Description
Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:NExploitability: 0.8 | Impact: 5.8Attack Vector: Local
Complexity: High
Privileges: High
User Interaction: None
Scope: Changed
Confidentiality: High
Integrity: High
Availability: None
Affected Packages1 packages
🔴Vulnerability Details
2OSVamd64-microcode vulnerabilities↗2025-06-09 ▶ OSVCVE-2024-56161: Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU m↗2025-02-03 ▶ 📋Vendor Advisories
4UbuntuAMD Microcode vulnerabilities↗2025-06-09 ▶ UbuntuAMD Microcode vulnerability↗2025-06-09 ▶ Red Hatkernel: hw:amd: Vulnerability in guest VM protected by SEV when loading malicious firmware↗2025-02-03 ▶ DebianCVE-2024-56161: amd64-microcode - Improper signature verification in AMD CPU ROM microcode patch loader may allow ...↗2024 ▶ 🕵️Threat Intelligence
1BleepingcomputerAMD fixes bug that lets hackers load malicious microcode patches↗2025-02-05 ▶