AMD has announced it will release a patch addressing the 'Sinkclose' vulnerability in Ryzen 3000 desktop processors (codenamed Matisse) on August 20. This decision marks a reversal from the company's earlier stance, as outlined in its updated SMM Lock Bypass Security Bulletin.
The Sinkclose vulnerability has impacted most AMD processors since 2006. It exploits a flaw in the System Management Mode (SMM) of affected chips, enabling attackers to execute code within the SMM environment. This type of attack is particularly concerning because it is nearly impossible for standard antivirus software to detect. Additionally, malware leveraging this vulnerability can persist even after an operating system reinstall, making it exceptionally challenging to remove.
Exploiting the Sinkclose vulnerability is complex and requires prior access to the computer’s kernel through another exploit. Nevertheless, due to its severity, AMD is prioritizing the release of a security patch. Previously, AMD committed to patching the Sinkclose vulnerability across all Ryzen CPUs, including those built on the Zen 1 architecture. This commitment extends to various Zen 1, Zen 2, Zen 3, and Zen 4 processors, covering server, mobile, and desktop platforms.
The upcoming update will address this critical security issue, mitigating the risks associated with the Sinkclose vulnerability in Ryzen 3000 series processors. Users are advised to install the patch promptly to ensure their systems remain secure.