AMD Patches SEV Flaw: Malicious Microcode No Longer Invited
AMD fixed a flaw that allowed hackers to bypass SEV protection and load malicious microcode. This vulnerability, discovered by Google researchers, could have led to compromised CPU operations. AMD’s patch requires a BIOS update and reboot, securing virtual machines from potential threats.

Hot Take:
AMD’s CPUs had a brief stint as aspiring magicians, attempting to make your secure VMs disappear—into the hands of hackers! Thankfully, AMD’s new patch ensures their magic show is now strictly a vanishing act for bugs and vulnerabilities.
Key Points:
- AMD patched a flaw in its Secure Encrypted Virtualization (SEV) that could allow malicious microcode to be loaded.
- The vulnerability, CVE-2024-56161, had a CVSS score of 7.2, indicating a high severity.
- Google researchers discovered the flaw and provided proof-of-concept exploits.
- The patch requires a BIOS update and a system reboot to fully secure systems.
- The issue affected AMD Zen 1 through Zen 4 CPUs due to improper signature verification.
Already a member? Log in here