Googlers Unleash AMD Chip Hack: Random Numbers Now Always 4!
Googlers cracked AMD’s security, allowing them to load unofficial microcode and make processors always output 4 for random numbers. The vulnerability exposes AMD chips to potential threats, but only with kernel-level access. To counter this, AMD is rolling out official microcode updates to patch the flaw.

Hot Take:
Apparently, Google’s new hobby is turning AMD processors into glorified calculators that only know the number 4. Who needs a random number generator when you can have a dictatorship of digits? And, as if that wasn’t enough, they casually unraveled AMD’s security like it’s a sweater their cat got a hold of. Let’s just hope they’re too busy with this to start meddling with our coffee machines next.
Key Points:
- Google researchers have found a way to bypass AMD’s microcode security, allowing unofficial microcode to be loaded onto AMD processors.
- The demonstration involved a microcode patch that forces the processor’s random number generator to always output the number 4.
- This discovery has significant implications for AMD’s secure encrypted virtualization and root-of-trust security features.
- The vulnerability requires kernel-level access, limiting its use to systems with high-level privileges.
- AMD is working on an official microcode update to patch the security hole, with some updates already released for datacenter processors.
Already a member? Log in here