Search criteria

21 vulnerabilities found for athlon_pro_300ge_firmware by amd

FKIE_CVE-2022-23815

Vulnerability from fkie_nvd - Published: 2024-08-13 17:15 - Updated: 2025-03-18 21:15

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03194384-10A2-4B6D-BED1-C01908249969",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D532BCD-50E7-41AC-91D3-A0135F2266EE",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3770F180-FB7C-410F-B49D-D30AA05326BC",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FE9FAE-DEC6-42FA-8622-3D5B0C845928",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD8FA542-D8A5-4C7F-BF80-E79CE90D7D76",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6F0F843-A668-4BA3-9111-491BD115E0DA",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD375C2E-B976-4DAE-BF89-EFED1482DB28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DFA8C8-AD16-45B1-934F-AEE78C51DDAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution."
    },
    {
      "lang": "es",
      "value": "Una verificaci\u00f3n de los l\u00edmites inadecuada en el firmware APCB puede permitir que un atacante realice una escritura fuera de los l\u00edmites, corrompiendo la entrada APCB y potencialmente llevando a la ejecuci\u00f3n de c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2022-23815",
  "lastModified": "2025-03-18T21:15:23.087",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 6.0,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-13T17:15:18.197",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2021-26367

Vulnerability from fkie_nvd - Published: 2024-08-13 17:15 - Updated: 2024-12-12 20:41
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
Impacted products
Vendor Product Version
amd radeon_software *
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_gre -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_software *
amd radeon_pro_w6300 -
amd radeon_pro_w6400 -
amd radeon_pro_w6600 -
amd radeon_pro_w6800 -
amd ryzen_9_5980hx_firmware *
amd ryzen_9_5980hx -
amd ryzen_3_3300u_firmware *
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware *
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware *
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware *
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware *
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware *
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware *
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware *
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware *
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware *
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware *
amd ryzen_7_3780u -
amd athlon_gold_3150c_firmware *
amd athlon_gold_3150c -
amd athlon_gold_3150u_firmware *
amd athlon_gold_3150u -
amd athlon_pro_3145b_firmware *
amd athlon_pro_3145b -
amd athlon_silver_3050c_firmware *
amd athlon_silver_3050c -
amd athlon_silver_3050u_firmware *
amd athlon_silver_3050u -
amd athlon_pro_3045b_firmware *
amd athlon_pro_3045b -
amd athlon_silver_3050e_firmware *
amd athlon_silver_3050e -
amd athlon_gold_pro_3150g_firmware *
amd athlon_gold_pro_3150g -
amd athlon_gold_3150g_firmware *
amd athlon_gold_3150g -
amd athlon_gold_pro_3150ge_firmware *
amd athlon_gold_pro_3150ge -
amd athlon_pro_300ge_firmware *
amd athlon_pro_300ge -
amd ryzen_3_4300ge_firmware *
amd ryzen_3_4300ge -
amd ryzen_5_4600ge_firmware *
amd ryzen_5_4600ge -
amd ryzen_7_4700ge_firmware *
amd ryzen_7_4700ge -
amd ryzen_3_4300g_firmware *
amd ryzen_3_4300g -
amd ryzen_5_4600g_firmware *
amd ryzen_5_4600g -
amd ryzen_7_4700g_firmware *
amd ryzen_7_4700g -
amd ryzen_3_5300ge_firmware *
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware *
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware *
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware *
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware *
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware *
amd ryzen_7_5700g -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094",
              "versionEndExcluding": "23.12.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0",
              "versionEndIncluding": "23.q4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1EFDD49-95E7-4E92-A476-9F7E9D2B222A",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "799912F4-2A5D-41F6-B645-5972B966617B",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D7DEDAC-51F3-4B72-8958-72CFDB8572A0",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FE9FAE-DEC6-42FA-8622-3D5B0C845928",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3770F180-FB7C-410F-B49D-D30AA05326BC",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF809F01-E6B3-4975-AC8B-EE2FDD199B14",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2AC7D6-47AB-4178-9585-34293B36F576",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05D78A9-2CED-4BA1-8382-BC8D722E91D9",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8233A5D0-7796-4164-99CF-BB23B74563DF",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03194384-10A2-4B6D-BED1-C01908249969",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03BCFD6B-04D1-4A27-AB06-90F8BA894E2C",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A192415A-41F1-4DF9-A351-A6E879E45431",
              "versionEndExcluding": "comboam4pi_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F10B69-9959-4977-893B-076BFBAC1BA6",
              "versionEndExcluding": "comboam4pi_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7217BA72-D101-49C1-86B7-A63BFA01A056",
              "versionEndExcluding": "comboam4pi_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "045D34B9-50A3-453D-A9E1-64180D1E1B5C",
              "versionEndExcluding": "comboam4pi_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C52E5C9A-DC2E-428F-97CF-61C7340C0579",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AB8A11-9C17-4528-A582-8340964C76A7",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E240139-34E9-4D68-AEBB-6E641C75AB82",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B184CA4-DA2E-4EF7-997C-BA563CB41A08",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "40EDD65C-1101-4F0C-AD08-007A97D7184E",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DCE8037-1ED8-468A-9FBF-B79809A8089A",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2201670-E611-4C1E-BD06-E2B4262C3687",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C51F223-5529-4D10-A7AF-44198DE58684",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35C8C0CE-AA13-434D-83BD-2DA454B1937C",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5A8225E-A53A-4602-ACF6-F142D1CCF9FD",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF3486C1-EAD5-4861-8463-506D59A5F7DA",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
    },
    {
      "lang": "es",
      "value": "Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podr\u00eda provocar una p\u00e9rdida de integridad y disponibilidad."
    }
  ],
  "id": "CVE-2021-26367",
  "lastModified": "2024-12-12T20:41:56.120",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.2,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-13T17:15:17.360",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-20521

Vulnerability from fkie_nvd - Published: 2023-11-14 19:15 - Updated: 2024-11-21 07:41
Summary
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
Impacted products
Vendor Product Version
amd epyc_7001_firmware *
amd epyc_7001 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7261_firmware *
amd epyc_7261 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7371_firmware *
amd epyc_7371 -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7401p_firmware *
amd epyc_7401p -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7601_firmware *
amd epyc_7601 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7h12_firmware *
amd epyc_7h12 -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7663p_firmware *
amd epyc_7663p -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7643p_firmware *
amd epyc_7643p -
amd epyc_7773x_firmware *
amd epyc_7773x -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7573x_firmware *
amd epyc_7573x -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7473x_firmware *
amd epyc_7473x -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7373x_firmware *
amd epyc_7373x -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7303p_firmware *
amd epyc_7303p -
amd epyc_7303_firmware *
amd epyc_7303 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7203p_firmware *
amd epyc_7203p -
amd epyc_7203_firmware *
amd epyc_7203 -
amd athlon_pro_300ge_firmware -
amd athlon_pro_300ge -
amd athlon_gold_pro_3150ge_firmware -
amd athlon_gold_pro_3150ge -
amd athlon_gold_3150g_firmware -
amd athlon_gold_3150g -
amd athlon_gold_pro_3150g_firmware -
amd athlon_gold_pro_3150g -
amd ryzen_threadripper_2990wx_firmware *
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_2970wx_firmware *
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2950x_firmware *
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2920x_firmware *
amd ryzen_threadripper_2920x -
amd ryzen_7_3780u_firmware *
amd ryzen_7_3780u -
amd ryzen_7_3750h_firmware *
amd ryzen_7_3750h -
amd ryzen_7_3700c_firmware *
amd ryzen_7_3700c -
amd ryzen_7_3700u_firmware *
amd ryzen_7_3700u -
amd ryzen_5_3580u_firmware *
amd ryzen_5_3580u -
amd ryzen_5_3550h_firmware *
amd ryzen_5_3550h -
amd ryzen_5_3500c_firmware *
amd ryzen_5_3500c -
amd ryzen_5_3500u_firmware *
amd ryzen_5_3500u -
amd ryzen_5_3450u_firmware *
amd ryzen_5_3450u -
amd ryzen_3_3350u_firmware *
amd ryzen_3_3350u -
amd ryzen_3_3300u_firmware *
amd ryzen_3_3300u -
amd ryzen_3_3250u_firmware *
amd ryzen_3_3250u -
amd ryzen_3_3250c_firmware *
amd ryzen_3_3250c -
amd ryzen_3_3200u_firmware *
amd ryzen_3_3200u -
amd amd_3015e_firmware *
amd amd_3015e -
amd amd_3015ce_firmware *
amd amd_3015ce -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BD7B00D-ECD9-419E-B927-7AD293360BB3",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1053118D-84FB-4126-8558-F731AF578D51",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2567B7A7-23AF-4A5E-B5B4-50A15EBF58FA",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10630C1F-3EAE-47EE-AD1C-6C35052B1C51",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "214D44A0-2B4F-4C3B-BC77-3388F60BEE21",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DC33A9-7EE5-443F-A195-5739E25880D8",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E196A8EC-8E17-4394-BBB9-AAC4B773686A",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6066FB-CE27-447A-B9E3-ECFBB59DF4CC",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F2D9898-5A45-4F76-89F9-A0E0F9B68195",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6554840-DD72-4CB7-B72B-40F0EB4AAB5D",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB8E56A-20CD-4722-91F8-A4BC9E629F84",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17C9FDD3-74A4-4848-B6CE-7861658C3A30",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B748EBB3-37A9-4F2A-A4A4-AAEEF56BABC0",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "264D28A9-A104-4333-9094-8251FBF00880",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02967552-68C0-4111-B05D-BC17EFEF37DD",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "310788CD-F880-42FC-A781-4C69B4C1A408",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5214C3-79CB-4F7D-81F3-9A681E7FC72D",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28F97D09-23CE-44F0-9850-D9E334BA41B8",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60980D2-DD11-4750-B18E-DA1EF0ECF0B2",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A9541F-A050-4ABF-B939-A27248AF12C8",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2ABC7C1-F572-44AD-8950-504BB9DBB496",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4B35F82-5F63-40D9-8064-BAC4CB9162B0",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EAA85BB-83B6-407D-A0D6-4D415F7A96C1",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "894717BC-B96B-46B8-8024-360EFF740ACE",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6C7EDAB-8446-4CE7-A3EC-30B5689E2990",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F54B31-77BA-4CC7-9BD5-71B7B94CE266",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65A360F9-B93C-4F2F-87DD-22665A78C0E0",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1FBDFDF-60D4-4C21-BBFF-F7E7149DD91B",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B91F480-B20D-41FC-8DC3-671216AA8B52",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79EFC4F5-6ADF-4B1D-8D5D-155330690E2C",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A903AEB1-3177-40E1-8664-69084FFACFF3",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4778C2A-F8AD-4BBD-A6FE-01D8A23BF471",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EC455E-2A91-4B26-91D6-6F6D97CB5AD4",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D20CB89E-28E6-49D3-AF22-A316358E44C0",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B797D87-4DB8-48FC-BEAD-3F0D60228410",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F9B5D9-4667-4E94-81B0-C625FBBF3E40",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C372C35-032C-4273-A18D-6E6F6DCD7E83",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9851652C-3E34-4E08-AD6D-A15165093575",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D122678A-2637-43CD-898E-6B6F1632FF9F",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BF9D4E0-8BD0-41F6-88D9-FDD04E0E1A3E",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07F600BA-8999-416C-B9A3-0AC63FBD45D4",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE20426-A6A5-4CFB-AEB9-D32E223F9DDB",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB8C801D-46B1-4C2B-9E33-9E32C7ED6D3E",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6852EDE-ABEF-40C7-A693-A78EECB7E694",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "088728C3-3A0B-43E3-9E7E-23B9FE3BCD6B",
              "versionEndExcluding": "milanpi_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DFA8C8-AD16-45B1-934F-AEE78C51DDAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD375C2E-B976-4DAE-BF89-EFED1482DB28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B8FAEA2-68B5-49A1-AF75-F87A5B464B9D",
              "versionEndExcluding": "summitpi-sp3r2_1.1.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E524CC-0AC0-42B3-B77A-B65651D99B65",
              "versionEndExcluding": "summitpi-sp3r2_1.1.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9D3C4D3-E1A4-481D-9562-9ECB09ADCB16",
              "versionEndExcluding": "summitpi-sp3r2_1.1.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "613C2809-9D90-4C2A-89F6-015BC2C0AC2F",
              "versionEndExcluding": "summitpi-sp3r2_1.1.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF809F01-E6B3-4975-AC8B-EE2FDD199B14",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3770F180-FB7C-410F-B49D-D30AA05326BC",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FE9FAE-DEC6-42FA-8622-3D5B0C845928",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D7DEDAC-51F3-4B72-8958-72CFDB8572A0",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "799912F4-2A5D-41F6-B645-5972B966617B",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD8FA542-D8A5-4C7F-BF80-E79CE90D7D76",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F979144-C85F-40E3-811E-A455CCE40762",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6F0F843-A668-4BA3-9111-491BD115E0DA",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B393655-B1EA-4855-A1DB-C850A66A0784",
              "versionEndExcluding": "pollockpi-ft5_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BE994A7-B65C-473C-AF1F-DC6B82A00750",
              "versionEndExcluding": "pollockpi-ft5_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service."
    },
    {
      "lang": "es",
      "value": "TOCTOU en el ASP Bootloader puede permitir que un atacante con acceso f\u00edsico altere los registros ROM SPI despu\u00e9s de la verificaci\u00f3n del contenido de la memoria, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad o una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2023-20521",
  "lastModified": "2024-11-21T07:41:04.330",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "LOW",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.3,
        "impactScore": 2.7,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-14T19:15:15.580",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-367"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-20555

Vulnerability from fkie_nvd - Published: 2023-08-08 18:15 - Updated: 2024-11-21 07:41
Summary
Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.
Impacted products
Vendor Product Version
amd ryzen_3_3300_firmware *
amd ryzen_3_3300 -
amd ryzen_3_3300x_firmware *
amd ryzen_3_3300x -
amd ryzen_5_3600_firmware *
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware *
amd ryzen_5_3600x -
amd ryzen_7_3700_firmware *
amd ryzen_7_3700 -
amd ryzen_7_3700x_firmware *
amd ryzen_7_3700x -
amd ryzen_9_3800x_firmware *
amd ryzen_9_3800x -
amd ryzen_9_3850x_firmware *
amd ryzen_9_3850x -
amd ryzen_3_3300_firmware *
amd ryzen_3_3300 -
amd ryzen_3_3300x_firmware *
amd ryzen_3_3300x -
amd ryzen_5_3600_firmware *
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware *
amd ryzen_5_3600x -
amd ryzen_7_3700_firmware *
amd ryzen_7_3700 -
amd ryzen_7_3700x_firmware *
amd ryzen_7_3700x -
amd ryzen_9_3800x_firmware *
amd ryzen_9_3800x -
amd ryzen_9_3850x_firmware *
amd ryzen_9_3850x -
amd ryzen_9_5950x_firmware *
amd ryzen_9_5950x -
amd ryzen_9_5900x_firmware *
amd ryzen_9_5900x -
amd ryzen_9_5900_firmware *
amd ryzen_9_5900 -
amd ryzen_9_pro_5945_firmware *
amd ryzen_9_pro_5945 -
amd ryzen_7_5800x3d_firmware *
amd ryzen_7_5800x3d -
amd ryzen_7_5800x_firmware *
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware *
amd ryzen_7_5800 -
amd ryzen_7_5700x_firmware *
amd ryzen_7_5700x -
amd ryzen_7_pro_5845_firmware *
amd ryzen_7_pro_5845 -
amd ryzen_5_5600x3d_firmware *
amd ryzen_5_5600x3d -
amd ryzen_5_5600x_firmware *
amd ryzen_5_5600x -
amd ryzen_5_5600_firmware *
amd ryzen_5_5600 -
amd ryzen_5_pro_5645_firmware *
amd ryzen_5_pro_5645 -
amd ryzen_7_5700_firmware *
amd ryzen_7_5700 -
amd ryzen_5_5500_firmware *
amd ryzen_5_5500 -
amd ryzen_3_5100_firmware *
amd ryzen_3_5100 -
amd ryzen_7_5700g_firmware *
amd ryzen_7_5700g -
amd ryzen_7_5700ge_firmware *
amd ryzen_7_5700ge -
amd ryzen_5_5600g_firmware *
amd ryzen_5_5600g -
amd ryzen_5_5600ge_firmware *
amd ryzen_5_5600ge -
amd ryzen_3_5300g_firmware *
amd ryzen_3_5300g -
amd ryzen_3_5300ge_firmware *
amd ryzen_3_5300ge -
amd ryzen_9_7950x3d_firmware *
amd ryzen_9_7950x3d -
amd ryzen_9_7950x_firmware *
amd ryzen_9_7950x -
amd ryzen_9_7900x3d_firmware *
amd ryzen_9_7900x3d -
amd ryzen_9_7900x_firmware *
amd ryzen_9_7900x -
amd ryzen_9_7900_firmware *
amd ryzen_9_7900 -
amd ryzen_9_pro_7945_firmware *
amd ryzen_9_pro_7945 -
amd ryzen_7_7800x3d_firmware *
amd ryzen_7_7800x3d -
amd ryzen_7_7700x_firmware *
amd ryzen_7_7700x -
amd ryzen_7_7700_firmware *
amd ryzen_7_7700 -
amd ryzen_7_pro_7745_firmware *
amd ryzen_7_pro_7745 -
amd ryzen_5_7600x_firmware *
amd ryzen_5_7600x -
amd ryzen_5_7600_firmware *
amd ryzen_5_7600 -
amd ryzen_5_pro_7645_firmware *
amd ryzen_5_pro_7645 -
amd ryzen_5_7500f_firmware *
amd ryzen_5_7500f -
amd ryzen_4700s_firmware *
amd ryzen_4700s -
amd ryzen_5_4500_firmware *
amd ryzen_5_4500 -
amd ryzen_3_4100_firmware *
amd ryzen_3_4100 -
amd athlon_pro_300ge_firmware *
amd athlon_pro_300ge -
amd athlon_gold_3150ge_firmware *
amd athlon_gold_3150ge -
amd athlon_gold_pro_3150ge_firmware *
amd athlon_gold_pro_3150ge -
amd athlon_gold_3150g_firmware *
amd athlon_gold_3150g -
amd athlon_gold_pro_3150g_firmware *
amd athlon_gold_pro_3150g -
amd athlon_pro_300ge_firmware *
amd athlon_pro_300ge -
amd athlon_gold_3150ge_firmware *
amd athlon_gold_3150ge -
amd athlon_gold_pro_3150ge_firmware *
amd athlon_gold_pro_3150ge -
amd athlon_gold_3150g_firmware *
amd athlon_gold_3150g -
amd athlon_gold_pro_3150g_firmware *
amd athlon_gold_pro_3150g -
amd athlon_silver_3050e_firmware *
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware *
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware *
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware *
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware *
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware *
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware *
amd athlon_gold_3150c -
amd athlon_3015e_firmware *
amd athlon_3015e -
amd athlon_3015ce_firmware *
amd athlon_3015ce -
amd ryzen_7_3780u_firmware *
amd ryzen_7_3780u -
amd ryzen_7_3750h_firmware *
amd ryzen_7_3750h -
amd ryzen_7_3700c_firmware *
amd ryzen_7_3700c -
amd ryzen_7_3700u_firmware *
amd ryzen_7_3700u -
amd ryzen_5_3580u_firmware *
amd ryzen_5_3580u -
amd ryzen_5_3550h_firmware *
amd ryzen_5_3550h -
amd ryzen_5_3500c_firmware *
amd ryzen_5_3500c -
amd ryzen_5_3500u_firmware *
amd ryzen_5_3500u -
amd ryzen_5_3450u_firmware *
amd ryzen_5_3450u -
amd ryzen_3_3350u_firmware *
amd ryzen_3_3350u -
amd ryzen_3_3300u_firmware *
amd ryzen_3_3300u -
amd ryzen_9_4900h_firmware *
amd ryzen_9_4900h -
amd ryzen_9_4900hs_firmware *
amd ryzen_9_4900hs -
amd ryzen_7_4800h_firmware *
amd ryzen_7_4800h -
amd ryzen_7_4800hs_firmware *
amd ryzen_7_4800hs -
amd ryzen_7_4980u_firmware *
amd ryzen_7_4980u -
amd ryzen_7_4800u_firmware *
amd ryzen_7_4800u -
amd ryzen_7_4700u_firmware *
amd ryzen_7_4700u -
amd ryzen_5_4600h_firmware *
amd ryzen_5_4600h -
amd ryzen_5_4600hs_firmware *
amd ryzen_5_4600hs -
amd ryzen_5_4680u_firmware *
amd ryzen_5_4680u -
amd ryzen_5_4600u_firmware *
amd ryzen_5_4600u -
amd ryzen_5_4500u_firmware *
amd ryzen_5_4500u -
amd ryzen_3_4300u_firmware *
amd ryzen_3_4300u -
amd ryzen_7_5700u_firmware *
amd ryzen_7_5700u -
amd ryzen_5_5500u_firmware *
amd ryzen_5_5500u -
amd ryzen_3_5300u_firmware *
amd ryzen_3_5300u -
amd ryzen_9_5980hx_firmware *
amd ryzen_9_5980hx -
amd ryzen_9_5980hs_firmware *
amd ryzen_9_5980hs -
amd ryzen_9_5900hx_firmware *
amd ryzen_9_5900hx -
amd ryzen_9_5900hs_firmware *
amd ryzen_9_5900hs -
amd ryzen_7_5800h_firmware *
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware *
amd ryzen_7_5800hs -
amd ryzen_7_5825u_firmware *
amd ryzen_7_5825u -
amd ryzen_7_5800u_firmware *
amd ryzen_7_5800u -
amd ryzen_5_5600h_firmware *
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware *
amd ryzen_5_5600hs -
amd ryzen_5_5625u_firmware *
amd ryzen_5_5625u -
amd ryzen_5_5600u_firmware *
amd ryzen_5_5600u -
amd ryzen_5_5560u_firmware *
amd ryzen_5_5560u -
amd ryzen_3_5425u_firmware *
amd ryzen_3_5425u -
amd ryzen_3_5400u_firmware *
amd ryzen_3_5400u -
amd ryzen_3_5125c_firmware *
amd ryzen_3_5125c -
amd ryzen_9_6980hx_firmware *
amd ryzen_9_6980hx -
amd ryzen_9_6980hs_firmware *
amd ryzen_9_6980hs -
amd ryzen_9_6900hx_firmware *
amd ryzen_9_6900hx -
amd ryzen_9_6900hs_firmware *
amd ryzen_9_6900hs -
amd ryzen_7_6800h_firmware *
amd ryzen_7_6800h -
amd ryzen_7_6800hs_firmware *
amd ryzen_7_6800hs -
amd ryzen_7_6800u_firmware *
amd ryzen_7_6800u -
amd ryzen_5_6600h_firmware *
amd ryzen_5_6600h -
amd ryzen_5_6600hs_firmware *
amd ryzen_5_6600hs -
amd ryzen_5_6600u_firmware *
amd ryzen_5_6600u -
amd ryzen_5_7520u_firmware *
amd ryzen_5_7520u -
amd ryzen_3_7320u_firmware *
amd ryzen_3_7320u -
amd ryzen_7_pro_7730u_firmware *
amd ryzen_7_pro_7730u -
amd ryzen_5_pro_7530u_firmware *
amd ryzen_5_pro_7530u -
amd ryzen_3_pro_7330u_firmware *
amd ryzen_3_pro_7330u -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "213D6541-6584-465F-99C6-4E3DE5B7F8E6",
              "versionEndExcluding": "comboam4_pi_v1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1240FCBD-614D-4589-BED7-4D4B34C74FCE",
              "versionEndExcluding": "comboam4_pi_v1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E18F1C-B0E0-4149-AF54-F5154A54AA07",
              "versionEndExcluding": "comboam4_pi_v1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AFB048-3A38-4E8E-9AC9-9720EB5E82D1",
              "versionEndExcluding": "comboam4_pi_v1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5B69993-9CD5-4580-B231-21A221AD8C22",
              "versionEndExcluding": "comboam4_pi_v1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6275252-9795-4A82-A73D-B5E8FF059E6B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87DBB0A4-28C6-4769-9AD1-6620C3F8A325",
              "versionEndExcluding": "comboam4_pi_v1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3800x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D77D63-B780-469C-9E3B-FC71FC66023F",
              "versionEndExcluding": "comboam4_pi_v1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "478A721C-6AC4-40DE-8736-7CF01FC66BBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3850x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3A52CE-6527-47AA-A8EA-F655757E1A4B",
              "versionEndExcluding": "comboam4_pi_v1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3850x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2073A833-0573-4621-95CA-D889AB35D8DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33AAFD7-50D6-413B-AAE8-958B437B84DE",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "813F5398-8CBC-4967-AC00-B8A7361138B2",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F71597-D4CD-47C6-844C-493938552323",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48810572-F3BC-4618-B3AE-CAA9AB37101D",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC7D33C-AB83-4D73-8445-F8A26ED8BFCE",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6275252-9795-4A82-A73D-B5E8FF059E6B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61208082-98D6-4F64-A840-BB1CD884224D",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3800x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8087A3F-6110-461E-AFF1-0B4BA74813D5",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "478A721C-6AC4-40DE-8736-7CF01FC66BBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3850x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B3F7292-AEEE-4FF7-85E7-46E34D1261D8",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3850x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2073A833-0573-4621-95CA-D889AB35D8DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B6A49B-9660-4789-A331-B763D3CD5673",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6449F6FA-43F9-4166-822A-12A535362841",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CED870-9C13-4B57-9EE4-8B21FFE93614",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB74A10-9CF7-435A-A077-10E3E24E465D",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD7AE84-3299-4C99-97A2-4159086FBC61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E36EB8-E6DD-440C-85C6-3AC4F04F6853",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF3A5389-C5C4-4A76-8651-7F71357651E1",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79FBF941-E2A0-4706-8DAC-1381F30F2DCC",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F8AC497-614D-4C6B-820D-E9F51FD9D669",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1856E921-F22A-46A0-B7DE-82A937EECEC7",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "342D9BCB-5C64-426E-8546-7D38C4DE6288",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB0E5FAB-94BA-4310-BCE0-432CCEE348C6",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5423F6D1-DA8B-4960-B87B-FA03C3539EDD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3DAD6B7-8B57-481B-B351-27CA045B82C9",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00E67E11-211C-4E19-AEAC-58DF780EBB18",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5475A-103D-4654-A5A4-228BDAFE80B9",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0D0239-0550-4B9C-9342-916B5462F791",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5836A8D4-AF2D-4F87-8D99-E35DB33D9EF2",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC6E130-8F9A-4B1A-82C0-1862E4D2E0C8",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBFD10F9-E8ED-4C29-AE2F-AEED7333CDF5",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8576A19F-AC8F-457B-8EA5-651B552ED0F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDF18FC1-4587-4FFB-8246-70A83EBF4AE3",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12019E42-1DFA-44EC-A0B6-5A543F57C937",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A433FC0-3593-41CA-8468-FE00F7512E45",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "947E2A65-188F-4AFF-8701-77AC69D778E6",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED35C2C7-D384-4BCB-AC94-A7C5490B26C7",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED71DA2E-5F62-4D87-A948-E5E8FF9B06ED",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C77CA5DE-1280-4948-A887-BFF8984FD690",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F05C8669-6348-4A1B-B1D4-D22022E1F67E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8F38718-A9F4-44EB-9236-A8133DA320B7",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF40184-3511-4D99-A9A3-EB949C0875B2",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86CAA682-9666-4929-B1AC-D9DB3109DB1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FEA6ADB-1679-49BE-8DE1-2D2673693DE3",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA666DF3-C5F3-4127-A8EE-B784DD41F642",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA18BAD8-10F7-42DB-B3D6-70AEA9091BDD",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5602B902-9FDB-4946-BE4C-236262285F2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC64A590-9F6C-43C3-8B94-081529C325F5",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DE32CA-168F-4812-AEAE-D771EB01E15D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B898102C-4DBD-47EF-99E0-7C2D6DF7F616",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6CD984-A8C7-4B23-8FF9-896C503EBA37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE956E3B-10B1-4327-8206-092D1480A70B",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "225E8405-04FF-4885-92C8-8581ACC66E06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC6357B1-B9C4-4636-A062-04E3E278422E",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76121981-8DC2-4779-833E-4B15CFCF7FC3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92AF32F3-E5FC-4245-8D1C-9B272C4DEDBF",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A041CCD5-48D4-47C6-A3E7-3C109BC0EB8B",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C05D51F-469D-487D-9FC8-E1AD699A6F74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E89266-D795-41D3-8474-967F19FB0BF0",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6740A06F-4512-427D-9CB9-A4A6DB046BA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91EE8B4-EA9B-43EA-B5C0-F4E370FF75A7",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2787C72-42D5-42B0-BE5B-E548B319BCF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9449A37B-A41C-4AE7-ADF6-84818B91B9D1",
              "versionEndExcluding": "comboam5_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1232B034-1214-4F9A-823D-DC76D5C5956B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_4700s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28288080-DDD2-40AE-ABCE-1847B18B7CBF",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_4700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1D755E-9826-42EA-AA8C-B955BF1F9A90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84991B65-237D-4604-8CB3-E3243DF77370",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3EA61F4-2D3A-45E0-9F3E-61F9ADB986BE",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C455922-830C-49A4-9FA9-9A90B06B6D6B",
              "versionEndExcluding": "comboam4piv1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "015AD945-5139-4C42-A7B4-7CCE72D5C7C1",
              "versionEndExcluding": "comboam4piv1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C19D8EF-15AA-47A5-99D6-C395A7948364",
              "versionEndExcluding": "comboam4piv1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4A7FA6-9EA6-4000-8694-B756599DDFA6",
              "versionEndExcluding": "comboam4piv1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D949C37E-BB91-4373-84F7-2E4E5D8ECBC7",
              "versionEndExcluding": "comboam4piv1_1.0.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A16BE9F-CBE7-4D65-9345-D78BBF0A3DAF",
              "versionEndExcluding": "comboam4v2_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D697E3F1-545E-46B9-A36F-2AE64E32E135",
              "versionEndExcluding": "comboam4v2_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0D94740-2966-4576-ADD0-8D0D42DB54FB",
              "versionEndExcluding": "comboam4v2_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1F54F7-AAC9-4CB1-9A1D-F9AB8911BA9B",
              "versionEndExcluding": "comboam4v2_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F728FCC-BDAF-4437-ACD4-4525DAC1D919",
              "versionEndExcluding": "comboam4v2_1.2.0.a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41AFB0-7C0E-4E86-A78F-6BA556E2DB86",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F89578C0-B62C-4417-90AC-74EB55640574",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5F922F9-AE58-410B-BEB6-04815CF82BC0",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D91D738-8474-4024-99DA-1C211C11BE0E",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA642427-46AA-4D53-8E6F-E312DE4DEC55",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "617C92AE-E3EE-4B07-B6FD-0B5E7FC321F2",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "390C1928-7447-46FF-BD3E-B475C2D54AB4",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3015e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F212FBEB-30FE-4066-B600-BC6F0FE28D9A",
              "versionEndExcluding": "pollockpi-ft5_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7806F15-EEF7-4C0B-9CBE-1DAB80213FC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3015ce_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62780D-D099-48E5-8090-005B7EDAEA67",
              "versionEndExcluding": "pollockpi-ft5_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31190A28-6142-4502-BD95-FD3792BED505",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF80DAC8-7FA6-45EB-9C8D-C9F5BDBBEF58",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F14A29-C7BE-41F3-BC3B-4268CC6E3467",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10A50066-3EBD-4F45-9A9B-8FBA2546535A",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE48CDD3-F724-44D2-AEEC-C50179C6A689",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6193D48A-B6F2-4DCA-AF6D-F443732A1E71",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "163BCBAA-6F43-44F0-90C0-04F26727A023",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "702CCF71-C813-4A94-A7D8-59233564928A",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF99052-F798-4B25-BA0E-87077D19BA5F",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B7948F-030E-4C28-96AB-4F4DB052CFA3",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7AF3EE1-76EC-4611-835E-4D35007A344B",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0222A7F-2103-497E-A027-CA15ABABE6BB",
              "versionEndExcluding": "picassopi-fp5_1.0.0.f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E130EE71-CAE1-47F3-B73C-5AC9BBF091D8",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_4900hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "785185A7-52E7-4D07-801F-92E1D417C4E8",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1F3D6ED-8D38-4493-90A8-6A3569090E99",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4800hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E167937E-F419-4ED0-80F7-E1160ED871D0",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4980u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F23F6EB-5746-4290-8E29-693E65E33FAF",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "735EBD69-B0CB-4736-B67C-F23B7C7F5F33",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C302C3-9ABF-4278-8AF3-BF55C8F94FEB",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "116E4CDF-ABD2-40ED-B088-A3E3EE8F3CEF",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B62B699D-0BE7-4C51-B280-5A8AB4DF69D3",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4680u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1810F96C-7567-4F71-B3AA-3B860C6F8178",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF7FC47A-9D8B-425A-85F8-CDDECB6A63F9",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "263DBEE0-67A4-48C9-B2C4-87305B298087",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE62C8F-A871-40A3-A26E-BB08A01269C7",
              "versionEndExcluding": "renoirpi-fp6_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A814D47-5020-41F4-BF76-4C5B9DE49AD9",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B3F31B-BD20-4469-97AF-9D6BE7E9DCE7",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B0F0640-4A30-46D6-AD20-9581A087F073",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B6C9FD-2556-41D0-82DC-08695FB116F1",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A200076A-7F83-4D33-9B87-81D025D22B40",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "862854ED-2156-45C6-80E9-8149506E1292",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6685DAE-899D-4F60-A8BA-F2522CB0112D",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57348F62-A7BF-4F39-9A16-4E0447C08BC0",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD90B4BE-5792-40B3-96B1-685362FDF2D7",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23023A6D-D74F-42E3-99AB-8E05028A65F8",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CCD57EE-0653-47B1-B205-1E50AE1BE116",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "777B7FB7-2A5C-4D46-82C4-9AAA3285366B",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AF5F46-CDAF-402A-84D4-7339CE7CFF84",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6A6BF07-0509-431D-97D8-6163A42097F0",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AF637B-ADEF-4E8F-8202-DB5E73F9CF0E",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "135BF183-190E-4BFA-B211-EB2C8A4F0B34",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49666325-3C49-4C7A-8637-F4E09756CBB7",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A83F95-7556-4BF0-8679-CA6052271A0C",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7301D2A1-4794-49C9-888D-92CE7016A7C0",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAC3E8F-ADF1-4D65-A30B-47C599DF9482",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C4DB50-FBCD-4AA2-B852-DDCC28E07899",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F3C7FEE-0EC3-4F7E-B47E-FD05AFB4A560",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59E59A79-F3B5-4245-80B6-33A33CA7A8ED",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8DC77A7-188C-4B70-8911-42AE99317D3A",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36449E08-8C84-4A4E-94C1-931168DD7D58",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ADB9D1F-CDD0-47A0-B9DB-7583C016A3A4",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF3BB316-46FC-4602-9688-01407B4BE664",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D2701F-9E74-4242-B740-2EC1A1AF509A",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A5E589-7C8C-4359-8368-1BF129955E43",
              "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_7520u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A957C081-D292-4AED-8C76-AFE0F897E278",
              "versionEndExcluding": "mendocinopi-ft6_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0870FBE4-92B4-4717-88B0-EC1094268034",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_7320u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C87C1466-9FA4-446F-B68E-D6470476ED34",
              "versionEndExcluding": "mendocinopi-ft6_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F04B9F-8C65-476B-B5D8-18CC96E3B712",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA28D46E-DFFA-4E18-8F78-1B02625B78A0",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29805A0A-1E52-4545-9D41-B9A1EE571778",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07729CB8-EFD3-4F1E-B5A8-6B430D4D3DF9",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C822A153-C32B-423B-8660-EAE0A1DEB4EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD61575-84EE-4515-B532-F7492722FDFC",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86704116-43D0-47FD-8896-AB00C265AAE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient input validation in\nCpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting\nan arbitrary bit in an attacker-controlled pointer potentially leading to\narbitrary code execution in SMM.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
    }
  ],
  "id": "CVE-2023-20555",
  "lastModified": "2024-11-21T07:41:06.360",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-08T18:15:11.173",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-20588

Vulnerability from fkie_nvd - Published: 2023-08-08 18:15 - Updated: 2024-11-21 07:41
Summary
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 
References
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/25/3Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/25/4Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/25/5Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/25/7Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/25/8Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/26/5Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/26/8Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/26/9Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/27/1Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/03/12Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/03/13Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/03/14Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/03/15Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/03/16Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/03/9Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/04/1Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/04/2Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/04/3Mailing List, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/10/04/4Mailing List, Third Party Advisory
psirt@amd.comhttp://xenbits.xen.org/xsa/advisory-439.htmlThird Party Advisory
psirt@amd.comhttps://lists.debian.org/debian-lts-announce/2023/10/msg00027.htmlMailing List, Third Party Advisory
psirt@amd.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/Mailing List
psirt@amd.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/Mailing List
psirt@amd.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/Mailing List
psirt@amd.comhttps://security.netapp.com/advisory/ntap-20240531-0005/
psirt@amd.comhttps://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007Vendor Advisory
psirt@amd.comhttps://www.debian.org/security/2023/dsa-5480Third Party Advisory
psirt@amd.comhttps://www.debian.org/security/2023/dsa-5492Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/25/3Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/25/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/25/5Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/25/7Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/25/8Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/26/5Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/26/8Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/26/9Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/27/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/03/12Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/03/13Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/03/14Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/03/15Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/03/16Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/03/9Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/04/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/04/2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/04/3Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/10/04/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://xenbits.xen.org/xsa/advisory-439.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/10/msg00027.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240531-0005/
af854a3a-2127-422b-91ae-364da2661108https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5480Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5492Third Party Advisory
Impacted products
Vendor Product Version
debian debian_linux 10.0
debian debian_linux 11.0
debian debian_linux 12.0
amd epyc_7351p_firmware -
amd epyc_7351p -
amd epyc_7401p_firmware -
amd epyc_7401p -
amd epyc_7551p_firmware -
amd epyc_7551p -
amd epyc_7251_firmware -
amd epyc_7251 -
amd epyc_7261_firmware -
amd epyc_7261 -
amd epyc_7281_firmware -
amd epyc_7281 -
amd epyc_7301_firmware -
amd epyc_7301 -
amd epyc_7351_firmware -
amd epyc_7351 -
amd epyc_7371_firmware -
amd epyc_7371 -
amd epyc_7401_firmware -
amd epyc_7401 -
amd epyc_7451_firmware -
amd epyc_7451 -
amd epyc_7501_firmware -
amd epyc_7501 -
amd epyc_7551_firmware -
amd epyc_7551 -
amd epyc_7571_firmware -
amd epyc_7571 -
amd epyc_7601_firmware -
amd epyc_7601 -
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_3200ge_firmware -
amd ryzen_3_3200ge -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd athlon_pro_300ge_firmware -
amd athlon_pro_300ge -
amd athlon_gold_3150ge_firmware -
amd athlon_gold_3150ge -
amd athlon_gold_pro_3150ge_firmware -
amd athlon_gold_pro_3150ge -
amd athlon_gold_3150g_firmware -
amd athlon_gold_3150g -
amd athlon_gold_pro_3150g_firmware -
amd athlon_gold_pro_3150g -
amd athlon_silver_3050ge_firmware -
amd athlon_silver_3050ge -
amd athlon_silver_pro_3125ge_firmware -
amd athlon_silver_pro_3125ge -
xen xen -
fedoraproject fedora 37
fedoraproject fedora 38
fedoraproject fedora 39
microsoft windows_10_1507 *
microsoft windows_10_1607 *
microsoft windows_10_1809 *
microsoft windows_10_21h2 *
microsoft windows_10_22h2 *
microsoft windows_11_21h2 *
microsoft windows_11_22h2 *
microsoft windows_11_23h2 *
microsoft windows_server_2008 -
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 r2
microsoft windows_server_2016 *
microsoft windows_server_2019 *
microsoft windows_server_2022_23h2 *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7571_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99013A91-F504-4EB4-8904-7E551573AF49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7571:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3CF0651-A320-40D1-986F-D2790488929E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BB6B36-892D-434B-B590-6BEAFD4037BC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A9E5D46-DB87-4420-9AC6-2ABCB0119E01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DFA8C8-AD16-45B1-934F-AEE78C51DDAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9832717E-8322-4548-B6C7-DE662D2B05AA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD375C2E-B976-4DAE-BF89-EFED1482DB28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F48D3D-C024-45F8-A299-322FB62EF6F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD0332AB-3568-4AF7-9738-3CF2923C6DDA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_pro_3125ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7122B9-4664-492C-8440-CE0C0AADAD4C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_pro_3125ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "368AD9F8-E7E3-4316-9671-7305FDD3D285",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA29853-AA80-4D69-B5B2-09C29B73964A",
              "versionEndExcluding": "10.0.10240.20345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B72F8B2-FE1A-44FC-8534-66B016C3C3DC",
              "versionEndExcluding": "10.0.14393.6529",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "412DCA62-8009-40C3-B76C-F3791104F0C8",
              "versionEndExcluding": "10.0.17763.5206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5A8AEC-6CE1-4AE3-B877-5F5F7303CAA2",
              "versionEndExcluding": "10.0.19044.3803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E59E6692-980B-435A-B9F3-AA00939E8D97",
              "versionEndExcluding": "10.0.19045.3803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC62CCFB-C4C4-4CD1-A291-9587375FE3C6",
              "versionEndExcluding": "10.0.22000.2652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11093E57-782B-4049-AFB2-AAFCFB4A8FF6",
              "versionEndExcluding": "10.0.22621.2861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E712F1D-26F9-4E19-B012-D7F0A92D59ED",
              "versionEndExcluding": "10.0.22631.2861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
              "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC76402C-20E3-4A90-B106-A2A9B61621CA",
              "versionEndExcluding": "10.0.14393.6529",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17A84AC-1AB0-416D-8F7D-8183980AEF25",
              "versionEndExcluding": "10.0.17763.5206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E51B68-6AE4-4AF2-A7D3-7728E5D314D7",
              "versionEndExcluding": "10.0.25398.584",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u00a0\n\n\n\n\n\n\n\n"
    },
    {
      "lang": "es",
      "value": "Un error de divisi\u00f3n por cero en algunos procesadores AMD puede potencialmente devolver datos especulativos que resulten en una p\u00e9rdida de confidencialidad."
    }
  ],
  "id": "CVE-2023-20588",
  "lastModified": "2024-11-21T07:41:10.450",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-08T18:15:11.653",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://xenbits.xen.org/xsa/advisory-439.html"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://security.netapp.com/advisory/ntap-20240531-0005/"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5480"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5492"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://xenbits.xen.org/xsa/advisory-439.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20240531-0005/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5492"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-369"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-20589

Vulnerability from fkie_nvd - Published: 2023-08-08 18:15 - Updated: 2024-11-21 07:41
Summary
An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution. 
Impacted products
Vendor Product Version
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_3200ge_firmware -
amd ryzen_3_3200ge -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_3900xt_firmware -
amd ryzen_9_3900xt -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd 4700s_firmware -
amd 4700s -
amd ryzen_5_4500_firmware -
amd ryzen_5_4500 -
amd ryzen_3_4100_firmware -
amd ryzen_3_4100 -
amd ryzen_7_4700g_firmware -
amd ryzen_7_4700g -
amd ryzen_7_4700ge_firmware -
amd ryzen_7_4700ge -
amd ryzen_5_4600g_firmware -
amd ryzen_5_4600g -
amd ryzen_5_4600ge_firmware -
amd ryzen_5_4600ge -
amd ryzen_3_4300g_firmware -
amd ryzen_3_4300g -
amd ryzen_3_4300ge_firmware -
amd ryzen_3_4300ge -
amd ryzen_9_5950x_firmware -
amd ryzen_9_5950x -
amd ryzen_9_5900x_firmware -
amd ryzen_9_5900x -
amd ryzen_9_5900_firmware -
amd ryzen_9_5900 -
amd ryzen_9_pro_5945_firmware -
amd ryzen_9_pro_5945 -
amd ryzen_7_5800x3d_firmware -
amd ryzen_7_5800x3d -
amd ryzen_7_5800x_firmware -
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware -
amd ryzen_7_5800 -
amd ryzen_7_5700x_firmware -
amd ryzen_7_5700x -
amd ryzen_7_pro_5845_firmware -
amd ryzen_7_pro_5845 -
amd ryzen_5_5600x3d_firmware -
amd ryzen_5_5600x3d -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5600_firmware -
amd ryzen_5_5600 -
amd ryzen_5_pro_5645_firmware -
amd ryzen_5_pro_5645 -
amd ryzen_7_5700_firmware -
amd ryzen_7_5700 -
amd ryzen_5_5500_firmware -
amd ryzen_5_5500 -
amd ryzen_3_5100_firmware -
amd ryzen_3_5100 -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd athlon_pro_300ge_firmware -
amd athlon_pro_300ge -
amd athlon_gold_3150ge_firmware -
amd athlon_gold_3150ge -
amd athlon_gold_pro_3150ge_firmware -
amd athlon_gold_pro_3150ge -
amd athlon_gold_3150g_firmware -
amd athlon_gold_3150g -
amd athlon_gold_pro_3150g_firmware -
amd athlon_gold_pro_3150g -
amd athlon_silver_3050e_firmware -
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware -
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware -
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware -
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware -
amd athlon_gold_3150c -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_9_6980hx_firmware -
amd ryzen_9_6980hx -
amd ryzen_9_6980hs_firmware -
amd ryzen_9_6980hs -
amd ryzen_9_6900hx_firmware -
amd ryzen_9_6900hx -
amd ryzen_9_6900hs_firmware -
amd ryzen_9_6900hs -
amd ryzen_7_6800h_firmware -
amd ryzen_7_6800h -
amd ryzen_7_6800hs_firmware -
amd ryzen_7_6800hs -
amd ryzen_7_6800u_firmware -
amd ryzen_7_6800u -
amd ryzen_5_6600h_firmware -
amd ryzen_5_6600h -
amd ryzen_5_6600hs_firmware -
amd ryzen_5_6600hs -
amd ryzen_5_6600u_firmware -
amd ryzen_5_6600u -
amd ryzen_5_7520u_firmware -
amd ryzen_5_7520u -
amd ryzen_3_7320u_firmware -
amd ryzen_3_7320u -
amd ryzen_7_pro_7730u_firmware -
amd ryzen_7_pro_7730u -
amd ryzen_5_pro_7530u_firmware -
amd ryzen_5_pro_7530u -
amd ryzen_3_pro_7330u_firmware -
amd ryzen_3_pro_7330u -
amd ryzen_7_7735hs_firmware -
amd ryzen_7_7735hs -
amd ryzen_7_7736u_firmware -
amd ryzen_7_7736u -
amd ryzen_7_7735u_firmware -
amd ryzen_7_7735u -
amd ryzen_5_7535hs_firmware -
amd ryzen_5_7535hs -
amd ryzen_5_7535u_firmware -
amd ryzen_5_7535u -
amd ryzen_3_7335u_firmware -
amd ryzen_3_7335u -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BB6B36-892D-434B-B590-6BEAFD4037BC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A9E5D46-DB87-4420-9AC6-2ABCB0119E01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:4700s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49ABBBB9-64DD-4E29-ADBD-8D3B2911BE5F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:4700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB32FD86-4EBD-408C-8473-90524C31FF13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BD02DFE-BC7C-4358-A9D4-5B1D8F731B12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DAE4BB3-4488-406C-A615-C8171D9303C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "777D94BA-613B-49E9-B1B3-2A9E0FC35908",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29878A14-6096-4746-A61B-422284C863BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD7AE84-3299-4C99-97A2-4159086FBC61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D13B09-E422-4A7B-B4AE-3D47E95A89C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "342D9BCB-5C64-426E-8546-7D38C4DE6288",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A366AB35-673F-47FA-845F-154ED3DAD127",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5423F6D1-DA8B-4960-B87B-FA03C3539EDD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68869B67-FE7B-4C95-9470-9D23C1A6B34F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0D0239-0550-4B9C-9342-916B5462F791",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D87F2131-D439-44A7-8513-844E2B387120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "466CA7F1-2114-48F6-B765-1A0282DB46B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8576A19F-AC8F-457B-8EA5-651B552ED0F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DFA8C8-AD16-45B1-934F-AEE78C51DDAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9832717E-8322-4548-B6C7-DE662D2B05AA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD375C2E-B976-4DAE-BF89-EFED1482DB28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "573E5B00-4F5A-4419-A265-FD8F46CB9D9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "433893A2-C55A-4A88-9314-A91DF4DEDA9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DAFB9F-9661-4E82-BF07-E750E8D42694",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F26496C-0832-4D9E-BFA7-15E4EBEA40B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_6800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFCA1EF3-C51D-4E70-9777-C921EA2C2A78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "987A3CCC-ACF3-4F85-9C82-F361BA12EB84",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_6800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AE4A9C2-6383-4B30-A423-5C8F63C06A15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_6600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66251A10-F3CE-48C0-8288-ED01F1122AD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC1C0146-D148-4590-9127-F0005D6AB4EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_6600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4393BD5E-E997-459A-98D3-828B536AA2C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_7520u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6DDD082-BAA1-415A-8E2A-AF8F5F27BDC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0870FBE4-92B4-4717-88B0-EC1094268034",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_7320u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCC8C4-3F88-4D2B-BBDD-860619B3E15C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F04B9F-8C65-476B-B5D8-18CC96E3B712",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F22498B-9054-48F9-A85D-C98CDE7064CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29805A0A-1E52-4545-9D41-B9A1EE571778",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A9F0139-22CE-4ABF-89CE-3345A7BB79D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C822A153-C32B-423B-8660-EAE0A1DEB4EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B08AB2-9A24-4280-8B77-3AA92787F936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86704116-43D0-47FD-8896-AB00C265AAE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "546E34C2-C25B-4282-96F2-57E97C6631D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_7736u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C10A17-F8D9-4C5E-90B1-EB5D1C130312",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D50E8EA-ECB2-463D-BA51-D13CF5A02266",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_7735u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7BE3323-E4D0-415E-9D7C-4AA04EC19733",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF7FB2F5-2F07-491B-B368-5637CE4761FC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE36D471-57BF-4385-A825-029F7313E4DB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_7535u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5F57F56-259A-4067-AF55-158705C666C1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "082BE536-F29C-4A73-B030-A19DD3A448B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_7335u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BABF86B-F7B6-4D97-B934-64452CA1E025",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495E436C-B0EE-4B72-AB49-332F4752C140",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nAn attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.\u00a0\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
    }
  ],
  "id": "CVE-2023-20589",
  "lastModified": "2024-11-21T07:41:10.663",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-08T18:15:11.717",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4005"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-12965

Vulnerability from fkie_nvd - Published: 2022-02-04 23:15 - Updated: 2024-11-21 05:00
Summary
When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage.
Impacted products
Vendor Product Version
amd ryzen_pro_5650g_firmware -
amd ryzen_pro_5650g -
amd ryzen_pro_5650ge_firmware -
amd ryzen_pro_5650ge -
amd ryzen_pro_5750g_firmware -
amd ryzen_pro_5750g -
amd ryzen_pro_5750ge_firmware -
amd ryzen_pro_5750ge -
amd ryzen_pro_5350g_firmware -
amd ryzen_pro_5350g -
amd ryzen_pro_5350ge_firmware -
amd ryzen_pro_5350ge -
amd ryzen_pro_4750g_firmware -
amd ryzen_pro_4750g -
amd ryzen_pro_4750ge_firmware -
amd ryzen_pro_4750ge -
amd ryzen_pro_4650g_firmware -
amd ryzen_pro_4650g -
amd ryzen_pro_4650ge_firmware -
amd ryzen_pro_4650ge -
amd ryzen_pro_4350g_firmware -
amd ryzen_pro_4350g -
amd ryzen_pro_4350ge_firmware -
amd ryzen_pro_4350ge -
amd ryzen_pro_3900_firmware -
amd ryzen_pro_3900 -
amd ryzen_pro_3700_firmware -
amd ryzen_pro_3700 -
amd ryzen_pro_3600_firmware -
amd ryzen_pro_3600 -
amd ryzen_pro_3400g_firmware -
amd ryzen_pro_3400g -
amd ryzen_pro_3400ge_firmware -
amd ryzen_pro_3400ge -
amd ryzen_pro_3350g_firmware -
amd ryzen_pro_3350g -
amd ryzen_pro_3200g_firmware -
amd ryzen_pro_3200g -
amd ryzen_pro_3200ge_firmware -
amd ryzen_pro_3200ge -
amd ryzen_pro_2400g_firmware -
amd ryzen_pro_2400g -
amd ryzen_pro_2400ge_firmware -
amd ryzen_pro_2400ge -
amd ryzen_pro_2200g_firmware -
amd ryzen_pro_2200g -
amd ryzen_pro_2200ge_firmware -
amd ryzen_pro_2200ge -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd athlon_gold_pro_3150g_firmware -
amd athlon_gold_pro_3150g -
amd athlon_gold_pro_3150ge_firmware -
amd athlon_gold_pro_3150ge -
amd athlon_silver_pro_3125ge_firmware -
amd athlon_silver_pro_3125ge -
amd athlon_pro_300ge_firmware -
amd athlon_pro_300ge -
amd athlon_pro_200ge_firmware -
amd athlon_pro_200ge -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_1950x_firmware -
amd ryzen_threadripper_1950x -
amd ryzen_threadripper_1920x_firmware -
amd ryzen_threadripper_1920x -
amd ryzen_threadripper_1920x_firmware -
amd ryzen_threadripper_1920x -
amd ryzen_threadripper_1900x_firmware -
amd ryzen_threadripper_1900x -
amd ryzen_5950x_firmware -
amd ryzen_5950x -
amd ryzen_5800x3d_firmware -
amd ryzen_5800x3d -
amd ryzen_5900x_firmware -
amd ryzen_5900x -
amd ryzen_5800x_firmware -
amd ryzen_5800x -
amd ryzen_5600x_firmware -
amd ryzen_5600x -
amd ryzen_5700g_firmware -
amd ryzen_5700g -
amd ryzen_5600g_firmware -
amd ryzen_5600g -
amd ryzen_5700g_firmware -
amd ryzen_5700g -
amd ryzen_5700ge_firmware -
amd ryzen_5700ge -
amd ryzen_5600g_firmware -
amd ryzen_5600g -
amd ryzen_5600ge_firmware -
amd ryzen_5600ge -
amd ryzen_5300g_firmware -
amd ryzen_5300g -
amd ryzen_5300ge_firmware -
amd ryzen_5300ge -
amd ryzen_4700g_firmware -
amd ryzen_4700g -
amd ryzen_4600g_firmware -
amd ryzen_4600g -
amd ryzen_4300g_firmware -
amd ryzen_4300g -
amd ryzen_4700ge_firmware -
amd ryzen_4700ge -
amd ryzen_4600ge_firmware -
amd ryzen_4600ge -
amd ryzen_4300ge_firmware -
amd ryzen_4300ge -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd athlon_3050ge_firmware -
amd athlon_3050ge -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_5650g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DFE4DB-D2B8-4885-BB20-05214218E986",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_5650g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3C69416-4F96-44EB-B117-F3C99CE75A69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_5650ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBFC849E-949F-4F0F-8FF0-4B1B3112E857",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_5650ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54637AC1-FE05-4AB5-A358-15A2E36F7472",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_5750g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DF7AFD1-3FB3-4FF2-A8D2-AA1426C260A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_5750g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB5E5A7D-C42D-41E8-8FFD-D27F91BFA516",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_5750ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81942F9B-9D81-4F6A-B155-0ABB302E9DAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_5750ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ED62FB0-4ED8-472C-9267-2F90B0970401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_5350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A150494-C143-44BA-8AA8-348D145C1EE0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_5350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE04DA51-EAE2-4D3F-9480-03DBCCD44E4A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_5350ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A49D44CE-0494-405A-8DC7-92B982A64943",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_5350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E0677A0-E13B-4A45-A280-D835E74D191F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_4750g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "908E5BB7-569E-4BB0-B43F-4A0937A1F8B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_4750g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D54E96F6-A947-4C24-8577-05BCE7FE38AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_4750ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB5F604-FCB9-4F48-B2C9-DDF6A726AD0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_4750ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90B54F41-F9A9-4BCF-A625-79B0EA6216B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_4650g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2446A02-8A9E-470C-AF49-D4C36BFB160A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_4650g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A3D4A0-E7A0-4BE6-A736-5B99EA8016C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_4650ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "211DBA7A-71C2-4C24-92AB-868FB24F1F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_4650ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4482101D-80BB-4D41-A828-7E2E103F15AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_4350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8F8087D-B315-4B93-8056-33F191CCA697",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_4350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA6DB67-75D7-46AD-80B1-E313386BE6D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_4350ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B8E904-3F99-43D7-8075-6F6AC4C06986",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_4350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "158D17F1-FFA8-471F-9DC8-9BE51C6B3778",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_3900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82911836-078F-4CA9-A90B-D24F7C37F389",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_3900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7B70E0-0F62-4472-B89C-5EAC66531A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_3700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "284BB905-170E-440D-B6A4-F3842A04FB9B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B9C6C9-E877-40A5-942C-A874A3041028",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1B7B822-ADF6-4292-9204-C1AA1A7E2396",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A66BAFE5-96CE-4859-B1F7-BA452FEA3D48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38396B07-A94D-459A-AA87-EEF17570C30E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B492DD9B-DDB0-4C36-BCBA-D42BA01726B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22F14358-F9B2-45DC-916D-94E2B3037214",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8066679-77B1-4A36-852F-5A5E7C59E8A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_3350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "096CEE2A-8623-4BCC-B6E9-4ECE2E0F0855",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B026242-29E0-43FE-832D-B8AF03793531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC0F908-6B59-4FFF-890E-1BCA7C427766",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA9DE186-D8E8-47BC-B601-F5D3F66F66A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "763E5352-513D-438E-8F6B-61B21AD96FBB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9B80AB-F2A5-4541-839A-BC68B3566F02",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_2400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4E51B1-2082-4FC6-82D3-9016411C4CE1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_2400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EEB4D77-7E68-46A4-A1B1-95FE991480DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_2400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28D82727-1BD8-4BE9-9B2B-22844F7EA382",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_2400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A39F78-8FFE-4D6A-B1C8-666AE50B2C0B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_2200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC5FE8C0-CA04-4ED8-9C8D-19B0FD644FD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_2200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13C87A-F510-49D3-BD7A-40919CC7559B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_pro_2200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C53FBD16-9759-482E-8F6B-35ABFD716890",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_pro_2200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E085A2-40C0-4214-B564-70BBB1679E21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_pro_3125ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7122B9-4664-492C-8440-CE0C0AADAD4C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_pro_3125ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "368AD9F8-E7E3-4316-9671-7305FDD3D285",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DFA8C8-AD16-45B1-934F-AEE78C51DDAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D00DCE31-32F9-40BB-B18F-CD51F12B2934",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23FCD54B-2958-4F42-8E1A-B1A39C4D9AA1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF47017-569D-4333-8F2D-A6C1D1EE166E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82854E42-76EC-4428-9975-B5FBC8DC6FF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AA72C-4BC8-4A02-B158-98C52648AA09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B92717AF-0F69-4A7D-BC06-B0E287AA8008",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AA72C-4BC8-4A02-B158-98C52648AA09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B92717AF-0F69-4A7D-BC06-B0E287AA8008",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39B10F2F-6796-4267-9664-C6C68B8EEA47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "304C61BE-2438-49EE-A581-4A4EEC2923E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7522E8A-74E4-42D8-9B6C-DD1FB6C4CE65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "888D3667-BBD7-45E5-BA38-37D0A007408D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E11988B-5467-4585-9A95-AD3C7E0480F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D0CF3A-54CC-42A0-9075-6923EB3023A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F07C72-3C8F-493D-A94E-4FEDD43936D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A60E8FD3-F6E4-42FB-96C3-B07D597560AE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F2BF6E-E3B0-456D-ABC1-A8687C6E8CA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A60E8FD3-F6E4-42FB-96C3-B07D597560AE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93E2C9E-66AA-433B-ADB8-A6AD4F0C9A80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F2BF6E-E3B0-456D-ABC1-A8687C6E8CA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32F62EA-D89E-4F30-8ABA-4887EC82EEF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "833B79C9-7F23-4CDB-8B9B-3699E43B9AE4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74FA8650-B46B-4034-85DA-AC568B517D37",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_4700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A840C1D-2240-444E-BE27-72CAF9599112",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "343DAC16-B8BD-4071-A743-4803C2359B28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_4600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4117E0E-227A-4860-A5CA-910203327649",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "832FEAC3-D1AF-4577-81E6-DC370D90D754",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_4300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "353DF0DC-F9DB-4DAB-B42E-1A5B2D1BD1A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C49FF17-B382-4573-916F-1BC91CEC7D24",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_4700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97ED0672-F26F-4D2E-9411-F34140B0E24D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ADA33D7-EE0D-4394-86F3-58AF452A2C0B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_4600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79A07059-E17C-48BA-97A4-7B3E169EF4F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C277ED-941B-4C53-B2C3-8A779B084DF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_4300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1604D130-4D9A-4E58-A37E-6F20372DE410",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E18DAAB-84F8-464C-8051-BB9A6A48B83C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage."
    },
    {
      "lang": "es",
      "value": "Cuando se combinan con secuencias de software espec\u00edficas, las CPUs de AMD pueden ejecutar transitoriamente cargas no can\u00f3nicas y almacenar usando s\u00f3lo los 48 bits de direcci\u00f3n inferiores, resultando potencialmente en un filtrado de datos"
    }
  ],
  "id": "CVE-2020-12965",
  "lastModified": "2024-11-21T05:00:35.830",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-04T23:15:10.293",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/12/05/3"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/12/05/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2022-23815 (GCVE-0-2022-23815)

Vulnerability from cvelistv5 – Published: 2024-08-13 16:51 – Updated: 2025-03-18 20:42
VLAI?
Summary
Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.
CWE
Assigner
AMD
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "athlon_3000g",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "various"
              },
              {
                "status": "unaffected",
                "version": "1.0.0.F"
              },
              {
                "status": "unaffected",
                "version": "1.0.0.5"
              },
              {
                "status": "unaffected",
                "version": "1.0.0.E"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_r1000",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.2.0.A"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_r2000",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.2"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_embedded_v1000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_v1000",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.2.0.A"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-23815",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-19T17:04:47.953819Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-18T20:42:11.741Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various",
              "versionType": "PI"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.F"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PollockPI-FT5  1.0.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD RyzenTM Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5  1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD RyzenTM Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedR2KPI-FP5 1.0.0.2"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD RyzenTM Embedded V1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        }
      ],
      "datePublic": "2024-08-13T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e"
            }
          ],
          "value": "Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:51:43.735Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2022-23815",
    "datePublished": "2024-08-13T16:51:43.735Z",
    "dateReserved": "2022-01-21T17:14:12.301Z",
    "dateUpdated": "2025-03-18T20:42:11.741Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26367 (GCVE-0-2021-26367)

Vulnerability from cvelistv5 – Published: 2024-08-13 16:50 – Updated: 2024-12-04 16:25
VLAI?
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
Assigner
AMD
Impacted products
Vendor Product Version
AMD AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics Unaffected: ComboAM4v2 PI 1.2.0.5
Create a notification for this product.
    AMD AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics Unaffected: ComboAM4PI 1.0.0.9
Unaffected: ComboAM4v2 PI 1.2.0.8
Create a notification for this product.
    AMD AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics Unaffected: ComboAM4v2 PI 1.2.0.5
Create a notification for this product.
    AMD AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Unaffected: PicassoPI-FP5 1.0.0.E
Create a notification for this product.
    AMD AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Unaffected: PollockPI-FT5 1.0.0.4
Create a notification for this product.
    AMD AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics Unaffected: PicassoPI-FP5 1.0.0.E
Create a notification for this product.
    AMD AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics Unaffected: RenoirPI-FP6 1.0.0.7
Create a notification for this product.
    AMD AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Radeon™ RX 6000 Series Graphics Cards Unaffected: AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)
Create a notification for this product.
    AMD AMD Radeon™ PRO W6000 Series Graphics Cards Unaffected: AMD Software: PRO Edition 23.Q4 (23.30.13.03)
Create a notification for this product.
    AMD AMD Ryzen™ Embedded R1000 Series Processors Unaffected: EmbeddedPI-FP5 1.2.0.A
Create a notification for this product.
    AMD AMD Ryzen™ Embedded R2000 Series Processors Unaffected: EmbeddedR2KPI-FP5 1.0.0.2
Create a notification for this product.
    AMD AMD Ryzen™ Embedded V1000 Series Processors Unaffected: EmbeddedPI-FP5 1.2.0.A
Create a notification for this product.
    AMD AMD Ryzen™ Embedded V2000 Series Processors Unaffected: EmbeddedPI-FP6 1.0.0.6
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-26367",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-13T18:04:31.680686Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T16:25:09.987Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4PI  1.0.0.9"
            },
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.8"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PollockPI-FT5  1.0.0.4"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RenoirPI-FP6  1.0.0.7"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  PRO Edition 23.Q4 (23.30.13.03)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedR2KPI-FP5 1.0.0.2"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP6 1.0.0.6"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
            }
          ],
          "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:50:05.825Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
        },
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26367",
    "datePublished": "2024-08-13T16:50:05.825Z",
    "dateReserved": "2021-01-29T21:24:26.151Z",
    "dateUpdated": "2024-12-04T16:25:09.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20521 (GCVE-0-2023-20521)

Vulnerability from cvelistv5 – Published: 2023-11-14 18:52 – Updated: 2024-08-02 09:05
VLAI?
Summary
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
Assigner
AMD
Impacted products
Vendor Product Version
AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4 Affected: various
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20521",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-11-27T19:38:18.334372Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-26T14:56:31.535Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.873Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics \u201cPicasso\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors \u201cColfax\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics   \u201cPollock\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics \u201cPicasso\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded V1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:42:56.250Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20521",
    "datePublished": "2023-11-14T18:52:31.662Z",
    "dateReserved": "2022-10-27T18:53:39.737Z",
    "dateUpdated": "2024-08-02T09:05:36.873Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20555 (GCVE-0-2023-20555)

Vulnerability from cvelistv5 – Published: 2023-08-08 17:07 – Updated: 2024-10-24 14:36
VLAI?
Summary
Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.
Severity ?
No CVSS data available.
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD Ryzen™ 3000 Series Desktop Processors “Matisse” AM4 Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4 Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” AM4 Affected: various
Create a notification for this product.
    AMD Ryzen™ 7000 Series Processors “Raphael” Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” Affected: various
Create a notification for this product.
    AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” FP5 Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” FP5 Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock” Affected: various
Create a notification for this product.
    AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Picasso” Affected: various
Create a notification for this product.
    AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6 Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne” Affected: various
Create a notification for this product.
    AMD Ryzen™ 6000 Series Mobile Processors "Rembrandt" Affected: various
Create a notification for this product.
    AMD Ryzen™ 7030 Series Mobile Processors “Barcelo” Affected: various
Create a notification for this product.
    AMD Ryzen™ 7020 Series Mobile Processors “Mendocino” Affected: various
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.881Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_3000_series_desktop_processors:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_3000_series_desktop_processors",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "V1-1.0.0.A"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_5000_series_desktop_processors:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_5000_series_desktop_processors",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "V2-PI_1.2.0.A"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_7000_series_desktop_processors:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_7000_series_desktop_processors",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "1.0.0.6"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "athlon_3000g",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "1.0.0.A"
              },
              {
                "status": "affected",
                "version": "1.2.0.A"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_4000_series_desktop_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_4000_series_desktop_processors_with_radeon_graphics",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "1.2.0.A"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20555",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-24T14:30:24.857101Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-24T14:36:35.845Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics  \u201cCezanne\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7000 Series Processors \u201cRaphael\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics \u201cPicasso\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics \u201cRenoir\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics   \u201cPollock\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d FP6",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cCezanne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 6000 Series Mobile Processors  \"Rembrandt\"",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7030 Series Mobile Processors \u201cBarcelo\u201d ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7020 Series Mobile Processors \u201cMendocino\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-08-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation in\nCpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting\nan arbitrary bit in an attacker-controlled pointer potentially leading to\narbitrary code execution in SMM.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "Insufficient input validation in\nCpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting\nan arbitrary bit in an attacker-controlled pointer potentially leading to\narbitrary code execution in SMM.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-08T17:07:24.476Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4003",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20555",
    "datePublished": "2023-08-08T17:07:24.476Z",
    "dateReserved": "2022-10-27T18:53:39.746Z",
    "dateUpdated": "2024-10-24T14:36:35.845Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20588 (GCVE-0-2023-20588)

Vulnerability from cvelistv5 – Published: 2023-08-08 17:06 – Updated: 2024-10-17 14:23
VLAI?
Summary
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 
Severity ?
No CVSS data available.
Assigner
AMD
References
https://www.amd.com/en/corporate/product-security… vendor-advisory
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
http://www.openwall.com/lists/oss-security/2023/09/25/3
http://www.openwall.com/lists/oss-security/2023/09/25/4
http://xenbits.xen.org/xsa/advisory-439.html
http://www.openwall.com/lists/oss-security/2023/09/25/5
http://www.openwall.com/lists/oss-security/2023/09/25/8
http://www.openwall.com/lists/oss-security/2023/09/25/7
http://www.openwall.com/lists/oss-security/2023/09/26/5
http://www.openwall.com/lists/oss-security/2023/09/26/8
http://www.openwall.com/lists/oss-security/2023/09/26/9
http://www.openwall.com/lists/oss-security/2023/09/27/1
https://lists.fedoraproject.org/archives/list/pac…
https://lists.fedoraproject.org/archives/list/pac…
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/10/03/9
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/10/04/1
http://www.openwall.com/lists/oss-security/2023/10/04/2
http://www.openwall.com/lists/oss-security/2023/10/04/4
http://www.openwall.com/lists/oss-security/2023/10/04/3
https://lists.fedoraproject.org/archives/list/pac…
https://lists.debian.org/debian-lts-announce/2023…
https://security.netapp.com/advisory/ntap-2024053…
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.921Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5480"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5492"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://xenbits.xen.org/xsa/advisory-439.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240531-0005/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20588",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:23:03.408701Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:23:18.239Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "EPYC\u2122 7001 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Processors with Radeon\u2122 Graphics ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-08-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u0026nbsp;\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u00a0\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-08T17:06:30.065Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5492"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
        },
        {
          "url": "http://xenbits.xen.org/xsa/advisory-439.html"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240531-0005/"
        }
      ],
      "source": {
        "advisory": "AMD-SB-7007",
        "discovery": "UNKNOWN"
      },
      "title": "Speculative Leaks",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20588",
    "datePublished": "2023-08-08T17:06:30.065Z",
    "dateReserved": "2022-10-27T18:53:39.759Z",
    "dateUpdated": "2024-10-17T14:23:18.239Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20589 (GCVE-0-2023-20589)

Vulnerability from cvelistv5 – Published: 2023-08-08 17:04 – Updated: 2024-11-13 15:59
VLAI?
Summary
An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution. 
Severity ?
No CVSS data available.
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD Ryzen™ 3000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 3000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 3000 Series Desktop Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 3000 Series Processors with Radeon™ Vega Graphics Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Athlon™ PRO 3000 Series Processors with Radeon™ Vega Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 4000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    Ryzen™ PRO 5000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ Threadripper™ 2000 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ Threadripper™ 5000 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ Threadripper™ 3000 Series Processors Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 5000 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 6000 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ 7030 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 7030 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.262Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4005"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20589",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-13T15:54:27.796904Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-13T15:59:15.464Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 3000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Processors with Radeon\u2122 Graphics ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 4000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processors ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 5000 Series Desktop Processors",
          "vendor": " ",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": " Ryzen\u2122 Threadripper\u2122 5000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 3000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 5000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 6000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7030 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 7030 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-08-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "\nAn attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.\u00a0\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-08T17:04:17.854Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4005"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4005",
        "discovery": "UNKNOWN"
      },
      "title": "fTPM Voltage Fault Injection ",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20589",
    "datePublished": "2023-08-08T17:04:17.854Z",
    "dateReserved": "2022-10-27T18:53:39.760Z",
    "dateUpdated": "2024-11-13T15:59:15.464Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12965 (GCVE-0-2020-12965)

Vulnerability from cvelistv5 – Published: 2022-02-04 22:29 – Updated: 2024-09-16 22:40
VLAI?
Summary
When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage.
Severity ?
No CVSS data available.
CWE
  • TBD
Assigner
AMD
Impacted products
Vendor Product Version
AMD All supported processors Affected: unspecified , < undefined (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010"
          },
          {
            "name": "[oss-security] 20231205 SLAM: Spectre based on Linear Address Masking",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/05/3"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "All supported processors",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "undefined",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-08-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "TBD",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-06T03:06:18.982713",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010"
        },
        {
          "name": "[oss-security] 20231205 SLAM: Spectre based on Linear Address Masking",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/05/3"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1010",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12965",
    "datePublished": "2022-02-04T22:29:13.634345Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T22:40:10.602Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-23815 (GCVE-0-2022-23815)

Vulnerability from nvd – Published: 2024-08-13 16:51 – Updated: 2025-03-18 20:42
VLAI?
Summary
Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.
CWE
Assigner
AMD
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "athlon_3000g",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "various"
              },
              {
                "status": "unaffected",
                "version": "1.0.0.F"
              },
              {
                "status": "unaffected",
                "version": "1.0.0.5"
              },
              {
                "status": "unaffected",
                "version": "1.0.0.E"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_r1000",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.2.0.A"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_r2000",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.2"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_embedded_v1000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_v1000",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.2.0.A"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-23815",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-19T17:04:47.953819Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-18T20:42:11.741Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various",
              "versionType": "PI"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.F"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PollockPI-FT5  1.0.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD RyzenTM Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5  1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD RyzenTM Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedR2KPI-FP5 1.0.0.2"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD RyzenTM Embedded V1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        }
      ],
      "datePublic": "2024-08-13T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e"
            }
          ],
          "value": "Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:51:43.735Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2022-23815",
    "datePublished": "2024-08-13T16:51:43.735Z",
    "dateReserved": "2022-01-21T17:14:12.301Z",
    "dateUpdated": "2025-03-18T20:42:11.741Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26367 (GCVE-0-2021-26367)

Vulnerability from nvd – Published: 2024-08-13 16:50 – Updated: 2024-12-04 16:25
VLAI?
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
Assigner
AMD
Impacted products
Vendor Product Version
AMD AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics Unaffected: ComboAM4v2 PI 1.2.0.5
Create a notification for this product.
    AMD AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics Unaffected: ComboAM4PI 1.0.0.9
Unaffected: ComboAM4v2 PI 1.2.0.8
Create a notification for this product.
    AMD AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics Unaffected: ComboAM4v2 PI 1.2.0.5
Create a notification for this product.
    AMD AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Unaffected: PicassoPI-FP5 1.0.0.E
Create a notification for this product.
    AMD AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Unaffected: PollockPI-FT5 1.0.0.4
Create a notification for this product.
    AMD AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics Unaffected: PicassoPI-FP5 1.0.0.E
Create a notification for this product.
    AMD AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics Unaffected: RenoirPI-FP6 1.0.0.7
Create a notification for this product.
    AMD AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics Unaffected: CezannePI-FP6 1.0.0.6
Create a notification for this product.
    AMD AMD Radeon™ RX 6000 Series Graphics Cards Unaffected: AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)
Create a notification for this product.
    AMD AMD Radeon™ PRO W6000 Series Graphics Cards Unaffected: AMD Software: PRO Edition 23.Q4 (23.30.13.03)
Create a notification for this product.
    AMD AMD Ryzen™ Embedded R1000 Series Processors Unaffected: EmbeddedPI-FP5 1.2.0.A
Create a notification for this product.
    AMD AMD Ryzen™ Embedded R2000 Series Processors Unaffected: EmbeddedR2KPI-FP5 1.0.0.2
Create a notification for this product.
    AMD AMD Ryzen™ Embedded V1000 Series Processors Unaffected: EmbeddedPI-FP5 1.2.0.A
Create a notification for this product.
    AMD AMD Ryzen™ Embedded V2000 Series Processors Unaffected: EmbeddedPI-FP6 1.0.0.6
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-26367",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-13T18:04:31.680686Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T16:25:09.987Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4PI  1.0.0.9"
            },
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.8"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PollockPI-FT5  1.0.0.4"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RenoirPI-FP6  1.0.0.7"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  PRO Edition 23.Q4 (23.30.13.03)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedR2KPI-FP5 1.0.0.2"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP6 1.0.0.6"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
            }
          ],
          "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:50:05.825Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
        },
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26367",
    "datePublished": "2024-08-13T16:50:05.825Z",
    "dateReserved": "2021-01-29T21:24:26.151Z",
    "dateUpdated": "2024-12-04T16:25:09.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20521 (GCVE-0-2023-20521)

Vulnerability from nvd – Published: 2023-11-14 18:52 – Updated: 2024-08-02 09:05
VLAI?
Summary
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
Assigner
AMD
Impacted products
Vendor Product Version
AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4 Affected: various
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20521",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-11-27T19:38:18.334372Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-26T14:56:31.535Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.873Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics \u201cPicasso\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors \u201cColfax\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics   \u201cPollock\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics \u201cPicasso\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded V1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:42:56.250Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20521",
    "datePublished": "2023-11-14T18:52:31.662Z",
    "dateReserved": "2022-10-27T18:53:39.737Z",
    "dateUpdated": "2024-08-02T09:05:36.873Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20555 (GCVE-0-2023-20555)

Vulnerability from nvd – Published: 2023-08-08 17:07 – Updated: 2024-10-24 14:36
VLAI?
Summary
Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.
Severity ?
No CVSS data available.
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD Ryzen™ 3000 Series Desktop Processors “Matisse” AM4 Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4 Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” AM4 Affected: various
Create a notification for this product.
    AMD Ryzen™ 7000 Series Processors “Raphael” Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” Affected: various
Create a notification for this product.
    AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” FP5 Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” FP5 Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock” Affected: various
Create a notification for this product.
    AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Picasso” Affected: various
Create a notification for this product.
    AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6 Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne” Affected: various
Create a notification for this product.
    AMD Ryzen™ 6000 Series Mobile Processors "Rembrandt" Affected: various
Create a notification for this product.
    AMD Ryzen™ 7030 Series Mobile Processors “Barcelo” Affected: various
Create a notification for this product.
    AMD Ryzen™ 7020 Series Mobile Processors “Mendocino” Affected: various
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.881Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_3000_series_desktop_processors:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_3000_series_desktop_processors",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "V1-1.0.0.A"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_5000_series_desktop_processors:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_5000_series_desktop_processors",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "V2-PI_1.2.0.A"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_7000_series_desktop_processors:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_7000_series_desktop_processors",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "1.0.0.6"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "athlon_3000g",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "1.0.0.A"
              },
              {
                "status": "affected",
                "version": "1.2.0.A"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_4000_series_desktop_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_4000_series_desktop_processors_with_radeon_graphics",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "1.2.0.A"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20555",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-24T14:30:24.857101Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-24T14:36:35.845Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics  \u201cCezanne\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7000 Series Processors \u201cRaphael\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics \u201cPicasso\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics \u201cRenoir\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics   \u201cPollock\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d FP6",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cCezanne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 6000 Series Mobile Processors  \"Rembrandt\"",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7030 Series Mobile Processors \u201cBarcelo\u201d ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7020 Series Mobile Processors \u201cMendocino\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-08-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation in\nCpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting\nan arbitrary bit in an attacker-controlled pointer potentially leading to\narbitrary code execution in SMM.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "Insufficient input validation in\nCpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting\nan arbitrary bit in an attacker-controlled pointer potentially leading to\narbitrary code execution in SMM.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-08T17:07:24.476Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4003",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20555",
    "datePublished": "2023-08-08T17:07:24.476Z",
    "dateReserved": "2022-10-27T18:53:39.746Z",
    "dateUpdated": "2024-10-24T14:36:35.845Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20588 (GCVE-0-2023-20588)

Vulnerability from nvd – Published: 2023-08-08 17:06 – Updated: 2024-10-17 14:23
VLAI?
Summary
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 
Severity ?
No CVSS data available.
Assigner
AMD
References
https://www.amd.com/en/corporate/product-security… vendor-advisory
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
http://www.openwall.com/lists/oss-security/2023/09/25/3
http://www.openwall.com/lists/oss-security/2023/09/25/4
http://xenbits.xen.org/xsa/advisory-439.html
http://www.openwall.com/lists/oss-security/2023/09/25/5
http://www.openwall.com/lists/oss-security/2023/09/25/8
http://www.openwall.com/lists/oss-security/2023/09/25/7
http://www.openwall.com/lists/oss-security/2023/09/26/5
http://www.openwall.com/lists/oss-security/2023/09/26/8
http://www.openwall.com/lists/oss-security/2023/09/26/9
http://www.openwall.com/lists/oss-security/2023/09/27/1
https://lists.fedoraproject.org/archives/list/pac…
https://lists.fedoraproject.org/archives/list/pac…
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/10/03/9
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/1…
http://www.openwall.com/lists/oss-security/2023/10/04/1
http://www.openwall.com/lists/oss-security/2023/10/04/2
http://www.openwall.com/lists/oss-security/2023/10/04/4
http://www.openwall.com/lists/oss-security/2023/10/04/3
https://lists.fedoraproject.org/archives/list/pac…
https://lists.debian.org/debian-lts-announce/2023…
https://security.netapp.com/advisory/ntap-2024053…
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.921Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5480"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5492"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://xenbits.xen.org/xsa/advisory-439.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240531-0005/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20588",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:23:03.408701Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:23:18.239Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "EPYC\u2122 7001 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Processors with Radeon\u2122 Graphics ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-08-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u0026nbsp;\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u00a0\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-08T17:06:30.065Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5492"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
        },
        {
          "url": "http://xenbits.xen.org/xsa/advisory-439.html"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240531-0005/"
        }
      ],
      "source": {
        "advisory": "AMD-SB-7007",
        "discovery": "UNKNOWN"
      },
      "title": "Speculative Leaks",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20588",
    "datePublished": "2023-08-08T17:06:30.065Z",
    "dateReserved": "2022-10-27T18:53:39.759Z",
    "dateUpdated": "2024-10-17T14:23:18.239Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20589 (GCVE-0-2023-20589)

Vulnerability from nvd – Published: 2023-08-08 17:04 – Updated: 2024-11-13 15:59
VLAI?
Summary
An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution. 
Severity ?
No CVSS data available.
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD Ryzen™ 3000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 3000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 3000 Series Desktop Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 3000 Series Processors with Radeon™ Vega Graphics Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Athlon™ PRO 3000 Series Processors with Radeon™ Vega Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 4000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    Ryzen™ PRO 5000 Series Desktop Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ Threadripper™ 2000 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ Threadripper™ 5000 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ Threadripper™ 3000 Series Processors Affected: various
Create a notification for this product.
    AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 5000 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 6000 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ 7030 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
    AMD Ryzen™ PRO 7030 Series Processors Affected: various
Create a notification for this product.
    AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics Affected: various
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.262Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4005"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20589",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-13T15:54:27.796904Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-13T15:59:15.464Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 3000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Processors with Radeon\u2122 Graphics ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 4000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processors ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 5000 Series Desktop Processors",
          "vendor": " ",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": " Ryzen\u2122 Threadripper\u2122 5000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 3000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 5000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 6000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7030 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 7030 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-08-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "\nAn attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.\u00a0\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-08T17:04:17.854Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4005"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4005",
        "discovery": "UNKNOWN"
      },
      "title": "fTPM Voltage Fault Injection ",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20589",
    "datePublished": "2023-08-08T17:04:17.854Z",
    "dateReserved": "2022-10-27T18:53:39.760Z",
    "dateUpdated": "2024-11-13T15:59:15.464Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12965 (GCVE-0-2020-12965)

Vulnerability from nvd – Published: 2022-02-04 22:29 – Updated: 2024-09-16 22:40
VLAI?
Summary
When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage.
Severity ?
No CVSS data available.
CWE
  • TBD
Assigner
AMD
Impacted products
Vendor Product Version
AMD All supported processors Affected: unspecified , < undefined (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010"
          },
          {
            "name": "[oss-security] 20231205 SLAM: Spectre based on Linear Address Masking",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/05/3"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "All supported processors",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "undefined",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-08-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "TBD",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-06T03:06:18.982713",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010"
        },
        {
          "name": "[oss-security] 20231205 SLAM: Spectre based on Linear Address Masking",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/05/3"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1010",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12965",
    "datePublished": "2022-02-04T22:29:13.634345Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T22:40:10.602Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}