AMD Chips Vulnerable to Zenbleed Attacks 

Geek insider, geekinsider, geekinsider. Com,, amd chips vulnerable to zenbleed attacks , gaming

It’s tough news for AMD fans. A group of researchers recently unveiled a new security threat named ‘Zenbleed’ that directly impacts the AMD processors. This threat can potentially extract sensitive information from your system. 

Zenbleed targets a specific technology in AMD chips called Simultaneous Multithreading (SMT). SMT allows multiple threads to run on each core of the processor, thereby enhancing the processor’s performance. The researchers found that by exploiting this technology, attackers could gain unauthorized access to data. 

The researchers demonstrated the Zenbleed attack on a Ryzen 7 3700X 8-core processor. They were able to successfully extract an encryption key, which could potentially grant them access to sensitive data. 

But before you panic, it’s essential to know that Zenbleed is a complicated attack to execute. The attacker must already have access to your system and specifically target the SMT technology. So, the chances of a casual user getting hit by the Zenbleed attack are relatively low. 

AMD, aware of the situation, has already started working on the fix. They have stated that the upcoming AMD Zen 3-based processors will not be affected by this attack, but there’s no word yet on a fix for existing AMD Zen 2-based chips.

The Zenbleed vulnerability affects devices that utilize AMD processors, particularly those with the Simultaneous Multithreading (SMT) technology. This includes a wide range of devices such as personal computers, laptops, and servers. Specifically, the Ryzen 7 3700X 8-core processor has been demonstrated to be susceptible to this attack. However, any device with an AMD Zen 2-based chip could potentially be targeted. The upcoming AMD Zen 3-based processors, on the other hand, are expected to be immune to this security threat according to AMD.

Stay tuned for more updates, and remember to keep your systems updated and secure!

Leave a Reply

Your email address will not be published. Required fields are marked *