CVE-2023-20558
📋 TL;DR
This vulnerability in AMD's CPM OEM SMM (System Management Mode) firmware allows a privileged attacker to manipulate control flow and tamper with SMM handlers. This could lead to escalation of privileges from ring 0 (kernel) to ring -2 (SMM), giving attackers full system control. It affects systems with vulnerable AMD processors and firmware.
💻 Affected Systems
- AMD Ryzen processors with CPM firmware
📦 What is this software?
Ryzen Threadripper 2970wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper 2970wx Firmware →
Ryzen Threadripper 2990wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper 2990wx Firmware →
Ryzen Threadripper Pro 3795wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper Pro 3795wx Firmware →
Ryzen Threadripper Pro 3945wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper Pro 3945wx Firmware →
Ryzen Threadripper Pro 3955wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper Pro 3955wx Firmware →
Ryzen Threadripper Pro 3975wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper Pro 3975wx Firmware →
Ryzen Threadripper Pro 3995wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper Pro 3995wx Firmware →
Ryzen Threadripper Pro 5945wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper Pro 5945wx Firmware →
Ryzen Threadripper Pro 5955wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper Pro 5955wx Firmware →
Ryzen Threadripper Pro 5965wx Firmware by Amd
View all CVEs affecting Ryzen Threadripper Pro 5965wx Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with persistent firmware-level backdoor installation, allowing attackers to bypass all security controls including secure boot and hypervisors.
Likely Case
Privileged attacker (local administrator or compromised kernel) gains SMM-level access to read/write protected memory, install persistent malware, or disable security features.
If Mitigated
Attack limited to kernel-level access without SMM escalation if proper firmware updates are applied and SMM protections are enabled.
🎯 Exploit Status
Exploitation requires privileged local access and detailed knowledge of AMD firmware internals; no public exploits known
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to AMD advisory for specific firmware versions
Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-1027.html
Restart Required: Yes
Instructions:
1. Check system manufacturer's website for BIOS/UEFI firmware updates 2. Download appropriate firmware for your system model 3. Follow manufacturer's firmware update instructions carefully 4. Reboot system to apply update
🔧 Temporary Workarounds
Restrict local administrative access
allLimit number of users with local administrative privileges to reduce attack surface
Enable SMM protection features
allEnable SMM protection settings in BIOS/UEFI if available
🧯 If You Can't Patch
- Implement strict access controls to limit local administrative privileges
- Monitor for suspicious SMM-related activity and privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check BIOS/UEFI firmware version against AMD advisory; use manufacturer's system information tools
Check Version:
wmic bios get smbiosbiosversion (Windows) or dmidecode -t bios (Linux)
Verify Fix Applied:
Verify firmware version has been updated to patched version; check system logs for successful firmware update
📡 Detection & Monitoring
Log Indicators:
- Unexpected firmware modification attempts
- SMM handler access from non-SMM code
- Privilege escalation attempts
Network Indicators:
- None - this is a local privilege escalation vulnerability
SIEM Query:
Search for: firmware modification events, SMM access violations, or unexpected privilege changes