August 23, 2024 – GIGABYTE TECHNOLOGY Co. Ltd, a leading manufacturer of motherboards, graphics cards, and hardware solutions, announced today the BIOS update that fixes a recently identified security vulnerability “Sinkclose” of AMD desktop processors.
This security flaw was reported to impact all AMD processors since 2006 and millions of devices globally. GIGABYTE remains working closely with AMD and demonstrates our commitment to swiftly addressing any issues that may affect our customers' experience. The latest AGESA BIOS which can fix the security vulnerability will be released to the website in succession starting by end of August.
User are encouraged to install the updated BIOS at their earliest convenience. The BIOS can be easily updated using GIGABYTE's @BIOS, Q-Flash, or Q-Flash Plus technology. Please refer to the following table for the AGESA BIOS version and applicable models.
Motherboard Models | BIOS AGESA version |
AM5 600 series | AMD AGESA 1.2.0.1 for Ryzen 8000/ 7000-series Processors |
AM4 500/ 400/ 300series | AMD AGESA 1.2.0.Cb for Ryzen 5000/ 5000G/ 4000G-series Processors AMD AGESA 1.2.0.Cc for above processors and adding Ryzen 3000-series Processors |
sTRX4 TRX40 series | AMD AGESA 1.0.0.B for Ryzen Threadripper 3000-series Processors |
sTR5 TRX50 series | AMD AGESA 1.1.0.0f for Ryzen Threadripper PRO 7000/ Ryzen Threadripper 7000-series Processors |
Please pay close attention to GIGABYTE’s website for the latest update and more information: https://www.gigabyte.com/Motherboard/AMD-Series
For more information about Sinkclose vulnerability, please refer to SMM Lock Bypass on AMD website.
{{ item.Title }}
{{ item.Desc }}