVE-2021-39298
CVE-2021-26339
CVE-2023-20558
CVE-2023-20559

CastlePeakWSPI-sWRX8 1.0.0.9

01/20/2022

CastlePeakWSPI-sWRX8 1.0.0.7 09/08/2021
 

“Chagall” WS

ChagallWSPI-sWRX8 1.0.0.2

01/7/2022

CVE-2020-12944
CVE-2020-12951
CVE-2021-26312
CVE-2021-26336
CVE-2021-26337
CVE-2021-26351
CVE-2021-26352
CVE-2021-26366
CVE-2021-26368
CVE-2021-26373
CVE-2021-26375
CVE-2021-26376
CVE-2021-26378
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2021-26317
CVE-2021-39298
CVE-2021-26339

MOBILE

AMD Ryzen™ 2000 Series Mobile Processor

“Raven Ridge” FP5

Raven-FP5-AM4 1.1.0.E

02/14/2022

CVE-2020-12944
CVE-2021-26312
CVE-2021-26361
CVE-2021-26362
CVE-2021-26366
CVE-2021-26368
CVE-2021-26369
CVE-2021-26373
CVE-2021-26386
CVE-2021-26388
CVE-2021-26317
CVE-2021-39298
CVE-2021-26339
CVE-2021-26384
CVE-2023-20558
CVE-2023-20559

Raven-FP5-AM4 1.1.0.D

10/10/2021

PinnaclePI-AM4 1.0.0.C 

02/17/2022

ComboAM4PI 1.0.0.8

02/28/2022

ComboAM4v2 PI 1.2.0.6c

02/22/2022

AMD Ryzen™ 3000 Series Mobile Processor, 2nd Gen AMD RyzenTM Mobile Processor with RadeonTM Graphics

“Picasso”

PicassoPI-FP5 1.0.0.D

02/28/2022

CVE-2020-12944
CVE-2020-12951
CVE-2021-26312
CVE-2021-26361
CVE-2021-26362
CVE-2021-26366
CVE-2021-26368
CVE-2021-26369
CVE-2021-26373
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2021-26317
CVE-2021-39298
CVE-2021-26339
CVE-2021-26384
CVE-2023-20558
CVE-2023-20559

ComboAM4PI 1.0.0.8

02/28/2022

ComboAM4v2 PI 1.2.0.6c

02/22/2022

ComboAM4v2 PI 1.2.0.4

08/25/2021

AMD AthlonTM 3000 Series Mobile Processors with Radeon™ Graphics

“Dali”/”Dali” ULP

PicassoPI-FP5 1.0.0.D

02/28/2022

CVE-2020-12944
CVE-2020-12951
CVE-2021-26312
CVE-2021-26362
CVE-2021-26366
CVE-2021-26368
CVE-2021-26369
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2021-26317
CVE-2021-39298
CVE-2021-26384
CVE-2023-20558
CVE-2023-20559

AMD AthlonTM 3000 Series Mobile Processors with Radeon™ Graphics

“Pollock”

PollockPI-FT5 1.0.0.3

02/28/2022

CVE-2020-12944
CVE-2020-12951
CVE-2021-26312
CVE-2021-26361
CVE-2021-26362
CVE-2021-26366
CVE-2021-26368
CVE-2021-26369
CVE-2021-26386
CVE-2021-26388
CVE-2021-26390
CVE-2021-26317
CVE-2021-39298
CVE-2021-26384
CVE-2023-20558
CVE-2023-20559

AMD Ryzen™ 4000 Series Mobile Processor with Radeon™ Graphics

“Renoir” FP6

RenoirPI-FP6 1.0.0.7

11/03/2021

CVE-2020-12944
CVE-2020-12946
CVE-2020-12951
CVE-2021-26312
CVE-2021-26361
CVE-2021-26362
CVE-2021-26363
CVE-2021-26366
CVE-2021-26368
CVE-2021-26369
CVE-2021-26373
CVE-2021-26376
CVE-2021-26386
CVE-2021-26388
CVE-2021-26382
CVE-2021-26317
CVE-2021-39298
CVE-2023-20558
CVE-2023-20559

ComboAM4v2 PI 1.2.0.4 08/25/2021

AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics

“Lucienne”

CezannePI-FP6 1.0.0. 9a

02/28/2022

CVE-2020-12944
CVE-2020-12946
CVE-2020-12951
CVE-2021-26312
CVE-2021-26361
CVE-2021-26362
CVE-2021-26363
CVE-2021-26366
CVE-2021-26368
CVE-2021-26369
CVE-2021-26386
CVE-2021-26388
CVE-2021-26382
CVE-2021-26317
CVE-2021-39298
CVE-2021-26339
CVE-2021-26384
CVE-2023-20558
CVE-2023-20559

CezannePI-FP6 1.0.0.5 08/18/2021

AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics

“Cezanne”

CezannePI-FP6 1.0.0.9

02/28/2022

CVE-2020-12944
CVE-2020-12946
CVE-2020-12951
CVE-2021-26312
CVE-2021-26361
CVE-2021-26362
CVE-2021-26363
CVE-2021-26366
CVE-2021-26368
CVE-2021-26369
CVE-2021-26376
CVE-2021-26386
CVE-2021-26388
CVE-2021-26382
CVE-2021-26317
CVE-2021-39298
CVE-2021-26339
CVE-2021-26384
CVE-2023-20558
CVE-2023-20559

CezannePI-FP6 1.0.0.5 08/18/2021

Acknowledgement

AMD thanks the following for reporting these issues and engaging in coordinated vulnerability disclosure.

  • Reported by Shawn Hoffman (Microsoft Offensive Security Research):, CVE-2021-26335, CVE-2021-26336, CVE-2021-26337, CVE-2021-26347, CVE-2021-26350, CVE-2021-26351, CVE-2021-26352, CVE-2021-26372, CVE-2021-26373, CVE-2021-26375, CVE-2021-26376, CVE-2021-26378
  • Reported by Cfir Cohen, Jann Horn, Mark Brand of Google: CVE-2020-12944, CVE-2020-12946, CVE-2020-12951, CVE-2021-26312, CVE-2021-26348, CVE-2021-26349
  • Found by “Silifuzz (Google)”: CVE-2021-26339
  • BINARLY efiXplorer team:  CVE-2023-20558, CVE-2023-20559, CVE-2021-39298
  • Reported by Jiawei Yin(@yngweijw):  CVE-2021-26317
  • Internally reported:  CVE-2021-26353, CVE-2021-26361, CVE-2021-26362, CVE-2021-26363, CVE-2021-26366, CVE-2021-26368, CVE-2021-26369, CVE-2021-26370, CVE-2021-26382, CVE-2021-26384, CVE-2021-26386, CVE-2021-26388, CVE-2021-26390, CVE-2021-46771

 

Revisions

Revision Date  

Description  

03/24/2023

Added CVE-2023-20558 and CVE-2023-20559 and associated PI versions

05/10/2022

Initial publication  

DISCLAIMER

The information contained herein is for informational purposes only and is subject to change without notice. While every precaution has been taken in the preparation of this document, it may contain technical inaccuracies, omissions, and typographical errors, and AMD is under no obligation to update or otherwise correct this information. Advanced Micro Devices, Inc. makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and assumes no liability of any kind, including the implied warranties of non-infringement, merchantability, or fitness for particular purposes, with respect to the operation or use of AMD hardware, software or other products described herein. Any computer system has risks of security vulnerabilities that cannot be completely prevented or mitigated. No license, including implied or arising by estoppel, to any intellectual property rights is granted by this document. Terms and limitations applicable to the purchase or use of AMD’s products are as set forth in a signed agreement between the parties or in AMD's Standard Terms and Conditions of Sale.

AMD, the AMD Arrow logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc. Other product names used in this publication are for identification purposes only and may be trademarks of their respective companies.

© 2022 Advanced Micro Devices, Inc. All rights reserved.