The Sinkclose Vulnerability: A Deep Dive into AMD’s Security Flaw
Recent reports of a critical security flaw in AMD processors have sent shockwaves through the tech industry. In a statement to WIRED, AMD highlighted the complexity of exploiting Sinkclose, emphasizing the need for hackers to already have kernel-level access to a machine, akin to accessing a bank’s safe-deposit boxes after bypassing multiple security layers.

Nissim and Okupski, the researchers behind the Sinkclose technique, discovered a flaw in AMD chips related to the TClose feature. This feature, designed to maintain compatibility with older devices, can be manipulated to execute malicious code at a highly privileged level. Okupski described this bug as the most complex he has ever exploited.
Despite having alerted AMD to the flaw almost a year ago, the researchers withheld publishing their exploit code to allow time for a fix. They urge users to patch their systems promptly, as sophisticated hackers may already be aware of the vulnerability.
For those concerned about protection, updates for Windows machines are expected to be integrated into future OS updates, while patches for servers and Linux systems may require a more manual approach. The researchers stress the importance of acting quickly, as the deep level of control offered by Sinkclose can compromise the entire system’s security.
Updated 9 am ET, 8/9/2024: AMD has released a list of chips affected by Sinkclose. Check it out here.