AMD Security Bulletin AMD-SB-7039, June 2025
Vulnerability Disclosure:
Supermicro is aware of the security vulnerability which may allow a privileged attacker to access the Crypto Co-Processor (CCP) registers from x86 architecture.
CVE:
- CVE-2023-20599
- Severity: High
Findings:
A vulnerability in some AMD CPU processors may allow a privileged attacker to interfere with the operations of the Crypto Co-Processor (CCP) hardware of the AMD Secure Processor (ASP). This vulnerability, if exploited, could potentially lead to decryption of sensitive information stored within the system's non-volatile random-access memory (NVRAM) and other protected data store, including private keys under the control of AMD Secure Processor.
Affected products:
AMD Motherboard Generation | BIOS Version with Fix |
---|---|
H11 – EPYC™ 7001/7002 series | v 2.8 |
H12 – H12SSW-AN6 – EPYC 7002/7003 series | v 2.7 |
H12 – H12SSW-iNR/NTR – EPYC 7002/7003 series | v 2.8 |
H12 – H12SSW-iNL/NTL – EPYC 7002/7003 series | v 2.8 |
H12 – H12DSG-O-CPU – EPYC 7002/7003 series | v 2.8 |
H12 – H12DST-B – EPYC 7002/7003 series | v 2.8 |
H12 – H12SST-PS – EPYC 7002/7003 series | v 2.8 |
H12 – H12SSW-iN/NT – EPYC 7002/7003 series | v 2.8 |
H12 – BH12SSi-M25 – EPYC 7002/7003 series | v 3.1 |
H12 – H12DSU-iN – EPYC 7002/7003 series | v 3.0 |
H12 – H12SSFF-AN6 – EPYC 7002/7003 series | v 3.1 |
H12 – H12SSL-i/C/CT/NT – EPYC 7002/7003 series | v 2.8 |
H12 – H12DSi-N6/NT6 – EPYC 7002/7003 series | v 3.0 |
H12 – H12SSFR-AN6 – EPYC 7002/7003 series | v 2.9 |
H12 – H12DSG-Q-CPU6 – EPYC 7002/7003 series | v 2.8 |
H12 – H12SSG-AN6 – EPYC 7002/7003 series | v 2.9 |
H12 – H12DGQ-NT6 – EPYC 7002/7003 series | v 2.8 |
H12 – H12SSG-ANP6 – EPYC 7002/7003 series | v 2.9 |
H12 – H12DGO-6 – EPYC 7002/7003 series | v 3.2 |
H12 – H12DSU-iNR – EPYC 7002/7003 series | v 2.9 |
Remediation:
- All affected Supermicro motherboard SKUs will require a BIOS update to mitigate this potential vulnerability.
- An updated BIOS firmware had been created to mitigate this potential vulnerability. Supermicro is currently testing and validating affected products. Please check Release Notes for the resolution.