Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
AMD Zen Processors Vulnerable to EntrySign Flaw

AMD Zen Processors Vulnerable to EntrySign Flaw

by Tekmono Editorial Team
11/04/2025
in News
Share on FacebookShare on Twitter

AMD has confirmed that its upcoming Zen 5 processors are vulnerable to the “EntrySign” security flaw, a stealthy bug that allows malicious code execution via unsigned microcode patches.

The EntrySign flaw resides in AMD’s signature verification process for microcode updates, which are low-level patches chipmakers deploy after CPUs ship to fix bugs or security issues. Typically, the operating system or firmware loads only the microcode that AMD has signed and approved. However, EntrySign lets attackers with ring 0 (kernel-level) access bypass this safeguard on affected chips.

Affected Zen 5 processors include Ryzen 9000 “Granite Ridge” CPUs, EPYC 9005 “Turin” server chips, AI-focused Ryzen AI 300 processors with Strix Halo, Strix Point, and Krackan Point, and Ryzen 9000HX “Fire Range” laptop CPUs. Notably, the EntrySign vulnerability affects AMD processors from Zen 1 through Zen 5, impacting a broad range of products from mainstream Ryzen chips to beefy EPYC server processors.

Related Reads

OpenAI Launches Customizable Skills for Codex Coding Agent

Amazon’s Alexa+ to Integrate with Four New Services

EA Investigated for AI-Generated Content in Battlefield 6

Apple to Start iPhone 18 Production in January

AMD has released a fix for desktop and older EPYC chips through the ComboAM5PI 1.2.0.3c AGESA update, which motherboard vendors are incorporating into BIOS updates. Users are advised to check their motherboard vendor’s website for a BIOS update to mitigate the issue. However, patches for the new EPYC Turin server processors are expected later this month, indicating a slightly more complex server situation.

While exploiting the EntrySign flaw requires higher-level system privileges, which mitigates the risk for typical users, the potential for abuse in data centers and cloud environments remains a significant concern. Fortunately, a system restart removes any malicious microcode that was loaded, providing some relief. AMD and its partners are working quickly to contain the issue, driven by the potential risks in critical infrastructure.

ShareTweet

You Might Be Interested

OpenAI Launches Customizable Skills for Codex Coding Agent
News

OpenAI Launches Customizable Skills for Codex Coding Agent

24/12/2025
Amazon’s Alexa+ to Integrate with Four New Services
News

Amazon’s Alexa+ to Integrate with Four New Services

24/12/2025
EA Investigated for AI-Generated Content in Battlefield 6
News

EA Investigated for AI-Generated Content in Battlefield 6

24/12/2025
Apple to Start iPhone 18 Production in January
News

Apple to Start iPhone 18 Production in January

24/12/2025
Please login to join discussion

Recent Posts

  • OpenAI Launches Customizable Skills for Codex Coding Agent
  • Amazon’s Alexa+ to Integrate with Four New Services
  • EA Investigated for AI-Generated Content in Battlefield 6
  • Apple to Start iPhone 18 Production in January
  • Connect Your Phone to Wi-Fi Easily

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals