AMD's 'Sinkclose' Flaw: A Decades-Old Vulnerability Threatens Millions of Processors

BigGo Editorial Team
AMD's 'Sinkclose' Flaw: A Decades-Old Vulnerability Threatens Millions of Processors

AMD's 'Sinkclose' Flaw: A Decades-Old Vulnerability Threatens Millions of Processors

Security researchers have uncovered a critical vulnerability in AMD processors that could allow attackers to gain deep, persistent access to affected systems. Dubbed 'Sinkclose', this flaw has existed in AMD chips since at least 2006, potentially impacting hundreds of millions of devices.

The Sinkclose Vulnerability

Discovered by IOActive researchers Enrique Nissim and Krzysztof Okupski, Sinkclose exploits a feature called TClose in AMD processors. This vulnerability allows attackers to execute malicious code in the highly privileged System Management Mode (SMM), bypassing normal security measures.

Key points about Sinkclose:

  • Affects virtually all AMD processors since 2006
  • Allows installation of hard-to-detect bootkit malware
  • Can persist even after operating system reinstallation
  • Particularly dangerous on systems with improperly implemented Platform Secure Boot
Experts discuss the impact of the Sinkclose vulnerability on AMD processors at a technology event
Experts discuss the impact of the Sinkclose vulnerability on AMD processors at a technology event

Exploitation and Impact

While exploiting Sinkclose requires initial kernel-level access, the researchers warn that such access is not uncommon for sophisticated attackers. Once leveraged, Sinkclose enables:

  • Deep system infiltration
  • Evasion of antivirus detection
  • Persistent access that survives OS reinstalls

In severe cases, completely discarding an infected machine may be easier than attempting to remove the malware.

AMD's Response

AMD has acknowledged the vulnerability and has begun releasing patches:

  • Mitigation options available for EPYC datacenter and Ryzen PC products
  • Patches for embedded products coming soon
  • Full list of affected products available on AMD's security bulletin page

Recommendations

Users and system administrators should:

  1. Apply patches as soon as they become available
  2. Be aware that Linux and embedded systems may require manual updates
  3. Monitor for any unusual system behavior

While Sinkclose requires significant expertise to exploit, its potential impact makes prompt patching crucial for maintaining system security.

The discovery of Sinkclose highlights the ongoing importance of hardware-level security research, even in processors that have been in use for nearly two decades.