AMD Acknowledges Zen 5 RDSEED Cryptographic Randome Key Generation Bug With Microcode Fixes

Quick Report

AMD has officially acknowledged a hardware bug in the RDSEED instruction on Zen 5 CPUs, cataloged as AMD-SB-7055 (CVE-2025-62626). The 16-bit and 32-bit forms of RDSEED can return zero values, potentially weakening cryptographic key generation if undetected. The 64-bit variant is unaffected. AMD rates the issue as high severity and is distributing microcode and firmware updates to OEMs, with AGESA TurinPI 1.0.0.8 for EPYC 9005 due November 14 and consumer updates later in November.

Short-term workarounds include prioritizing the 64-bit RDSEED path, masking RDSEED from software, or treating zero returns as failures. Users should install BIOS/microcode updates as soon as available and consider regenerating sensitive keys created on unpatched systems. The bug can impact entropy for cryptographic keys and nonces, making timely updates critical for security.

Written using GitHub Copilot GPT-4.1 in agentic mode instructed to follow current codebase style and conventions for writing articles.

Source(s)

  • TPU
  • AMD Security Bulletin
  • Tom's Hardware