Notebookcheck Logo

AMD fixes major Ryzen 7000 and Ryzen 9000 vulnerability

Important BIOS security updates released for the latest AMD Ryzen CPUs (Image source: AMD)
Important BIOS security updates released for the latest AMD Ryzen CPUs (Image source: AMD)
AMD motherboard manufacturers have begun distributing new BIOS updates to fix a security flaw affecting a wide range of Ryzen processors. The vulnerability, located in the TPM 2.0 code, could allow hackers with ordinary user privileges to access sensitive information or disrupt TPM. The fix, delivered through AGESA 1.2.0.3e firmware, is now available for AM5-based systems.

Motherboard manufacturers, including Asus and MSI, are rolling out new BIOS updates that fix an important security flaw discovered in AMD's processors. The issue involves the Trusted Platform Module (TPM) and is officially labeled CVE-2025-2884. This flaw allows attackers with basic user privileges to potentially access sensitive data or disrupt the TPM itself. Although the vulnerability is considered medium risk, it is notable because it's easier to exploit than most similar issues.

The security flaw originates from a coding error in the TPM 2.0 software, specifically within the CryptHmacSign() function. This issue allows regular user-level applications to read beyond the intended data buffer, potentially exposing up to 65,535 bytes of sensitive information. Consequently, attackers could leverage this flaw either to access confidential data stored within the TPM or to cause the module to fail altogether, creating a denial-of-service scenario. Although the vulnerability has been assigned a medium severity rating (CVSS score of 6.6), it poses a notable risk due to its ease of exploitation—it doesn't require elevated kernel-level permissions, only standard user access.

The flaw affects many Ryzen processors, including desktop CPUs from Athlon 3000 "Dali" and Ryzen 3000 "Matisse" through Ryzen 9000 "Granite Ridge." Mobile chips from Ryzen 3000 Mobile "Picasso" up to Ryzen AI 300 "Strix Point," as well as Threadripper workstation CPUs from Threadripper 3000 "Castle Peak" to Threadripper 7000 "Storm Peak," are also impacted. While previous updates have already addressed the vulnerability on older AMD CPU generations, the AGESA 1.2.0.3e firmware specifically targets AM5-based platforms.

It is important to note that these BIOS updates are irreversible on certain motherboards, including those from Asus, meaning users cannot roll back to previous firmware versions once installed.

Besides fixing the security issue, the update also prepares motherboards for upcoming Ryzen processors, likely from the anticipated Ryzen 9000F series. Additionally, this update improves compatibility and performance for high-capacity memory setups, particularly those using 4×64 GB DRAM modules at speeds between 6000 and 6400 MT/s.

AMD urges users to verify the availability of the BIOS update through their motherboard manufacturer's support page and install it as soon as possible. 

Source(s)

static version load dynamic
Loading Comments
Comment on this article
Please share our article, every link counts!
Mail Logo
> Expert Reviews and News on Laptops, Smartphones and Tech Innovations > News > News Archive > Newsarchive 2025 06 > AMD fixes major Ryzen 7000 and Ryzen 9000 vulnerability
Andrew Sozinov, 2025-06-15 (Update: 2025-06-15)