AMD Chips Fail to Receive Critical Sinkclose Security Update
AMD's Response to Sinkclose Security Flaw
AMD has initiated efforts to patch software for various processors impacted by the recent Sinkclose security flaw, as uncovered by researchers at IOActive. The vulnerability was first detailed in a report by Wired, highlighting that it impacts most AMD processors dating back to 2006.
Older AMD Models Exempt from Updates
Despite the ongoing updates, it has come to light that certain older models, including the Ryzen 1000, 2000, and 3000 series, as well as Threadripper 1000 and 2000 series, will not receive any patches.
- AMD's rationale: These models are classified as older products and fall outside of the company's software support window.
- Newer processor models and all embedded processors, however, are set to receive necessary updates.
The Risk of the Sinkclose Flaw
The Sinkclose vulnerability is particularly concerning for governments and larger organizations, as it could allow malicious actors to execute code in the chip's typically secured System Management Mode.
Although the threat level may seem lower for average users, experts advise vigilance, as exploiting the flaw could lead to severe consequences.
This article was prepared using information from open sources in accordance with the principles of Ethical Policy. The editorial team is not responsible for absolute accuracy, as it relies on data from the sources referenced.