移至主內容
AMD Security Bulletin AMD-SB-7029, July 2025

Vulnerability Disclosure:

Supermicro is aware of the transient execution security vulnerabilities in some AMD processors. AMD discovered several side-channel attacks while investigating a Microsoft® report titled “Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks”.

CVE:

  • CVE-2024-36350
    • Severity: Medium
  • CVE-2024-36357
    • Severity: Medium
  • CVE-2024-36348
    • Severity: Low
  • CVE-2024-36349
    • Severity: Low

Findings:

AMD has debugged several types of cross-domain informational leakage. and discovered a new speculative side-channel affecting AMD CPUs termed Transient Scheduler Attacks (TSA). These are speculative side-channel attacks related to the execution timing of instructions under specific microarchitectural conditions. In some cases, an attacker may be able to use this timing information to infer data from other contexts, potentially resulting in information leakage.

Affected products:

AMD Motherboard GenerationBIOS Version with Fix
H12 – H12SSW-AN6 – EPYC™ 7002/7003 seriesv 3.3
H12 – H12SSW-iNR/NTR – EPYC 7002/7003 seriesv 3.3
H12 – H12SSW-iNL/NTL – EPYC 7002/7003 seriesv 3.3
H12 – H12DSG-O-CPU – EPYC 7002/7003 seriesv 3.3
H12 – H12DST-B – EPYC 7002/7003 seriesv 3.3
H12 – H12SST-PS – EPYC 7002/7003 seriesv 3.3
H12 – H12SSW-iN/NT – EPYC 7002/7003 seriesv 3.3
H12 – BH12SSi-M25 – EPYC 7002/7003 seriesv 3.3
H12 – H12DSU-iN – EPYC 7002/7003 seriesv 3.3
H12 – H12SSFF-AN6 – EPYC 7002/7003 seriesv 3.3
H12 – H12SSL-i/C/CT/NT – EPYC 7002/7003 seriesv 3.3
H12 – H12DSi-N6/NT6 – EPYC 7002/7003 seriesv 3.3
H12 – H12SSFR-AN6 – EPYC 7002/7003 seriesv 3.3
H12 – H12DSG-Q-CPU6 – EPYC 7002/7003 seriesv 3.3
H12 – H12SSG-AN6 – EPYC 7002/7003 seriesv 3.3
H12 – H12DGQ-NT6 – EPYC 7002/7003 seriesv 3.3
H12 – H12SSG-ANP6 – EPYC 7002/7003 seriesv 3.3
H12 – H12DGO-6 – EPYC 7002/7003 seriesv 3.3
H12 – H12DSU-iNR – EPYC 7002/7003 seriesv 3.3
H13 – H13SSW – EPYC 9004/9005 seriesv 3.5
H13 – H13DSH – EPYC 9004/9005 seriesv 3.5
H13 – H13DSG-O-CPU – EPYC 9004/9005 seriesv 3.5
H13 – H13SST-G/GC – EPYC 9004/9005 seriesv 3.1
H13 – H13SSL-N/NC – EPYC 9004/9005 seriesv 3.4
H13 – H13SSH – EPYC 9004/9005 seriesv 3.4
H13 – H13DSG-O-CPU-D – EPYC 9004 seriesv 3.4
H13 – H13SSF – EPYC 9004/9005 seriesv 3.5
H13 – H13SVW – EPYC 9004v 1.3
H13 – H13DSG-OM – EPYC 9004/9005 seriesv 3.5
H14 – H14DSH – EPYC 9004/9005 seriesv 1.5
H14 – H14SST – EPYC 9004/9005 seriesv 1.3
H14 – H14DSG-OD – EPYC 9004/9005 seriesv 1.4a

Remediation:

  • All affected Supermicro motherboard SKUs will require a BIOS update to mitigate this potential vulnerability.
  • An updated BIOS firmware had been created to mitigate this potential vulnerability. Supermicro is currently testing and validating affected products. Please check Release Notes for the resolution.