AMD Zen 5 处理器漏洞:RDSEED 指令缺陷破坏随机数完整性
AMD Zen 5处理器存在关键漏洞CVE-2025-62626,影响RDSEED指令生成随机数的安全性。该指令在特定条件下返回零值并错误标记成功,可能导致加密密钥和认证令牌被预测或操控。AMD计划通过微码和固件更新修复该问题,并建议用户优先应用补丁以防范风险。 2025-11-4 04:43:15 Author: cybersecuritynews.com(查看原文) 阅读量:1 收藏

AMD Zen5 RDSEED Vulnerability

AMD has disclosed a critical vulnerability affecting its Zen 5 processor lineup that compromises the reliability of random number generation, a fundamental security feature in modern computing.

The flaw, tracked as CVE-2025-62626, impacts the RDSEED instruction used by systems to generate cryptographically secure random numbers essential for encryption, authentication, and other security operations.

The vulnerability stems from a defect in the RDSEED instruction implementation on Zen 5 processors. Under certain conditions, the instruction returns a value of zero while incorrectly signaling success through the carry flag (CF=1).

This behavior creates a dangerous scenario where software believes it has received a valid random number when it has actually obtained a predictable zero value. The issue affects both 16-bit and 32-bit forms of the RDSEED instruction, though the 64-bit version remains unaffected.

Understanding the RDSEED Flaw

AMD learned about this bug through an unconventional channel. The issue was first reported publicly on the Linux kernel mailing list rather than through AMD’s standard Coordinated Vulnerability Disclosure process.

This public disclosure path highlights the collaborative nature of open-source security research but also underscores the challenge of managing security information across diverse reporting channels.

google

The severity of this vulnerability cannot be understated. Random number generation forms the backbone of cryptographic security in modern systems.

When RDSEED fails silently by returning zeros while indicating success, applications may generate weak encryption keys, predictable authentication tokens, or compromised security protocols.

CVECVE DescriptionCVSS Score
CVE-2025-62626Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values.7.2 (High) CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

An attacker with local system access could potentially exploit this weakness to predict or influence cryptographic operations, leading to data breaches or unauthorized access.

System administrators can utilize the 64-bit form of RDSEED exclusively, mask the RDSEED capability from software detection by modifying boot parameters, or implement software logic to treat zero returns as failures requiring retry attempts. The company plans to release microcode updates and AGESA firmware revisions across its product portfolio.

AMD EPYC 9005 Series processors will receive updates by mid-November 2025, while consumer Ryzen 9000 Series, Ryzen AI 300 Series, and Threadripper 9000 processors target late November releases. Embedded processor variants will see patches deployed through January 2026.

Organizations running affected Zen 5 systems should prioritize applying these updates once available through their original equipment manufacturers.

Until patches are deployed, implementing the recommended software workarounds provides essential protection against potential exploitation of this random integrity vulnerability.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews


文章来源: https://cybersecuritynews.com/amd-zen-5-rdseed-vulnerability/
如有侵权请联系:admin#unsafe.sh