- Joined
- Jan 5, 2006
- Messages
- 18,584 (2.62/day)
System Name | AlderLake |
---|---|
Processor | Intel i7 12700K P-Cores @ 5Ghz |
Motherboard | Gigabyte Z690 Aorus Master |
Cooling | Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans |
Memory | 32GB DDR5 Corsair Dominator Platinum RGB 6000MT/s CL36 |
Video Card(s) | MSI RTX 2070 Super Gaming X Trio |
Storage | Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2 |
Display(s) | 23.8" Dell S2417DG 165Hz G-Sync 1440p |
Case | Be quiet! Silent Base 600 - Window |
Audio Device(s) | Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533 |
Power Supply | Seasonic Focus Plus Gold 750W |
Mouse | Logitech MX Anywhere 2 Laser wireless |
Keyboard | RAPOO E9270P Black 5GHz wireless |
Software | Windows 11 |
Benchmark Scores | Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock |
ZeroPeril security researcher Kyriakos Economou has revealed that he has found a driver vulnerability in several AMD chipsets.
The bug allows attackers to extract information from RAM via the Platform Security Processor (PSP) in AMD CPUs. It seems to only apply to the Windows driver.
This allows sensitive information such as passwords to be stolen.
The PSP is AMD's take on Intel's SGX enclave and is the part of the memory that the processor entrusts with sensitive information.
When Windows communicates with the enclave, it does so through the kernel driver amdsps.sys.
The researcher says to have stolen several gigabytes of data. It is not a hardware problem, but the implementation of the driver itself.
So it can be solved with a driver update. Nothing is mentioned about the Epyc products, these chips don't seem to pose a problem.

AMD has since stated that not only the Ryzen 2000 and Ryzen 3000 processors are vulnerable, the Ryzen 1000 chips, Threadripper,
Ryzen 5000 and several older processors also suffer from the problem, according to the researcher himself and The Record.
You will find the complete list at the bottom.
The chip designer recommends that users update their system directly to AMD PSP driver 5.17.0.0 via Windows Update, or manually to AMD Chipset Driver 3.08.17.735.
The ZeroPeril white paper states that practically all AM4 chipsets use the vulnerable driver, but nothing is mentioned about the chipsets for the older CPUs.
It is striking that the FX 6000 chips are mentioned, but they do not have an integrated GPU. Presumably the AMD A 6000 apus are meant.
Vulnerable chipsets:
zeroperil.co.uk
therecord.media
The bug allows attackers to extract information from RAM via the Platform Security Processor (PSP) in AMD CPUs. It seems to only apply to the Windows driver.
This allows sensitive information such as passwords to be stolen.
The PSP is AMD's take on Intel's SGX enclave and is the part of the memory that the processor entrusts with sensitive information.
When Windows communicates with the enclave, it does so through the kernel driver amdsps.sys.
The researcher says to have stolen several gigabytes of data. It is not a hardware problem, but the implementation of the driver itself.
So it can be solved with a driver update. Nothing is mentioned about the Epyc products, these chips don't seem to pose a problem.

AMD has since stated that not only the Ryzen 2000 and Ryzen 3000 processors are vulnerable, the Ryzen 1000 chips, Threadripper,
Ryzen 5000 and several older processors also suffer from the problem, according to the researcher himself and The Record.
You will find the complete list at the bottom.
The chip designer recommends that users update their system directly to AMD PSP driver 5.17.0.0 via Windows Update, or manually to AMD Chipset Driver 3.08.17.735.
The ZeroPeril white paper states that practically all AM4 chipsets use the vulnerable driver, but nothing is mentioned about the chipsets for the older CPUs.
It is striking that the FX 6000 chips are mentioned, but they do not have an integrated GPU. Presumably the AMD A 6000 apus are meant.
Vulnerable chipsets:
- B350
- A320
- X370
- X399
- B450
- X470
- X570
- B550
- A520
- TRX40
- WRX80
- AMD FX 6000-cpu's with R7-graphics (presumably AMD A 6000-apu's)
- AMD A10-apu's with R6-graphics
- AMD A8-apu's with R6-graphics
- AMD A6-apu's with R5-graphics
- AMD A4-apu's with Radeon-graphics
- AMD Athlon X4
- AMD E1-apu's with Radeon-graphics
- AMD Ryzen 1000-series
- AMD Ryzen 2000-series
- AMD Ryzen 3000-series
- AMD Ryzen 5000-series
- AMD Ryzen Threadripper (presumably all)
ZeroPeril Ltd is a cyber security company skilled in delivering software, malware analysis and training
ZeroPeril Ltd is a cyber security company skilled in delivering software, malware analysis and training

AMD CPU driver bug can break KASLR, expose passwords
AMD has advised Windows users this week to update their operating systems in order to receive a patch for a dangerous vulnerability in one of its CPU chipset drivers that can be exploited to dump system memory and steal sensitive information from AMD-powered computers.
Last edited: