CVE-2021-26356

7.4 HIGH

📋 TL;DR

This vulnerability is a Time-of-Check Time-of-Use (TOCTOU) race condition in AMD's ASP bootloader that allows an attacker to tamper with SPI ROM data after it's been read to memory. This can lead to S3 sleep state data corruption and potential information disclosure. It affects systems with vulnerable AMD processors and firmware.

💻 Affected Systems

Products:
  • AMD processors with vulnerable ASP bootloader firmware
Versions: Specific firmware versions as listed in AMD advisories
Operating Systems: All operating systems running on affected AMD hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with vulnerable AMD firmware regardless of operating system. Check AMD advisories for specific processor families.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could corrupt sensitive data during S3 sleep state transitions, potentially leading to system instability, data loss, or extraction of sensitive information from memory.

🟠

Likely Case

Local attackers with physical access or administrative privileges could exploit this to cause system crashes or potentially read sensitive data from memory during sleep state transitions.

🟢

If Mitigated

With proper firmware updates and security controls, the risk is significantly reduced to minimal impact on system stability.

🌐 Internet-Facing: LOW - This requires local access or administrative privileges to exploit, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal attackers with physical access or administrative privileges could potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access and knowledge of specific timing conditions. No public exploits have been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates as specified in AMD-SB-3001 and AMD-SB-4001

Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001

Restart Required: Yes

Instructions:

1. Check system manufacturer for BIOS/UEFI firmware updates. 2. Download appropriate firmware update from manufacturer. 3. Follow manufacturer's instructions to update firmware. 4. Reboot system to apply changes.

🔧 Temporary Workarounds

Disable S3 Sleep State

all

Disable S3 sleep/suspend to RAM functionality to prevent exploitation during sleep state transitions

Powercfg /h off (Windows)
systemctl mask suspend.target (Linux)

🧯 If You Can't Patch

  • Restrict physical access to vulnerable systems
  • Implement strict privilege management to limit administrative access

🔍 How to Verify

Check if Vulnerable:

Check system BIOS/UEFI firmware version against AMD advisories. Use manufacturer tools to check current firmware version.

Check Version:

wmic bios get smbiosbiosversion (Windows) or dmidecode -s bios-version (Linux)

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in AMD advisories. Check that firmware update was successful in system logs.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes during sleep/wake cycles
  • Firmware update logs showing version changes
  • Security event logs showing unauthorized physical access

Network Indicators:

  • No direct network indicators as this is a local vulnerability

SIEM Query:

EventID=6008 OR EventID=41 (Windows crash events) combined with physical access logs

🔗 References

📤 Share & Export