The Acer Swift 3 SF314-43-R2LX contains an AMD processor with unpatched security vulnerabilities. They allow attackers to run arbitrary code and to bypass security mechanisms provided in the UEFI firmware. These attacks happen so early in Platform Initialization (PI), that they are undetectable and unstoppable by virus scanners.
Acer please respond to these vulnerabilities with a BIOS update that contains the 2022/02/28 AGESA patches provided by AMD.
Just like other modern processors the AMD 5700U is a SoC (System on a Chip) that contains its own discrete Platform Security Processor (PSP). The PSP itself is a simple ARM Cortex processor core, that does initialization of the main CPU and secure boot loading. The (firmware) code that is run by this Security Processor is called AGESA PI (AMDs Generic Encapsulated Software Architecture - Platform Initialization). It contains flaws. These flaws have been confirmed by AMD (see below). Luckily AMD provided patches for these flaws. The patches are in AGESA PI version: CezannePI-FP6 1.0.0.9a 02/28/2022. A user can't install those directly. In order to update the AGESA PI code, it needs to be integrated into a BIOS update. Acer needs to integrate the patches by AMD into a new BIOS update in order for users of Acer systems to install them and patch the vulnerabilities.
Here are the details about the security flaws:
The SoC AMD 5700U processor in the Acer Swift 3 SF314-43-R2LX contains unmitigated security flaws that need to be patched with AGESA PI update CezannePI-FP6 1.0.0.9a 2022/02/28. The AGESA patches need to be integrated into a new BIOS update.
The
latest BIOS update from Acer is: version 1.04 with external release date 2021/08/31 and internal date: 2021/07/28 does not contain the AGESA PI patches from 2022/02/28.
In AMD's may 2022 security bulletin (Bulletin ID:
AMD-SB-1027) the following security vulnerabilities were identified:
During security reviews in collaboration with Google, Microsoft, and
Oracle, potential vulnerabilities in the AMD Secure Processor (ASP), AMD
System Management Unit (SMU), AMD Secure Encrypted Virtualization (SEV)
and other platform components were discovered and have been mitigated
in AMD AGESA™ PI packages.
For the AMD 5700U processor (an AMD Ryzen™ 5000 Series Mobile processor with Radeon™ graphics, internal name: “Lucienne”) the vulnerabilities are:
- CVE-2020-12944
CVE-2020-12946
CVE-2020-12951
CVE-2021-26312
CVE-2021-26361
CVE-2021-26362
CVE-2021-26363
CVE-2021-26366
CVE-2021-26368
CVE-2021-26369
CVE-2021-26386
CVE-2021-26388
CVE-2021-26382
CVE-2021-26317
CVE-2021-39298
CVE-2021-26339
CVE-2021-26384
(Read more about the details of these vulnerabilities
here.)
As the latest available BIOS update for the Acer Swift 3 SF314-43-R2LX is from 2021/07/28 and the patches were release by AMD on 02/28/2022. The vulnerabilities cannot be patched and therefore the Acer Swift 3 SF314-43 is at risk.
To determine your current AGESA version is very hard if not impossible without information from Acer. The AGESA version contained in a BIOS update needs to be stated in the release notes of that BIOS update. But Acer did not provide that information.
With the tool
HWiNFO the following information can be retrieved from an Acer Swift 3 SF314-43 running BIOS update V1.04 2021/08/3 (the latest BIOS update available by Acer at this moment):
- Current MCU (CPU Microcode Update revision): 8608102
- BIOS: V1.04 07/28/2021
- SMU Firmware: 55.75.0 (System Management Unit)
How can one determine AGESA PI version from these values?
[Edited the thread to add issue detail]