First published: Mon Feb 03 2025(Updated: )
Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMD CPU ROM microcode patch loader |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56161 has a high severity due to the potential for loss of confidentiality and integrity of confidential guests running under AMD SEV-SNP.
To fix CVE-2024-56161, apply the latest firmware updates provided by AMD for the CPU ROM microcode patch loader.
CVE-2024-56161 affects systems utilizing AMD CPU ROM microcode patch loader, particularly those running AMD SEV-SNP.
An attacker with local administrator privileges can exploit CVE-2024-56161 to load malicious CPU microcode.
The potential impacts of CVE-2024-56161 include unauthorized access to sensitive information and compromise of the integrity of guest systems.