CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-56161

High Severity
SVRS
40/100

CVSSv3
7.2/10

EPSS
0.00015/1

CVE-2024-56161 affects AMD CPUs, potentially allowing unauthorized microcode loading. This vulnerability stems from improper signature verification in the CPU ROM microcode patch loader, impacting confidentiality and integrity. An attacker with local administrator privileges could exploit this to load malicious CPU microcode, especially affecting confidential guests using AMD SEV-SNP.

The CVSS score is 7.2, but SOCRadar's SVRS of 40 suggests a lower immediate risk compared to other vulnerabilities, though it still warrants attention. The vulnerability allows a malicious local administrator to load unsigned code. This could lead to data breaches and system compromise. While the SVRS indicates lower immediate criticality, the potential impact on data security makes addressing CVE-2024-56161 an important security task.

In The Wild
CVSS:3.1
AV:L
AC:H
PR:H
UI:N
S:C
C:H
I:H
A:N
2025-04-02

2025-02-03
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-56161 is a vulnerability related to improper signature verification in the AMD CPU ROM microcode patch loader. This vulnerability allows an attacker with local administrator privileges to load malicious CPU microcode. This could lead to the loss of confidentiality and integrity of confidential guest systems running under AMD SEV-SNP.

While the CVSS score is 7.2, indicating a high severity, the SOCRadar Vulnerability Risk Score (SVRS) is 48, suggesting a moderate risk level. This difference stems from the SVRS's comprehensive approach, considering various factors like threat actor activity and exploit availability.

Key Insights

  • Local Privilege Required: Exploitation of this vulnerability requires local administrator privileges, making it a less immediate threat for systems with strong access control measures.
  • Impact on Confidential Guests: The vulnerability primarily affects confidential guest systems running under AMD SEV-SNP. While this may not be a concern for all users, it's crucial for organizations employing these technologies to prioritize mitigation.
  • Malware Loading Potential: The most critical aspect is the ability of attackers to load malicious CPU microcode, potentially leading to data breaches, system manipulation, and unauthorized access.
  • "In The Wild" Status: The "In The Wild" tag indicates that this vulnerability is actively exploited by hackers, making it imperative to address the vulnerability with urgency.

Mitigation Strategies

  • Patching: Prioritize installing the latest AMD microcode updates to address the signature verification flaw.
  • SEV-SNP Configuration: Review and strengthen the configuration of AMD SEV-SNP environments, focusing on access control and security measures for guest systems.
  • Privilege Management: Implement robust privilege management practices to restrict local administrator access, minimizing the potential impact of exploitation.
  • Security Monitoring: Enhance security monitoring systems to detect suspicious activity related to CPU microcode loading and potential signs of compromise.

Additional Information:

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Bad luck, Windows 10 users. No fix yet for ransomware-exploited bug - theregister.com
2025-04-08
Bad luck, Windows 10 users. No fix yet for ransomware-exploited bug - theregister.com | News Content: Patch Tuesday Patch Tuesday has arrived, and Microsoft has revealed one flaw in its products under active exploitation and 11 critical issues in its code to fix. Redmond delivered fixes for more than 120 flaws this month; none are rated with a CVSS severity score of nine or higher. The one that deserves most attention is CVE-2025-29824, an elevation of privilege (EoP) hole in the Windows Common Log File System Driver, because it is already being exploited. In a separate note, Microsoft explained
rss
google.com
forum
news
Tough luck, Windows 10 users. No fix yet for ransomware-exploited OS bug - theregister.com
2025-04-08
Tough luck, Windows 10 users. No fix yet for ransomware-exploited OS bug - theregister.com | News Content: Patch Tuesday Patch Tuesday has arrived, and Microsoft has revealed one flaw in its products under active exploitation and 11 critical issues in its code to fix. Redmond delivered fixes for more than 120 flaws this month; none are rated with a CVSS severity score of nine or higher. The one that deserves most attention is CVE-2025-29824, an elevation of privilege (EoP) hole in the Windows Common Log File System Driver, because it is already being exploited. In a separate note, Microsoft
google.com
rss
forum
news
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
Krypt3ia2025-04-01
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest | Date: 2.13.25 🚨 Top Headlines Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job Summary: Tools typically employed by Chinese cyberespionage groups have been used in a recent ransomware attack, likely by an individual hacker, Symantec notes in a fresh report. The toolset includes a legitimate Toshiba executable deployed on the victims’ systems to sideload [&#8230;]Date: 2.13.25 <img alt="🚨" class="wp-smiley" src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/1f6a8.png" style="height
wordpress.com
rss
forum
news
Google Release Details of AMD Microcode Vulnerability
BoerenkoolMetWorst2025-03-06
Google Release Details of AMD Microcode Vulnerability | Last month, Google security researchers disclosed a high-severity vulnerability in AMD&#039;s CPU microcode signature verification system, affecting multiple AMD processors. Today, they have released the full chain details of the vulnerability dubbed &quot;EntrySign,&quot; a significant vulnerability (CVE-2024-56161) affecting AMD&#039;s Zen-based CPUs that allowed the execution of unauthorized microcode. The flaw, affecting processors from Zen 1 through Zen 4
wilderssecurity.com
rss
forum
news
SANS Stormcast Thursday Mar 6th: DShield ELK Analysis; Jailbreaking AMD CPUs; VIM Vulnerability; Snail Mail Ransomware
Dr. Johannes B. Ullrich2025-03-06
SANS Stormcast Thursday Mar 6th: DShield ELK Analysis; Jailbreaking AMD CPUs; VIM Vulnerability; Snail Mail Ransomware | Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Thursday Mar 6th: DShield ELK Analysis; Jailbreaking AMD CPUs; VIM Vulnerability; Snail Mail Ransomware DShield Traffic Analysis using ELK The "DShield SIEM" includes an ELK dashboard as part of the Honeypot. Learn how to find traffic of interest with this tool. https://isc.sans.edu/diary/DShield%20Traffic%20Analysis%20using%20ELK/31742 Zen and the Art
sans.edu
rss
forum
news
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
Ajit Jasrotia2025-02-10
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February] | In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one seems minor until it becomes the entry point for an attack. This week, we&#8217;ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system [&#8230;] The post ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]<
allhackernews.com
rss
forum
news
AMD Processors Vulnerable to Malicious Microcode
John Loucaides2025-02-07
AMD Processors Vulnerable to Malicious Microcode | Google researchers recently published proof-of-concept code demonstrating the ability to create malicious microcode patches on AMD processors from Zen 1 through Zen 4. This vulnerability would allow an attacker to arbitrarily alter the execution of virtually any instruction on a vulnerable processor. The vulnerability, CVE-2024-56161, affects the most fundamental operation of a modern processor. Furthermore, […] The post AMD Processors Vulnerable to Malicious Microcode appeared first on <a href="https://eclypsium.com
securityboulevard.com
rss
forum
news

Social Media

EntrySign" vuln (CVE-2024-56161) hits AMD Zen 1-4 CPUs. Malicious microcode risk! #AMD #Cybersecurity #TechNews #CPU
0
0
1
Actively exploited CVE : CVE-2024-56161
1
0
0
🚨 ¡Alerta de ciberseguridad! La vulnerabilidad "EntrySign" (CVE-2024-56161) afecta a procesadores AMD Zen 🖥️. Descubre cómo hackers pueden eludir controles de seguridad. ¡Infórmate ya! 🔍 #Ciberseguridad #AMD #Vulnerabilidad https://t.co/wW38PsZ6Js
0
1
3
🚨 ¡Alerta de ciberseguridad! La vulnerabilidad "EntrySign" (CVE-2024-56161) afecta a procesadores AMD Zen 🖥️. Descubre cómo hackers pueden eludir controles de seguridad. ¡Infórmate ya! 🔍 #Ciberseguridad #AMD #Vulnerabilidad https://t.co/EPcNvk9fAp
0
0
0
🚨 ¡Alerta de ciberseguridad! La vulnerabilidad "EntrySign" (CVE-2024-56161) afecta a procesadores AMD Zen 🖥️. Descubre cómo hackers pueden eludir controles de seguridad. ¡Infórmate ya! 🔍 #Ciberseguridad #AMD #Vulnerabilidad https://t.co/t6NYZBfcGQ
0
0
0
@ryanaraine @craiu @juanandres_gs Google's partial disclosure of the AMD microcode flaw (CVE-2024-56161) is concerning. Exploiting local admin privileges? This demands immediate cybersecurity attention.
0
0
0
🚨💥 On the show this week, we discuss Google's deliberate partial-disclosure of a high-risk AMD microcode flaw (CVE-2024-56161) that allows an adversary with local administrator privilege to load malicious AMD CPU microcode @craiu @juanandres_gs https://t.co/RBlxWt0wLS
1
0
2
TBP gang talking about microcode attack (CVE-2024-56161) and why traditional security tools are blind 🧐 👉 Binarly REsearch explains: https://t.co/QTvl908Skq
0
5
4
Google Security Team Uncovers AMD Microcode Vulnerability (CVE-2024-56161) https://t.co/QEHWaKJ19T
0
0
0
Google Security Team Uncovers AMD Microcode Vulnerability (CVE-2024-56161) Uncover the high-severity AMD CPU vulnerability (CVE-2024-56161) disclosed by Google Security Team. Learn about the associated risks and impacts on secure computing environments https://t.co/qHYW1V2UL6
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html
AF854A3A-2127-422B-91AE-364DA2661108http://www.openwall.com/lists/oss-security/2025/02/04/1
[email protected]https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html
AF854A3A-2127-422B-91AE-364DA2661108http://www.openwall.com/lists/oss-security/2025/02/04/1
AF854A3A-2127-422B-91AE-364DA2661108http://www.openwall.com/lists/oss-security/2025/03/06/2
[email protected]https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html
AF854A3A-2127-422B-91AE-364DA2661108http://www.openwall.com/lists/oss-security/2025/02/04/1
AF854A3A-2127-422B-91AE-364DA2661108http://www.openwall.com/lists/oss-security/2025/03/06/2
AF854A3A-2127-422B-91AE-364DA2661108https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7033.html
[email protected]https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html

CWE Details

CWE IDCWE NameDescription
CWE-347Improper Verification of Cryptographic SignatureThe software does not verify, or incorrectly verifies, the cryptographic signature for data.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence