All the vulnerabilites related to amd - epyc_72f3
cve-2021-26332
Vulnerability from cvelistv5
Published
2022-05-10 18:26
Modified
2024-09-16 17:23
Severity ?
EPSS score ?
Summary
Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T18:26:52", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-06T20:00:00.000Z", "ID": "CVE-2021-26332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26332", "datePublished": "2022-05-10T18:26:52.115269Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:23:38.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12988
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-16 16:33
Severity ?
EPSS score ?
Summary
A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 1st/2nd/3rd Gen AMD EPYC™ Processors |
Version: N/A |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted." } ], "problemTypes": [ { "descriptions": [ { "description": "TBD", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:05:41", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:30:00.000Z", "ID": "CVE-2020-12988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors", "version": { "version_data": [ { "version_value": "N/A" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "TBD" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12988", "datePublished": "2021-06-11T21:50:22.301328Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-16T16:33:44.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20528
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen EPYC |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.\u003cbr\u003e" } ], "value": "Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20528", "datePublished": "2023-01-10T20:57:03.392Z", "dateReserved": "2022-10-27T18:53:39.738Z", "dateUpdated": "2024-08-02T09:05:36.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26355
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen EPYC |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26355", "datePublished": "2023-01-10T20:56:37.810Z", "dateReserved": "2021-01-29T21:24:26.148Z", "dateUpdated": "2024-08-03T20:26:25.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20532
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen EPYC |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.\u003cbr\u003e" } ], "value": "Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20532", "datePublished": "2023-01-10T20:57:08.762Z", "dateReserved": "2022-10-27T18:53:39.739Z", "dateUpdated": "2024-08-02T09:05:36.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26321
Vulnerability from cvelistv5
Published
2021-11-16 18:07
Modified
2024-09-16 18:56
Severity ?
EPSS score ?
Summary
Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:07:26", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26321", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26321", "datePublished": "2021-11-16T18:07:26.527350Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T18:56:13.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20533
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 3000 series Desktop Processors “Matisse" |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 series Desktop Processors \u201cMatisse\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded 5000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:34:28.851Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20533", "datePublished": "2023-11-14T18:52:52.106Z", "dateReserved": "2022-10-27T18:53:39.739Z", "dateUpdated": "2024-08-02T09:05:36.915Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20566
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-12-03 14:26
Severity ?
EPSS score ?
Summary
Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20566", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2023-11-27T20:58:09.078592Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T14:26:45.381Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:36:52.542Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" } ], "source": { "advisory": "AMD-SB-3002", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20566", "datePublished": "2023-11-14T18:54:00.908Z", "dateReserved": "2022-10-27T18:53:39.753Z", "dateUpdated": "2024-12-03T14:26:45.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26328
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2024-08-03 20:19
Severity ?
EPSS score ?
Summary
Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen EPYC |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.\n\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26328", "datePublished": "2023-01-10T20:56:33.464Z", "dateReserved": "2021-01-29T21:24:26.141Z", "dateUpdated": "2024-08-03T20:19:20.263Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26397
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Insufficient address validation, may allow an
attacker with a compromised ABL and UApp to corrupt sensitive memory locations
potentially resulting in a loss of integrity or availability.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient address validation, may allow an\nattacker with a compromised ABL and UApp to corrupt sensitive memory locations\npotentially resulting in a loss of integrity or availability.\n\n\n\n\n\n\n\n" } ], "value": "Insufficient address validation, may allow an\nattacker with a compromised ABL and UApp to corrupt sensitive memory locations\npotentially resulting in a loss of integrity or availability.\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:51:10.456Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26397", "datePublished": "2023-05-09T18:36:19.135Z", "dateReserved": "2021-01-29T21:24:26.165Z", "dateUpdated": "2024-08-03T20:26:25.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-21980
Vulnerability from cvelistv5
Published
2024-08-05 16:06
Modified
2024-08-05 21:00
Severity ?
EPSS score ?
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
References
▼ | URL | Tags |
---|---|---|
https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7003_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.9_sp3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9003_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.7_sp5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7773x_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.d", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9754s_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.c", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-21980", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-05T20:52:33.557459Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-05T21:00:57.665Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI 1.0.0.D", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "GenoaPI 1.0.0.C", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "lessThan": "EmbMilanPI-SP3 1.0.0.9", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "lessThan": "EmbGenoaPI-SP5 1.0.0.7", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] } ], "datePublic": "2024-08-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest\u0027s memory or UMC seed resulting in loss of confidentiality and integrity.\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest\u0027s memory or UMC seed resulting in loss of confidentiality and integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-05T16:06:36.216Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2024-21980", "datePublished": "2024-08-05T16:06:36.216Z", "dateReserved": "2024-01-03T16:43:30.197Z", "dateUpdated": "2024-08-05T21:00:57.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26325
Vulnerability from cvelistv5
Published
2021-11-16 18:23
Modified
2024-09-16 16:28
Severity ?
EPSS score ?
Summary
Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:23:15", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26325", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26325", "datePublished": "2021-11-16T18:23:15.960316Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T16:28:08.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26330
Vulnerability from cvelistv5
Published
2021-11-16 18:19
Modified
2024-09-16 18:12
Severity ?
EPSS score ?
Summary
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:19:29", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26330", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26330", "datePublished": "2021-11-16T18:19:29.476922Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T18:12:54.960Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20573
Vulnerability from cvelistv5
Published
2024-01-11 13:53
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A privileged attacker
can prevent delivery of debug exceptions to SEV-SNP guests potentially
resulting in guests not receiving expected debug information.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.236Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] } ], "datePublic": "2024-01-09T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n" } ], "value": "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2024-01-11T13:53:52.581Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006" } ], "source": { "advisory": "AMD-SB-3004", "discovery": "UNKNOWN" }, "title": "Debug Exception Delivery in Secure Nested Paging", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20573", "datePublished": "2024-01-11T13:53:52.581Z", "dateReserved": "2022-10-27T18:53:39.755Z", "dateUpdated": "2024-08-02T09:05:36.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26348
Vulnerability from cvelistv5
Published
2022-05-11 16:26
Modified
2024-09-16 16:27
Severity ?
EPSS score ?
Summary
Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:26:16", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26348", "datePublished": "2022-05-11T16:26:16.451702Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T16:27:57.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20523
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen EPYC |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.\u003cbr\u003e" } ], "value": "TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20523", "datePublished": "2023-01-10T20:56:59.383Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2024-08-02T09:05:36.871Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46756
Vulnerability from cvelistv5
Published
2023-05-09 19:00
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
Insufficient validation of inputs in
SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an
attacker with a malicious Uapp or ABL to send malformed or invalid syscall to
the bootloader resulting in a potential denial of service and loss of
integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 series Desktop Processors \u201cRaven Ridge\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Desktop Processors \u201cPinnacle Ridge\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop processor with Radeon\u2122 Graphics \u201cCezanne\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cColfax\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d ULP", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPollock\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Mobile Processors \u201cRaven Ridge\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile processor, 2nd Gen AMD Ryzen\u2122 Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile processors with Radeon\u2122 Graphics \u201cCezanne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient validation of inputs in\nSVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an\nattacker with a malicious Uapp or ABL to send malformed or invalid syscall to\nthe bootloader resulting in a potential denial of service and loss of\nintegrity.\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Insufficient validation of inputs in\nSVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an\nattacker with a malicious Uapp or ABL to send malformed or invalid syscall to\nthe bootloader resulting in a potential denial of service and loss of\nintegrity.\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T19:00:35.599Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-4001, AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46756", "datePublished": "2023-05-09T19:00:35.599Z", "dateReserved": "2022-03-31T16:50:27.868Z", "dateUpdated": "2024-08-04T05:17:42.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26323
Vulnerability from cvelistv5
Published
2021-11-16 18:14
Modified
2024-09-16 23:45
Severity ?
EPSS score ?
Summary
Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:14:43", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26323", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26323", "datePublished": "2021-11-16T18:14:43.401480Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T23:45:40.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12966
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-17 01:06
Severity ?
EPSS score ?
Summary
AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2022/08/08/6 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 1st/2nd/3rd Gen AMD EPYC™ Processors |
Version: unspecified < undefined |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:19.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" }, { "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "undefined", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor." } ], "problemTypes": [ { "descriptions": [ { "description": "TBD", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-08T17:06:45", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" }, { "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" } ], "source": { "advisory": "AMD-SB-1013", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-08-10T19:30:00.000Z", "ID": "CVE-2020-12966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "TBD" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" }, { "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" } ] }, "source": { "advisory": "AMD-SB-1013", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12966", "datePublished": "2022-02-04T22:29:12.748016Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-17T01:06:34.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46774
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-10-11 18:07
Severity ?
EPSS score ?
Summary
Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 3000 series Desktop Processors “Matisse" |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46774", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T17:51:52.542045Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T18:07:59.642Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 series Desktop Processors \u201cMatisse\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded 5000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:31:43.449Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46774", "datePublished": "2023-11-14T18:52:11.012Z", "dateReserved": "2022-03-31T16:50:27.874Z", "dateUpdated": "2024-10-11T18:07:59.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12954
Vulnerability from cvelistv5
Published
2021-11-16 18:11
Modified
2024-09-16 18:48
Severity ?
EPSS score ?
Summary
A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.706Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:11:02", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2020-12954", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693 Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12954", "datePublished": "2021-11-16T18:11:02.785753Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-16T18:48:26.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26326
Vulnerability from cvelistv5
Published
2021-11-16 17:52
Modified
2024-09-16 17:53
Severity ?
EPSS score ?
Summary
Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "CWE-665 Improper Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T17:52:14", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-665 Improper Initialization" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26326", "datePublished": "2021-11-16T17:52:14.020889Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:53:16.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26336
Vulnerability from cvelistv5
Published
2021-11-16 18:04
Modified
2024-09-16 17:33
Severity ?
EPSS score ?
Summary
Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:44:49", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26336", "datePublished": "2021-11-16T18:04:08.054768Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:33:06.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26344
Vulnerability from cvelistv5
Published
2024-08-13 16:49
Modified
2024-08-13 18:33
Severity ?
EPSS score ?
Summary
An out of bounds memory write when processing the AMD
PSP1 Configuration Block (APCB) could allow an attacker with access the ability
to modify the BIOS image, and the ability to sign the resulting image, to
potentially modify the APCB block resulting in arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD EPYC™ 7001 Series Processors |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:amd:naplespi:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "naplespi", "vendor": "amd", "versions": [ { "lessThan": "1.0.0.k", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:amd:romepi:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "romepi", "vendor": "amd", "versions": [ { "lessThan": "1.0.0.C", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "milanpi", "vendor": "amd", "versions": [ { "lessThan": "1.0.0.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2021-26344", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T18:29:11.333464Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-13T18:33:40.359Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7001 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7002 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RomePI 1.0.0.C" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MilanPI 1.0.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4V2 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4V2 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 5000WX Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ChagallWSPI-sWRX8 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MendocinoPI-FT6 1.0.0.3" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RembrandtPI-FP7 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RembrandtPI-FP7 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7002 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbRomePI-SP3 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 3000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbMilanPI-SP3 1.0.0.2" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded 5000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V3000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP7r2 1.0.0.4" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn out of bounds memory write when processing the AMD\nPSP1 Configuration Block (APCB) could allow an attacker with access the ability\nto modify the BIOS image, and the ability to sign the resulting image, to\npotentially modify the APCB block resulting in arbitrary code execution.\n\n\n\n\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "An out of bounds memory write when processing the AMD\nPSP1 Configuration Block (APCB) could allow an attacker with access the ability\nto modify the BIOS image, and the ability to sign the resulting image, to\npotentially modify the APCB block resulting in arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:49:52.889Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26344", "datePublished": "2024-08-13T16:49:52.889Z", "dateReserved": "2021-01-29T21:24:26.145Z", "dateUpdated": "2024-08-13T18:33:40.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26349
Vulnerability from cvelistv5
Published
2022-05-11 16:24
Modified
2024-09-17 01:05
Severity ?
EPSS score ?
Summary
Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA).
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.008Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA)." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:24:22", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26349", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA)." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26349", "datePublished": "2022-05-11T16:24:22.957466Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T01:05:40.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26388
Vulnerability from cvelistv5
Published
2022-05-11 16:29
Modified
2024-09-16 23:01
Severity ?
EPSS score ?
Summary
Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:29:06", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26388", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26388", "datePublished": "2022-05-11T16:29:06.174576Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T23:01:19.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31346
Vulnerability from cvelistv5
Published
2024-02-13 19:18
Modified
2024-08-02 14:53
Severity ?
EPSS score ?
Summary
Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-31346", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T20:06:47.743045Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:19:15.832Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:30.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2024-02-13T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2024-02-13T19:18:21.462Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "source": { "advisory": "AMD-SB-3007", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-31346", "datePublished": "2024-02-13T19:18:19.089Z", "dateReserved": "2023-04-27T15:25:41.427Z", "dateUpdated": "2024-08-02T14:53:30.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20575
Vulnerability from cvelistv5
Published
2023-07-11 18:29
Modified
2024-11-27 16:01
Severity ?
EPSS score ?
Summary
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20575", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T15:57:15.725721Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203 Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T16:01:14.610Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] } ], "datePublic": "2023-07-11T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program\u2019s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n" } ], "value": "\nA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program\u2019s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-07-11T18:29:02.607Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004" } ], "source": { "advisory": "AMD-SB-3004", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20575", "datePublished": "2023-07-11T18:29:02.607Z", "dateReserved": "2022-10-27T18:53:39.756Z", "dateUpdated": "2024-11-27T16:01:14.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20529
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen EPYC |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.240Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.\u003cbr\u003e" } ], "value": "Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20529", "datePublished": "2023-01-10T20:57:04.799Z", "dateReserved": "2022-10-27T18:53:39.738Z", "dateUpdated": "2024-08-02T09:05:36.240Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26364
Vulnerability from cvelistv5
Published
2022-05-11 16:25
Modified
2024-09-16 20:42
Severity ?
EPSS score ?
Summary
Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:25:26", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26364", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26364", "datePublished": "2022-05-11T16:25:26.746976Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T20:42:13.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26331
Vulnerability from cvelistv5
Published
2021-11-16 18:09
Modified
2024-09-16 21:03
Severity ?
EPSS score ?
Summary
AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:09:35", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26331", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26331", "datePublished": "2021-11-16T18:09:35.653452Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T21:03:02.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20591
Vulnerability from cvelistv5
Published
2024-08-13 16:53
Modified
2024-08-14 13:14
Severity ?
EPSS score ?
Summary
Improper re-initialization of IOMMU during the DRTM event
may permit an untrusted platform configuration to persist, allowing an attacker
to read or modify hypervisor memory, potentially resulting in loss of
confidentiality, integrity, and availability.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7003_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.b", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9003_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.8", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7773x_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.b", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9754s_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.8", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-20591", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T13:13:17.696799Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T13:14:56.158Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MilanPI 1.0.0.B", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 9004 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "Genoa 1.0.0.8" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbMilanPI-SP3 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbGenoaPI-SP5 1.0.0.3" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability.\n\n\n\n\n\n\n\n\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "Improper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:53:23.681Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20591", "datePublished": "2024-08-13T16:53:23.681Z", "dateReserved": "2022-10-27T18:53:39.761Z", "dateUpdated": "2024-08-14T13:14:56.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-21978
Vulnerability from cvelistv5
Published
2024-08-05 16:05
Modified
2024-08-05 17:36
Severity ?
EPSS score ?
Summary
Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
References
▼ | URL | Tags |
---|---|---|
https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7003_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.9_sp3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9003_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.7_sp5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7773x_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.d", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9754s_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.c", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-21978", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-05T17:01:18.171419Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-05T17:36:02.731Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI 1.0.0.D", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "GenoaPI 1.0.0.C", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "lessThan": "EmbMilanPI-SP3 1.0.0.9", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "lessThan": "EmbGenoaPI-SP5 1.0.0.7", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] } ], "datePublic": "2024-08-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-05T16:05:34.019Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2024-21978", "datePublished": "2024-08-05T16:05:34.019Z", "dateReserved": "2024-01-03T16:43:30.197Z", "dateUpdated": "2024-08-05T17:36:02.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26316
Vulnerability from cvelistv5
Published
2023-01-10 19:46
Modified
2024-08-03 20:19
Severity ?
EPSS score ?
Summary
Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen 5000 Series |
Version: various |
||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 5000 Series ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 2000 Series", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 3000 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA ", "platforms": [ "x86" ], "product": "1st Gen EPYC ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution." } ], "value": "Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1031, AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26316", "datePublished": "2023-01-10T19:46:46.575Z", "dateReserved": "2021-01-29T21:24:26.137Z", "dateUpdated": "2024-08-03T20:19:20.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26342
Vulnerability from cvelistv5
Published
2022-05-11 16:21
Modified
2024-09-16 16:32
Severity ?
EPSS score ?
Summary
In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:21:04", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26342", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26342", "datePublished": "2022-05-11T16:21:04.403325Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T16:32:42.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26396
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen EPYC |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.145Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26396", "datePublished": "2023-01-10T20:56:39.130Z", "dateReserved": "2021-01-29T21:24:26.165Z", "dateUpdated": "2024-08-03T20:26:25.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20520
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Improper access control settings in ASP
Bootloader may allow an attacker to corrupt the return address causing a
stack-based buffer overrun potentially leading to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.261Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper access control settings in ASP\nBootloader may allow an attacker to corrupt the return address causing a\nstack-based buffer overrun potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n" } ], "value": "Improper access control settings in ASP\nBootloader may allow an attacker to corrupt the return address causing a\nstack-based buffer overrun potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:53:42.276Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20520", "datePublished": "2023-05-09T18:36:29.141Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2024-08-02T09:05:36.261Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26375
Vulnerability from cvelistv5
Published
2022-05-11 16:20
Modified
2024-09-17 03:43
Severity ?
EPSS score ?
Summary
Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:20:03", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26375", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26375", "datePublished": "2022-05-11T16:20:03.207552Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T03:43:15.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20578
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2024-08-15 18:08
Severity ?
EPSS score ?
Summary
A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow
an attacker with ring0 privileges and access to the
BIOS menu or UEFI shell to modify the communications buffer potentially
resulting in arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD EPYC™ 7001 Processors | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7001", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.k" } ] }, { "cpes": [ "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7002", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.g" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_9004:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9004", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.2" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_embedded_3000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_embedded_3000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.1.0.a" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_embedded_7002:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_embedded_7002", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.a" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_embedded_7003:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_embedded_7003", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.7" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_embedded_9003:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_embedded_9003", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.0" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_7000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_7000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.0" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_v3000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_v3000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.8" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-20578", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T15:56:35.845479Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T18:08:38.953Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "PI", "product": "AMD EPYC\u2122 7001 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "NaplesPI 1.0.0.K", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7002 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RomePI 1.0.0.G" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7003 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MilanPI 1.0.0.B" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 9004 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "GenoaPI 1.0.0.2" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM5 1.0.0.1" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 5000WX Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ChagallWSPI-sWRX8 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MendocinoPI-FT6 1.0.0.0" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RembrandtPI-FP7 1.0.0.9b" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RembrandtPI-FP7 1.0.0.9b" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "SnowyOwl PI 1.1.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbRomePI-SP3 1.0.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbMilanPI-SP3 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbGenoaPI-SP5 1.0.0.0" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded 7000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedAM5PI 1.0.0.0" } ] }, { "defaultStatus": "affected", "product": "AMD RyzenTM Embedded V3000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP7r2 1.0.0.8" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications \u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003ebuffer\u0026nbsp;\u003c/a\u003epotentially\nresulting in arbitrary code execution.\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications buffer\u00a0potentially\nresulting in arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:52:58.457Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20578", "datePublished": "2024-08-13T16:52:58.457Z", "dateReserved": "2022-10-27T18:53:39.757Z", "dateUpdated": "2024-08-15T18:08:38.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46764
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
Improper validation of DRAM addresses in SMU may
allow an attacker to overwrite sensitive memory locations within the ASP
potentially resulting in a denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper validation of DRAM addresses in SMU may\nallow an attacker to overwrite sensitive memory locations within the ASP\npotentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "Improper validation of DRAM addresses in SMU may\nallow an attacker to overwrite sensitive memory locations within the ASP\npotentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:52:22.650Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46764", "datePublished": "2023-05-09T18:36:24.562Z", "dateReserved": "2022-03-31T16:50:27.870Z", "dateUpdated": "2024-08-04T05:17:42.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26322
Vulnerability from cvelistv5
Published
2021-11-16 17:58
Modified
2024-09-17 00:56
Severity ?
EPSS score ?
Summary
Persistent platform private key may not be protected with a random IV leading to a potential “two time pad attack”.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.397Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Persistent platform private key may not be protected with a random IV leading to a potential \u201ctwo time pad attack\u201d." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-320", "description": "CWE-320 Key Management Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T17:58:40", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Persistent platform private key may not be protected with a random IV leading to a potential \u201ctwo time pad attack\u201d." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-320 Key Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26322", "datePublished": "2021-11-16T17:58:40.230958Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T00:56:29.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12961
Vulnerability from cvelistv5
Published
2021-11-16 18:13
Modified
2024-09-17 04:13
Severity ?
EPSS score ?
Summary
A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: unspecified < RomePI-SP3_1.0.0.C |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:19.051Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:13:39", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2020-12961", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12961", "datePublished": "2021-11-16T18:13:39.959506Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-17T04:13:59.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26376
Vulnerability from cvelistv5
Published
2022-05-11 16:28
Modified
2024-09-16 17:58
Severity ?
EPSS score ?
Summary
Insufficient checks in System Management Unit (SMU) FeatureConfig may result in reenabling features potentially resulting in denial of resources and/or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient checks in System Management Unit (SMU) FeatureConfig may result in reenabling features potentially resulting in denial of resources and/or denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:28:09", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26376", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient checks in System Management Unit (SMU) FeatureConfig may result in reenabling features potentially resulting in denial of resources and/or denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26376", "datePublished": "2022-05-11T16:28:09.769017Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:58:27.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26329
Vulnerability from cvelistv5
Published
2021-11-16 17:57
Modified
2024-09-16 22:24
Severity ?
EPSS score ?
Summary
AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T17:57:01", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26329", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-130 Improper Handling of Length Parameter Inconsistency" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26329", "datePublished": "2021-11-16T17:57:01.031900Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T22:24:45.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26347
Vulnerability from cvelistv5
Published
2022-05-11 16:22
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | Ryzen 5000 Series |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 5000 Series", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service." } ], "value": "Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" } ], "source": { "advisory": "AMD-SB-1031", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26347", "datePublished": "2022-05-11T16:22:09.774768Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-08-03T20:26:25.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26340
Vulnerability from cvelistv5
Published
2021-12-10 21:55
Modified
2024-09-16 16:29
Severity ?
EPSS score ?
Summary
A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThanOrEqual": "3rd gen EPYC", "status": "affected", "version": "Processor", "versionType": "custom" } ] } ], "datePublic": "2021-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM)." } ], "problemTypes": [ { "descriptions": [ { "description": "NA", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-10T21:55:10", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" } ], "source": { "advisory": "AMD-SB-1023", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-12-06T20:30:00.000Z", "ID": "CVE-2021-26340", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Processor", "version_value": "3rd gen EPYC" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM)." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NA" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" } ] }, "source": { "advisory": "AMD-SB-1023", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26340", "datePublished": "2021-12-10T21:55:10.021622Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T16:29:03.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26402
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen EPYC |
Version: Various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26402", "datePublished": "2023-01-10T20:56:41.784Z", "dateReserved": "2021-01-29T21:24:26.169Z", "dateUpdated": "2024-08-03T20:26:25.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26356
Vulnerability from cvelistv5
Published
2023-05-09 18:58
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
A TOCTOU in ASP bootloader may allow an attacker
to tamper with the SPI ROM following data read to memory potentially resulting
in S3 data corruption and information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 3000 Series Desktop Processors “Matisse” AM4 |
Version: various |
||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A TOCTOU in ASP bootloader may allow an attacker\nto tamper with the SPI ROM following data read to memory potentially resulting\nin S3 data corruption and information disclosure.\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "A TOCTOU in ASP bootloader may allow an attacker\nto tamper with the SPI ROM following data read to memory potentially resulting\nin S3 data corruption and information disclosure.\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:58:48.108Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-4001, AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26356", "datePublished": "2023-05-09T18:58:48.108Z", "dateReserved": "2021-01-29T21:24:26.149Z", "dateUpdated": "2024-08-03T20:26:24.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20569
Vulnerability from cvelistv5
Published
2023-08-08 17:02
Modified
2024-09-23 03:18
Severity ?
EPSS score ?
Summary
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005 | vendor-advisory | |
http://xenbits.xen.org/xsa/advisory-434.html | ||
http://www.openwall.com/lists/oss-security/2023/08/08/4 | ||
https://comsec.ethz.ch/research/microarch/inception/ | ||
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/ | ||
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/ | ||
https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html | ||
https://www.debian.org/security/2023/dsa-5475 | ||
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ | ||
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ | ||
https://security.netapp.com/advisory/ntap-20240605-0006/ |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 3000 Series Desktop Processors |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-09-23T03:18:32.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005" }, { "tags": [ "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-434.html" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/08/08/4" }, { "tags": [ "x_transferred" ], "url": "https://comsec.ethz.ch/research/microarch/inception/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5475" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240605-0006/" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 3000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Processors with Radeon\u2122 Graphics ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Athlon\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 4000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop Processors ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 5000 Series Desktop Processors", "vendor": " ", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": " Ryzen\u2122 Threadripper\u2122 5000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 3000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 5000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 6000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "Ryzen\u2122 7000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "Ryzen\u2122 7000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": " 1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD ", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-08-08T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA side channel vulnerability on some \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eof the \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAMD CPUs may allow an attacker to influence \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ethe \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ereturn address prediction\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. This may\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e result in speculative execution at an attacker-controlled\u202f\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eaddress\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e, potentially leading to information disclosure.\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-08-08T17:02:11.318Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005" }, { "url": "http://xenbits.xen.org/xsa/advisory-434.html" }, { "url": "http://www.openwall.com/lists/oss-security/2023/08/08/4" }, { "url": "https://comsec.ethz.ch/research/microarch/inception/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "url": "https://www.debian.org/security/2023/dsa-5475" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" }, { "url": "https://security.netapp.com/advisory/ntap-20240605-0006/" } ], "source": { "advisory": "AMD-SB-7005", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20569", "datePublished": "2023-08-08T17:02:11.318Z", "dateReserved": "2022-10-27T18:53:39.754Z", "dateUpdated": "2024-09-23T03:18:32.598Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26379
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Insufficient input validation of mailbox data in the
SMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially
leading to a loss of integrity and privilege escalation.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation of mailbox data in the\nSMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially\nleading to a loss of integrity and privilege escalation.\n\n\n\n" } ], "value": "Insufficient input validation of mailbox data in the\nSMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially\nleading to a loss of integrity and privilege escalation.\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:50:00.247Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26379", "datePublished": "2023-05-09T18:36:18.303Z", "dateReserved": "2021-01-29T21:24:26.158Z", "dateUpdated": "2024-08-03T20:26:25.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26324
Vulnerability from cvelistv5
Published
2022-05-10 18:27
Modified
2024-09-16 17:54
Severity ?
EPSS score ?
Summary
A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T18:27:30", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-06T20:00:00.000Z", "ID": "CVE-2021-26324", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26324", "datePublished": "2022-05-10T18:27:30.491069Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:54:12.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26354
Vulnerability from cvelistv5
Published
2023-05-09 18:58
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Insufficient bounds checking in ASP may allow an
attacker to issue a system call from a compromised ABL which may cause
arbitrary memory values to be initialized to zero, potentially leading to a
loss of integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4 |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 series Desktop Processors \u201cRaven Ridge\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Desktop Processors \u201cPinnacle Ridge\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop processor with Radeon\u2122 Graphics \u201cCezanne\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cColfax\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d ULP", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPollock\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Mobile Processors \u201cRaven Ridge\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile processor, 2nd Gen AMD Ryzen\u2122 Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile processors with Radeon\u2122 Graphics \u201cCezanne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient bounds checking in ASP may allow an\nattacker to issue a system call from a compromised ABL which may cause\narbitrary memory values to be initialized to zero, potentially leading to a\nloss of integrity.\n\n\n\n\u003cbr\u003e" } ], "value": "Insufficient bounds checking in ASP may allow an\nattacker to issue a system call from a compromised ABL which may cause\narbitrary memory values to be initialized to zero, potentially leading to a\nloss of integrity.\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:58:37.664Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-4001, AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26354", "datePublished": "2023-05-09T18:58:37.664Z", "dateReserved": "2021-01-29T21:24:26.148Z", "dateUpdated": "2024-08-03T20:26:25.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26338
Vulnerability from cvelistv5
Published
2021-11-16 17:53
Modified
2024-09-17 01:56
Severity ?
EPSS score ?
Summary
Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: unspecified < RomePI-SP3_1.0.0.C |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T17:53:50", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26338", "datePublished": "2021-11-16T17:53:50.233501Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T01:56:07.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20530
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen EPYC |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.\u003cbr\u003e" } ], "value": "Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20530", "datePublished": "2023-01-10T20:57:06.132Z", "dateReserved": "2022-10-27T18:53:39.739Z", "dateUpdated": "2024-08-02T09:05:36.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20527
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen EPYC |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.\u003cbr\u003e" } ], "value": "Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20527", "datePublished": "2023-01-10T20:57:02.034Z", "dateReserved": "2022-10-27T18:53:39.738Z", "dateUpdated": "2024-08-02T09:05:36.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26350
Vulnerability from cvelistv5
Published
2022-05-11 16:16
Modified
2024-09-16 21:07
Severity ?
EPSS score ?
Summary
A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:16:40", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26350", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26350", "datePublished": "2022-05-11T16:16:40.882207Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T21:07:55.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26320
Vulnerability from cvelistv5
Published
2021-11-16 18:05
Modified
2024-09-16 18:34
Severity ?
EPSS score ?
Summary
Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:05:10", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26320", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26320", "datePublished": "2021-11-16T18:05:10.770439Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T18:34:19.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12967
Vulnerability from cvelistv5
Published
2021-05-13 11:06
Modified
2024-09-16 18:55
Severity ?
EPSS score ?
Summary
The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | SEV/SEV-ES |
Version: unspecified < SEV-SNP |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SEV/SEV-ES", "vendor": "AMD", "versions": [ { "lessThan": "SEV-SNP", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-13T11:06:11", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ], "source": { "advisory": "AMD-SB-1004", "discovery": "EXTERNAL" }, "title": "AMD Secure Encrypted Virtualization", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-05-11T18:43:00.000Z", "ID": "CVE-2020-12967", "STATE": "PUBLIC", "TITLE": "AMD Secure Encrypted Virtualization" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SEV/SEV-ES", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "SEV-SNP" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ] }, "source": { "advisory": "AMD-SB-1004", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12967", "datePublished": "2021-05-13T11:06:11.058128Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-16T18:55:13.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26337
Vulnerability from cvelistv5
Published
2021-11-16 18:24
Modified
2024-09-17 03:49
Severity ?
EPSS score ?
Summary
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:42:04", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26337", "datePublished": "2021-11-16T18:24:01.483891Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T03:49:09.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20584
Vulnerability from cvelistv5
Published
2024-08-13 16:53
Modified
2024-11-05 21:40
Severity ?
EPSS score ?
Summary
IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD EPYC™ 7003 Processors | |||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20584", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T17:31:27.946120Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T21:40:37.392Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7003 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MilanPI 1.0.0.C", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 9004 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "GenoaPI 1.0.0.B" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised \u003ca target=\"_blank\" rel=\"nofollow\"\u003eHypervisor \u003c/a\u003eto\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity.\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\n\n\u003cdiv\u003e\n\n\n\n\n\n\u003cdiv\u003e\n\n\u003cdiv\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\n\n\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised Hypervisor to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:53:18.373Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20584", "datePublished": "2024-08-13T16:53:18.373Z", "dateReserved": "2022-10-27T18:53:39.759Z", "dateUpdated": "2024-11-05T21:40:37.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12944
Vulnerability from cvelistv5
Published
2021-11-16 18:17
Modified
2024-09-16 17:04
Severity ?
EPSS score ?
Summary
Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T15:27:11", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2020-12944", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12944", "datePublished": "2021-11-16T18:17:24.768272Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-16T17:04:09.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26373
Vulnerability from cvelistv5
Published
2022-05-11 16:27
Modified
2024-09-16 16:32
Severity ?
EPSS score ?
Summary
Insufficient bound checks in the System Management Unit (SMU) may result in a system voltage malfunction that could result in denial of resources and/or possibly denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient bound checks in the System Management Unit (SMU) may result in a system voltage malfunction that could result in denial of resources and/or possibly denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:27:13", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26373", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient bound checks in the System Management Unit (SMU) may result in a system voltage malfunction that could result in denial of resources and/or possibly denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26373", "datePublished": "2022-05-11T16:27:13.373606Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T16:32:39.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26339
Vulnerability from cvelistv5
Published
2022-05-11 16:18
Modified
2024-09-17 01:56
Severity ?
EPSS score ?
Summary
A bug in AMD CPU’s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A bug in AMD CPU\u2019s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:18:02", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A bug in AMD CPU\u2019s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26339", "datePublished": "2022-05-11T16:18:02.079030Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T01:56:55.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23824
Vulnerability from cvelistv5
Published
2022-11-09 20:48
Modified
2024-09-17 01:22
Severity ?
EPSS score ?
Summary
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040 | ||
http://www.openwall.com/lists/oss-security/2022/11/10/2 | mailing-list | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ | vendor-advisory | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/ | vendor-advisory | |
https://www.debian.org/security/2023/dsa-5378 | vendor-advisory | |
https://security.gentoo.org/glsa/202402-07 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Processors |
Version: Processor various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:46.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "name": "FEDORA-2022-9f51d13fa3", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "name": "FEDORA-2022-53a4a5dd11", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "name": "DSA-5378", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5378" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202402-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Processor various" } ] } ], "datePublic": "2022-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "NA", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-26T00:00:00", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "name": "FEDORA-2022-9f51d13fa3", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "name": "FEDORA-2022-53a4a5dd11", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "name": "DSA-5378", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5378" }, { "url": "https://security.gentoo.org/glsa/202402-07" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2022-23824", "datePublished": "2022-11-09T20:48:06.826956Z", "dateReserved": "2022-01-21T00:00:00", "dateUpdated": "2024-09-17T01:22:09.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31355
Vulnerability from cvelistv5
Published
2024-08-05 16:04
Modified
2024-08-06 14:58
Severity ?
EPSS score ?
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.
References
▼ | URL | Tags |
---|---|---|
https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-31355", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T14:07:12.426239Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T14:58:40.899Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI 1.0.0.D", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "GenoaPI 1.0.0.C", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "lessThan": "EmbMilanPI-SP3 1.0.0.9", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "lessThan": "EmbGenoaPI-SP5 1.0.0.7", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] } ], "datePublic": "2024-08-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest\u0027s UMC seed potentially allowing reading of memory from a decommissioned guest.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest\u0027s UMC seed potentially allowing reading of memory from a decommissioned guest." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-05T16:04:24.813Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-31355", "datePublished": "2024-08-05T16:04:24.813Z", "dateReserved": "2023-04-27T15:25:41.428Z", "dateUpdated": "2024-08-06T14:58:40.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23830
Vulnerability from cvelistv5
Published
2023-11-14 18:53
Modified
2024-08-03 03:51
Severity ?
EPSS score ?
Summary
SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:45.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPY\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:41:52.383Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2022-23830", "datePublished": "2023-11-14T18:53:28.408Z", "dateReserved": "2022-01-21T17:20:55.781Z", "dateUpdated": "2024-08-03T03:51:45.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26335
Vulnerability from cvelistv5
Published
2021-11-16 18:08
Modified
2024-09-16 18:24
Severity ?
EPSS score ?
Summary
Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:25:06", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26335", "datePublished": "2021-11-16T18:08:39.387145Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T18:24:42.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23818
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-03 03:51
Severity ?
EPSS score ?
Summary
Insufficient input validation on the model
specific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest
memory integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:46.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation on the model\nspecific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest\nmemory integrity.\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "Insufficient input validation on the model\nspecific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest\nmemory integrity.\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:53:23.338Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2022-23818", "datePublished": "2023-05-09T18:36:28.387Z", "dateReserved": "2022-01-21T17:20:55.777Z", "dateUpdated": "2024-08-03T03:51:46.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26378
Vulnerability from cvelistv5
Published
2022-05-11 16:23
Modified
2024-09-16 20:22
Severity ?
EPSS score ?
Summary
Insufficient bound checks in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.909Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient bound checks in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:23:26", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26378", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient bound checks in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26378", "datePublished": "2022-05-11T16:23:26.758045Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T20:22:35.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26311
Vulnerability from cvelistv5
Published
2021-05-13 11:06
Modified
2024-09-17 04:25
Severity ?
EPSS score ?
Summary
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | SEV/SEV-ES |
Version: unspecified < SEV-SNP |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SEV/SEV-ES", "vendor": "AMD", "versions": [ { "lessThan": "SEV-SNP", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-13T11:06:17", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ], "source": { "advisory": "AMD-SB-1004", "discovery": "EXTERNAL" }, "title": "AMD Secure Encrypted Virtualization", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-05-11T18:43:00.000Z", "ID": "CVE-2021-26311", "STATE": "PUBLIC", "TITLE": "AMD Secure Encrypted Virtualization" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SEV/SEV-ES", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "SEV-SNP" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ] }, "source": { "advisory": "AMD-SB-1004", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26311", "datePublished": "2021-05-13T11:06:17.662304Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T04:25:26.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20531
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen EPYC |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.\u003cbr\u003e" } ], "value": "Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20531", "datePublished": "2023-01-10T20:57:07.471Z", "dateReserved": "2022-10-27T18:53:39.739Z", "dateUpdated": "2024-08-02T09:05:36.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12946
Vulnerability from cvelistv5
Published
2021-11-16 18:01
Modified
2024-09-17 00:55
Severity ?
EPSS score ?
Summary
Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:29:08", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2020-12946", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12946", "datePublished": "2021-11-16T18:01:28.187239Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-17T00:55:32.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26315
Vulnerability from cvelistv5
Published
2021-11-16 18:12
Modified
2024-09-17 01:21
Severity ?
EPSS score ?
Summary
When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.391Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:12:07", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-345 Insufficient Verification of Data Authenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26315", "datePublished": "2021-11-16T18:12:07.291241Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T01:21:40.952Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20525
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen EPYC |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.\u003cbr\u003e" } ], "value": "Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20525", "datePublished": "2023-01-10T20:57:00.713Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2024-08-02T09:05:36.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26343
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen EPYC |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.\n\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26343", "datePublished": "2023-01-10T20:56:34.870Z", "dateReserved": "2021-01-29T21:24:26.144Z", "dateUpdated": "2024-08-03T20:26:24.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46763
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
Insufficient input validation in the SMU may
enable a privileged attacker to write beyond the intended bounds of a shared
memory buffer potentially leading to a loss of integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the SMU may\nenable a privileged attacker to write beyond the intended bounds of a shared\nmemory buffer potentially leading to a loss of integrity.\n\n\n\n\n\n\n\n" } ], "value": "Insufficient input validation in the SMU may\nenable a privileged attacker to write beyond the intended bounds of a shared\nmemory buffer potentially leading to a loss of integrity.\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:52:03.128Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46763", "datePublished": "2023-05-09T18:36:23.834Z", "dateReserved": "2022-03-31T16:50:27.870Z", "dateUpdated": "2024-08-04T05:17:42.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20521
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4 |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20521", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2023-11-27T19:38:18.334372Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T14:56:31.535Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics \u201cPicasso\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors \u201cColfax\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPollock\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics \u201cPicasso\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded R1000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded R2000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded V1000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:42:56.250Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20521", "datePublished": "2023-11-14T18:52:31.662Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2024-08-02T09:05:36.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20526
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD Ryzen™ Threadripper™ 2000 Series Processors “Colfax” |
Version: various |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 2000 Series Processors \u201cColfax\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.\u003cbr\u003e" } ], "value": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:43:52.998Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20526", "datePublished": "2023-11-14T18:52:41.992Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2024-08-02T09:05:36.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46762
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
Insufficient input validation in the SMU may
allow an attacker to corrupt SMU SRAM potentially leading to a loss of
integrity or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the SMU may\nallow an attacker to corrupt SMU SRAM potentially leading to a loss of\nintegrity or denial of service." } ], "value": "Insufficient input validation in the SMU may\nallow an attacker to corrupt SMU SRAM potentially leading to a loss of\nintegrity or denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:39:53.600Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-3001, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46762", "datePublished": "2023-05-09T18:36:23.081Z", "dateReserved": "2022-03-31T16:50:27.869Z", "dateUpdated": "2024-08-04T05:17:42.237Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46778
Vulnerability from cvelistv5
Published
2022-08-09 20:20
Modified
2024-09-17 00:36
Severity ?
EPSS score ?
Summary
Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Processors |
Version: Processor Some AMD Processors |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Processor Some AMD Processors" } ] } ], "datePublic": "2022-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed \u201cZen 1\u201d, \u201cZen 2\u201d and \u201cZen 3\u201d that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "NA", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:20:12", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-08-09T16:00:00.000Z", "ID": "CVE-2021-46778", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AMD Processors", "version": { "version_data": [ { "version_affected": "=", "version_name": "Processor", "version_value": "Some AMD Processors" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed \u201cZen 1\u201d, \u201cZen 2\u201d and \u201cZen 3\u201d that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NA" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46778", "datePublished": "2022-08-09T20:20:12.911867Z", "dateReserved": "2022-03-31T00:00:00", "dateUpdated": "2024-09-17T00:36:13.880Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26353
Vulnerability from cvelistv5
Published
2022-05-10 18:33
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen EPYC |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26353", "datePublished": "2022-05-10T18:33:42.470384Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-08-03T20:26:24.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26327
Vulnerability from cvelistv5
Published
2021-11-16 18:18
Modified
2024-09-17 02:42
Severity ?
EPSS score ?
Summary
Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.137Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:18:25", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26327", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26327", "datePublished": "2021-11-16T18:18:25.899504Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T02:42:07.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26370
Vulnerability from cvelistv5
Published
2022-05-10 18:25
Modified
2024-09-16 22:20
Severity ?
EPSS score ?
Summary
Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: unspecified < RomePI-SP3_1.0.0.C |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T18:25:17", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-06T20:00:00.000Z", "ID": "CVE-2021-26370", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26370", "datePublished": "2022-05-10T18:25:17.618373Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T22:20:14.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12951
Vulnerability from cvelistv5
Published
2021-11-16 18:06
Modified
2024-09-17 01:35
Severity ?
EPSS score ?
Summary
Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:16:35", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2020-12951", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12951", "datePublished": "2021-11-16T18:06:30.578358Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-17T01:35:37.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20594
Vulnerability from cvelistv5
Published
2023-09-20 17:27
Modified
2024-09-25 15:26
Severity ?
EPSS score ?
Summary
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 3000 Series Desktop Processors “Matisse” |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20594", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T15:25:52.143486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:26:01.771Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics \u201cCezanne\u201d ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics \u201cRenoir\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 3000 Series Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors \u201cChagall\u201d WS SP3", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d FP6", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cCezanne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 6000 Series Mobile Processors with Radeon\u2122 Graphics \"Rembrandt\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 7035 Series Mobile Processors with Radeon\u2122 Graphics \"Rembrandt-R\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \"Barcelo\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 7030 Series Mobile Processors with Radeon\u2122 Graphics \u201cBarcelo-R\u201d ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-09-20T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eImproper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "\nImproper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-09-20T17:27:59.742Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007" } ], "source": { "advisory": "AMD-SB-4007", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20594", "datePublished": "2023-09-20T17:27:59.742Z", "dateReserved": "2022-10-27T18:53:39.762Z", "dateUpdated": "2024-09-25T15:26:01.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20524
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
An attacker with a compromised ASP could
possibly send malformed commands to an ASP on another CPU, resulting in an out
of bounds write, potentially leading to a loss a loss of integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:45.864Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An attacker with a compromised ASP could\npossibly send malformed commands to an ASP on another CPU, resulting in an out\nof bounds write, potentially leading to a loss a loss of integrity.\n\n\n\n\n\n\n\n" } ], "value": "An attacker with a compromised ASP could\npossibly send malformed commands to an ASP on another CPU, resulting in an out\nof bounds write, potentially leading to a loss a loss of integrity.\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:54:00.877Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20524", "datePublished": "2023-05-09T18:36:29.876Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2024-08-02T09:05:45.864Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46771
Vulnerability from cvelistv5
Published
2022-05-10 18:30
Modified
2024-09-17 04:09
Severity ?
EPSS score ?
Summary
Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T18:30:03", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-06T20:00:00.000Z", "ID": "CVE-2021-46771", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46771", "datePublished": "2022-05-10T18:30:03.257543Z", "dateReserved": "2022-03-31T00:00:00", "dateUpdated": "2024-09-17T04:09:13.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31347
Vulnerability from cvelistv5
Published
2024-02-13 19:18
Modified
2024-08-16 19:51
Severity ?
EPSS score ?
Summary
Due to a code bug in
Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a
guest to observe an incorrect TSC when Secure TSC is enabled potentially
resulting in a loss of guest integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:31.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-31347", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T19:50:42.676211Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T19:51:32.151Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2024-02-14T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \u0026nbsp;\n\n\n\n\u003cbr\u003e" } ], "value": "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \u00a0\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2024-02-13T19:18:51.045Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "source": { "advisory": "AMD-SB-3007", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-31347", "datePublished": "2024-02-13T19:18:51.045Z", "dateReserved": "2023-04-27T15:25:41.427Z", "dateUpdated": "2024-08-16T19:51:32.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26372
Vulnerability from cvelistv5
Published
2022-05-11 16:18
Modified
2024-09-16 19:15
Severity ?
EPSS score ?
Summary
Insufficient bound checks related to PCIE in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient bound checks related to PCIE in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:18:58", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26372", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient bound checks related to PCIE in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26372", "datePublished": "2022-05-11T16:18:58.798210Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T19:15:19.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46769
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
Insufficient syscall input validation in the ASP
Bootloader may allow a privileged attacker to execute arbitrary DMA copies,
which can lead to code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient syscall input validation in the ASP\nBootloader may allow a privileged attacker to execute arbitrary DMA copies,\nwhich can lead to code execution. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "Insufficient syscall input validation in the ASP\nBootloader may allow a privileged attacker to execute arbitrary DMA copies,\nwhich can lead to code execution. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:52:44.759Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46769", "datePublished": "2023-05-09T18:36:25.695Z", "dateReserved": "2022-03-31T16:50:27.872Z", "dateUpdated": "2024-08-04T05:17:42.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46775
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
Improper input validation in ABL may enable an
attacker with physical access, to perform arbitrary memory overwrites,
potentially leading to a loss of integrity and code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in ABL may enable an\nattacker with physical access, to perform arbitrary memory overwrites,\npotentially leading to a loss of integrity and code execution.\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "Improper input validation in ABL may enable an\nattacker with physical access, to perform arbitrary memory overwrites,\npotentially leading to a loss of integrity and code execution.\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:53:06.367Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46775", "datePublished": "2023-05-09T18:36:26.852Z", "dateReserved": "2022-03-31T16:50:27.874Z", "dateUpdated": "2024-08-04T05:17:42.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26398
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen EPYC |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA ", "platforms": [ "x86" ], "product": "1st Gen EPYC ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26398", "datePublished": "2023-01-10T20:56:40.452Z", "dateReserved": "2021-01-29T21:24:26.167Z", "dateUpdated": "2024-08-03T20:26:24.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26312
Vulnerability from cvelistv5
Published
2021-11-16 17:55
Modified
2024-09-16 17:54
Severity ?
EPSS score ?
Summary
Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "CWE-665 Improper Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:30:46", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26312", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-665 Improper Initialization" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26312", "datePublished": "2021-11-16T17:55:24.198997Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:54:14.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26371
Vulnerability from cvelistv5
Published
2023-05-09 18:59
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
A compromised or malicious ABL or UApp could
send a SHA256 system call to the bootloader, which may result in exposure of
ASP memory to userspace, potentially leading to information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4 |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 series Desktop Processors \u201cRaven Ridge\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d ULP", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPollock\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Mobile Processors \u201cRaven Ridge\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile processor, 2nd Gen AMD Ryzen\u2122 Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A compromised or malicious ABL or UApp could\nsend a SHA256 system call to the bootloader, which may result in exposure of\nASP memory to userspace, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "A compromised or malicious ABL or UApp could\nsend a SHA256 system call to the bootloader, which may result in exposure of\nASP memory to userspace, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:59:16.122Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-4001, AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26371", "datePublished": "2023-05-09T18:59:16.122Z", "dateReserved": "2021-01-29T21:24:26.152Z", "dateUpdated": "2024-08-03T20:26:25.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20592
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-10-11 18:07
Severity ?
EPSS score ?
Summary
Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ Processors |
Version: various |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20592", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T17:51:51.383280Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T18:07:49.421Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": " ", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": " ", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-11-14T18:54:13.255Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005" } ], "source": { "advisory": "AMD-SB-3005", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20592", "datePublished": "2023-11-14T18:54:13.255Z", "dateReserved": "2022-10-27T18:53:39.762Z", "dateUpdated": "2024-10-11T18:07:49.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26345
Vulnerability from cvelistv5
Published
2023-11-14 18:53
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.909Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:38:22.990Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-3002, AMD-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26345", "datePublished": "2023-11-14T18:53:20.979Z", "dateReserved": "2021-01-29T21:24:26.145Z", "dateUpdated": "2024-08-03T20:26:24.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
1.9 (Low) - CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BD7B00D-ECD9-419E-B927-7AD293360BB3", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1053118D-84FB-4126-8558-F731AF578D51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2567B7A7-23AF-4A5E-B5B4-50A15EBF58FA", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10630C1F-3EAE-47EE-AD1C-6C35052B1C51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "214D44A0-2B4F-4C3B-BC77-3388F60BEE21", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91DC33A9-7EE5-443F-A195-5739E25880D8", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E196A8EC-8E17-4394-BBB9-AAC4B773686A", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA6066FB-CE27-447A-B9E3-ECFBB59DF4CC", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D9898-5A45-4F76-89F9-A0E0F9B68195", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6554840-DD72-4CB7-B72B-40F0EB4AAB5D", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EB8E56A-20CD-4722-91F8-A4BC9E629F84", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17C9FDD3-74A4-4848-B6CE-7861658C3A30", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B748EBB3-37A9-4F2A-A4A4-AAEEF56BABC0", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "264D28A9-A104-4333-9094-8251FBF00880", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02967552-68C0-4111-B05D-BC17EFEF37DD", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "310788CD-F880-42FC-A781-4C69B4C1A408", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "910DFF12-DF71-444C-89A0-10CFE6A1BAA4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36F046AD-A8BC-4BE1-812F-99E096779C77", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32FA4160-368C-46AC-A7DD-623CB8CF1F01", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C1AD7A8-7E0F-4EDD-B93F-D4800D54D776", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "948D4C27-EBB2-4578-BE09-2F237B9B8D59", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80BEF1BA-4533-40CA-8DC6-FCB6D9A291C4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BB5D70A-1627-4878-8F12-FB439C2BB2F0", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7AE5260-B45F-4623-B50D-645F4E32A59B", "versionEndExcluding": "summitpi-sp3r2_1.1.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CE0667C-BFD2-4D37-AC09-85C622D74A4E", "versionEndExcluding": "summitpi-sp3r2_1.1.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03DA6F71-51B4-41EA-B2F2-479D6C564ADB", "versionEndExcluding": "summitpi-sp3r2_1.1.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AD9C120-E6DE-4437-A976-FB07F1F58FBD", "versionEndExcluding": "summitpi-sp3r2_1.1.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality." }, { "lang": "es", "value": "Una validaci\u00f3n de entrada insuficiente en el ASP Bootloader puede permitir que un atacante privilegiado con acceso f\u00edsico exponga el contenido de la memoria ASP, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad." } ], "id": "CVE-2023-20526", "lastModified": "2024-11-21T07:41:05.137", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.3, "impactScore": 1.4, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:15.627", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 06:34
Severity ?
3.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Summary
Insufficient input validation in the SMU may
allow an attacker to corrupt SMU SRAM potentially leading to a loss of
integrity or denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.9 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.9 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.9 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.9 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.9 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.9 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.9 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.e | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.e | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.e | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.e | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.e | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.e | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.e | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.e | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.e | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.e | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.e | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.e | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.e | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.e | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.e | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.e | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.e | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.e | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.e | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.e | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.e | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.e | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.e | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.e | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.e | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SMU may\nallow an attacker to corrupt SMU SRAM potentially leading to a loss of\nintegrity or denial of service." } ], "id": "CVE-2021-46762", "lastModified": "2024-11-21T06:34:39.943", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 2.7, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:11.080", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-20 18:15
Modified
2024-11-21 07:41
Severity ?
Summary
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | milanpi_1.0.0.a | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | milanpi_1.0.0.a | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.a | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.a | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.a | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.a | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.a | |
amd | epyc_73f3 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.a | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.a | |
amd | epyc_7413 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.a | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.a | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.a | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.a | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.a | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.a | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.a | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.a | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.a | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.a | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.a | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.a | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | milanpi_1.0.0.a | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.a | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.a | |
amd | epyc_7773x | - | |
amd | ryzen_3_3100_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3100_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3200g_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3200g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3200g | - | |
amd | ryzen_3_3200ge_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3200ge_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3200ge | - | |
amd | ryzen_3_3200u_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3200u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250c_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3250c_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3250c | - | |
amd | ryzen_3_3250u_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3250u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3300_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3300_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3300 | - | |
amd | ryzen_3_3300g_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3300g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300u_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3300u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3300x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3300x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3350u_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3350u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3350u | - | |
amd | ryzen_3_3450u_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3450u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3450u | - | |
amd | ryzen_3_3500c_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3500c_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3500c | - | |
amd | ryzen_3_3500u_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3500u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3500u | - | |
amd | ryzen_3_3550h_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3550h_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3550h | - | |
amd | ryzen_3_3580u_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3580u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3580u | - | |
amd | ryzen_3_3700c_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3700c_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3700c | - | |
amd | ryzen_3_3700u_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3700u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3700u | - | |
amd | ryzen_3_3750h_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3750h_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3750h | - | |
amd | ryzen_3_3780u_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3_3780u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3_3780u | - | |
amd | ryzen_3100_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3100_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3100 | - | |
amd | ryzen_3300x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3300x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3300x | - | |
amd | ryzen_3500_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3500_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3500 | - | |
amd | ryzen_3500x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3500x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3500x | - | |
amd | ryzen_3600_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3600_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3600 | - | |
amd | ryzen_3600x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3600x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3600x | - | |
amd | ryzen_3600xt_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3600xt_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3600xt | - | |
amd | ryzen_3800x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3800x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3800x | - | |
amd | ryzen_3800xt_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3800xt_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3800xt | - | |
amd | ryzen_3900_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3900_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3900 | - | |
amd | ryzen_3900x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3900x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3900x | - | |
amd | ryzen_3900xt_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3900xt_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3900xt | - | |
amd | ryzen_3945wx_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3945wx_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3945wx | - | |
amd | ryzen_3950x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3950x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3950x | - | |
amd | ryzen_3955wx_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3955wx_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3955wx | - | |
amd | ryzen_3960x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3960x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3960x | - | |
amd | ryzen_3970x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3970x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3970x | - | |
amd | ryzen_3975wx_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3975wx_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3975wx | - | |
amd | ryzen_3990x_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3990x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3990x | - | |
amd | ryzen_3995wx_firmware | comboam4pi_1.0.0.9 | |
amd | ryzen_3995wx_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_3995wx | - | |
amd | ryzen_5_5500_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5500 | - | |
amd | ryzen_5_5500u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5560u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600h_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5600x3d_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5600x3d | - | |
amd | ryzen_5_5625c_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_5300g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5300g | - | |
amd | ryzen_5300ge_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5300ge | - | |
amd | ryzen_5500_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5500 | - | |
amd | ryzen_5600_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5600 | - | |
amd | ryzen_5600g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5600g | - | |
amd | ryzen_5600ge_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5600ge | - | |
amd | ryzen_5600x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5600x | - | |
amd | ryzen_5700g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5700g | - | |
amd | ryzen_5700ge_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5700ge | - | |
amd | ryzen_5700x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5700x | - | |
amd | ryzen_5800_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5800 | - | |
amd | ryzen_5800x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5800x | - | |
amd | ryzen_5800x3d_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5800x3d | - | |
amd | ryzen_5900_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5900 | - | |
amd | ryzen_5900x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5900x | - | |
amd | ryzen_5945wx_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5945wx | - | |
amd | ryzen_5950x_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5950x | - | |
amd | ryzen_5955wx_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5955wx | - | |
amd | ryzen_5965wx_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5965wx | - | |
amd | ryzen_5975wx_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5975wx | - | |
amd | ryzen_5995wx_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_5995wx | - | |
amd | ryzen_4300g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_4300g | - | |
amd | ryzen_4300ge_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_4300ge | - | |
amd | ryzen_4600g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_4600g | - | |
amd | ryzen_4600ge_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_4600ge | - | |
amd | ryzen_4700g_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_4700g | - | |
amd | ryzen_4700ge_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_4700ge | - | |
amd | ryzen_4700s_firmware | comboam4v2pi_1.2.0.8 | |
amd | ryzen_4700s | - | |
amd | ryzen_threadripper_3960x_firmware | castlepeakpi-sp3r3_1.0.0.8 | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | castlepeakpi-sp3r3_1.0.0.8 | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | castlepeakpi-sp3r3_1.0.0.8 | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3795wx_firmware | castlepeakwspi-swrx8_1.0.0.a | |
amd | ryzen_threadripper_pro_3795wx_firmware | chagallwspi-swrx8_1.0.0.4 | |
amd | ryzen_threadripper_pro_3795wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | castlepeakwspi-swrx8_1.0.0.a | |
amd | ryzen_threadripper_pro_3945wx_firmware | chagallwspi-swrx8_1.0.0.4 | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | castlepeakwspi-swrx8_1.0.0.a | |
amd | ryzen_threadripper_pro_3955wx_firmware | chagallwspi-swrx8_1.0.0.4 | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | castlepeakwspi-swrx8_1.0.0.a | |
amd | ryzen_threadripper_pro_3975wx_firmware | chagallwspi-swrx8_1.0.0.4 | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | castlepeakwspi-swrx8_1.0.0.a | |
amd | ryzen_threadripper_pro_3995wx_firmware | chagallwspi-swrx8_1.0.0.4 | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_4300g_firmware | renoirpi-fp6_1.0.0.9 | |
amd | ryzen_4300g | - | |
amd | ryzen_4300ge_firmware | renoirpi-fp6_1.0.0.9 | |
amd | ryzen_4300ge | - | |
amd | ryzen_4600g_firmware | renoirpi-fp6_1.0.0.9 | |
amd | ryzen_4600g | - | |
amd | ryzen_4600ge_firmware | renoirpi-fp6_1.0.0.9 | |
amd | ryzen_4600ge | - | |
amd | ryzen_4700g_firmware | renoirpi-fp6_1.0.0.9 | |
amd | ryzen_4700g | - | |
amd | ryzen_4700ge_firmware | renoirpi-fp6_1.0.0.9 | |
amd | ryzen_4700ge | - | |
amd | ryzen_4700s_firmware | renoirpi-fp6_1.0.0.9 | |
amd | ryzen_4700s | - | |
amd | ryzen_5_5500_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5500 | - | |
amd | ryzen_5_5500u_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5560u_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600g_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600h_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5600x3d_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5600x3d | - | |
amd | ryzen_5_5625c_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_5300g_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5300g | - | |
amd | ryzen_5300ge_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5300ge | - | |
amd | ryzen_5500_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5500 | - | |
amd | ryzen_5600_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5600 | - | |
amd | ryzen_5600g_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5600g | - | |
amd | ryzen_5600ge_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5600ge | - | |
amd | ryzen_5600x_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5600x | - | |
amd | ryzen_5700g_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5700g | - | |
amd | ryzen_5700ge_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5700ge | - | |
amd | ryzen_5700x_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5700x | - | |
amd | ryzen_5800_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5800 | - | |
amd | ryzen_5800x_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5800x | - | |
amd | ryzen_5800x3d_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5800x3d | - | |
amd | ryzen_5900_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5900 | - | |
amd | ryzen_5900x_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5900x | - | |
amd | ryzen_5945wx_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5945wx | - | |
amd | ryzen_5950x_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5950x | - | |
amd | ryzen_5955wx_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5955wx | - | |
amd | ryzen_5965wx_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5965wx | - | |
amd | ryzen_5975wx_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5975wx | - | |
amd | ryzen_5995wx_firmware | cezannepi-fp6_1.0.0.b | |
amd | ryzen_5995wx | - | |
amd | ryzen_6600h_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6600h | - | |
amd | ryzen_6600hs_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6600hs | - | |
amd | ryzen_6600u_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6600u | - | |
amd | ryzen_6800h_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6800h | - | |
amd | ryzen_6800hs_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6800hs | - | |
amd | ryzen_6800u_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6800u | - | |
amd | ryzen_6900hs_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6900hs | - | |
amd | ryzen_6900hx_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6900hx | - | |
amd | ryzen_6980hs_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6980hs | - | |
amd | ryzen_6980hx_firmware | rembrandtpi-fp7_1.0.0.6 | |
amd | ryzen_6980hx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "33F2BDAD-D9DE-402A-BBEB-41C19EFE27A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "B41AB8AF-A669-4A38-933D-5FAB958E67CF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "EC3D1223-8686-477B-8510-16F608541ACF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "4A279171-C262-4C9A-8314-D19408F4D054", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "5DE326E6-72B4-4226-A90E-0A6BED5E01B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "3B23F7B0-BAAE-4C1C-9D22-1E474D3CF0DD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "471F2420-E8F3-4952-8AA6-1E5B590E7F5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "A74FE110-68EF-4DBC-9B57-4015F453AEF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "2745C32E-B283-47C1-9800-C1D1F4ACEF9E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "DA0D2AF3-B14D-4532-B2F4-193A69EE3A8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "EC5998E9-1F0D-43DD-ACF1-AEE34F253BF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "F0545C6A-234A-4133-B3FE-E9D1A1F513EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "FB3AAFE9-9374-4694-AF24-64F0D4BCBCE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "CBC11697-137B-49B6-BF15-843F2CDD0A42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "55B14EFA-B243-41F5-88C9-40BCB87E1D80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "1A30ADDE-EFD9-478B-9751-F637D02B4C12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "5339D8EF-AEE2-44DF-9D00-89F7909E46D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "E00019AB-3340-4C22-8C79-A271AAF701BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "82E7795F-4C77-4F47-AD4C-66EB0A3C94C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "74A6B431-B04D-4E92-A737-327E04A23A09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "C686B00C-4210-4D3F-A93B-07E86018D5C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "D20E026B-3777-4442-8FA0-398FD0480F8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "704ABA23-3A06-4A72-8AFD-4DE422E80C7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "52266710-E83D-488F-82FF-C796B294C905", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BAE12B9-A593-44C9-9951-59659CAF6FBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "36F5F2F1-169B-4B91-9EA1-D4BB2A5DB710", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5E4BCB4E-E34B-4876-AEFD-58F8857BCB99", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F0DB09A4-F258-4218-9FBC-313F484B5D83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6DC6C8BE-040E-44BB-920C-98F5092428E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "C6D30E3B-F2E1-4244-9628-FEE5DA4055BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A9E5D46-DB87-4420-9AC6-2ABCB0119E01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "55AB020E-43A0-49F9-AF54-8AC4A3B8CA3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "53C82D63-AEF4-4C12-941D-4762861997C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "EE2B19DB-005E-44F4-97AF-D50724ABBAE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F42197FB-7332-4D19-8E9F-23F46BDD05F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "433E22A9-EBA0-4C64-A3EE-7CAE0286F953", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "71A65A47-1317-4A67-B7D8-5AF24F03B797", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D148EF33-AA16-45DD-AB8E-842A83BEFEA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3300_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "42854ACB-C4E7-4C3E-84F8-F63463CDE1EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "14310E1A-C208-4FE4-959A-E3801B943F07", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "AB5B3752-EFD1-46B9-A96C-4ECD47FF6C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B29E5A8C-AD81-4240-A608-ED3450CF3358", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "FE0891CB-6C1D-4334-9949-20E453AD1C67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "63A722C0-7DA6-444B-9A1A-7A5E74376299", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "6773E368-91CF-43F2-8BA7-C5A9F8470BD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5E924D12-7805-4BFF-869B-63A8122CE56A", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9BD2DED-AA05-46DA-965F-7F3BE5B9F1CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3450u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F4A70274-7D8C-4C36-B2F1-F7825B738755", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3450u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "74E5995D-595D-4297-B1F6-5C2CC1416905", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F7888EB-C587-44BF-95AC-05BE7776B5F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3500c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "995A1E6D-5E2F-4232-9051-C5648FA01224", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3500c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "078A9ACD-7415-42A1-9E98-071A841A1376", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B3D9C3E-F342-4932-8287-844E1963D572", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3500u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3CCB28D3-6B53-4B40-BAB5-EEE590D29395", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3500u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E72E9D5B-19E2-46DA-AF95-D70FDF494C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C84A1505-E6CB-431C-B44D-1E26045F30B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3550h_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1C6F8473-6B9A-4780-9EB3-3C80C2A88FD3", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3550h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "64C32C6D-D84E-422F-A505-24C4ACC590CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "695A2D6B-A46C-475F-809F-B2715A41A936", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3580u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "E47F7EBC-1606-473F-B975-29412B2AA31B", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3580u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "ECEC2EB3-DFD9-4A65-A977-A940D4BA91C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C2CD9B5-7469-4B8A-8653-4C71B00D0D2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3700c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "88FD01D4-0451-40A4-82ED-D5453F7C5339", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3700c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "081A57C5-2BFF-4BAC-9468-7A0EE7C55B7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF7FCAE2-1695-405A-AF62-9C9324BBCE09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3700u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "420EE669-4709-45B4-BC34-6B4422F752BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3700u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0E3D0B40-31BC-405B-B553-F228EB93A587", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "658FF986-FD92-487B-A7FA-43E1F96B0FEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3750h_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4205437E-B366-43AF-9F0E-6B917771A7AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3750h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "2DD6A2F6-50AE-480E-A710-FCA5EFFBAF97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9397E5A5-0694-4016-AEBC-41D7902F9A03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3780u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DED43076-7CDC-4551-B2F5-CC256B85117D", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3_3780u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9D3A61A1-68CB-481B-9A10-8CA14B26F6A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6D51558-9F26-43D3-8BCB-4CD9A3DD7004", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "82432C6B-2A98-4884-B1B3-912998BCC721", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E1297E45-9B94-4607-8460-A2A9E4708714", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "C015E367-8E68-40F0-B1AF-7C61C98E8C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "28B131DD-812D-4B15-A12E-5F2AC87BC132", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F1A8866B-54FC-4161-8E2D-D4C9EF3F9ED4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F0D6F72-608C-4EE5-B666-69418CF56D85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "BD68B857-969C-42E5-B663-E1A14A8C0F2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "FE4EAE8B-3B28-4E7C-BCC5-EB7C81F10B7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "286BEE93-D87A-4715-AECE-088DAE7AA50F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2461496A-4C9D-4F09-9031-7780B4D9060B", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9D0C16BF-7B0D-40F6-B8DE-2649C2AA59FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABCE38CA-AC74-44AA-91F3-9031EB3BFEE3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "EE48C033-B6FF-4CAA-82D2-1266C268631A", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E98AE834-FE26-4E97-97CB-2C847873F317", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "881E03BE-79B7-407D-A258-71387A2F78F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "07860820-0BEC-4E77-80A4-212808C388FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B66B252E-47E1-4CA2-809A-F07B7FBA2C57", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5BFE12C-60BF-48D1-A580-8ED687C9FD64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A7442CCB-01C8-4EC4-90DA-F653001A2044", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "84D28878-5608-486F-BE5D-03C03042AA4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "1696132C-054B-4263-A34E-069DA28F0FE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0729C73A-AFF9-483D-8668-9AFD28FF4E01", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "685B2BE1-B84B-4299-A4FD-B5DAC9BCC7EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "79160DBB-1801-4A42-A37F-873CDFBC87D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D0491027-9353-43C1-927C-9E24674AE2CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B0A81FA7-98D6-479A-ACF0-AC4CA05CE071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4ED8D4C-BDA3-4278-B288-6B4599821F31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "153A32ED-0E61-40EC-A48B-5A0872D4D771", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "738644A6-76F0-463C-880E-189385CB79A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "551D58F2-4CCB-498D-854A-0536EAFCFF96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B70765D1-E9C5-478E-8514-ED186ADCCFDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "FBD7402D-45D3-4306-87F6-ED5960102EB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AE379C7-EE6F-46F7-A787-26EB7343D733", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "71726BA2-DA3A-4B39-9CB5-F2B1E2112F4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "477091B3-0454-4AD0-8CAA-ADF26F832EA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB763AD-4D9C-44AA-90A3-225E579FF1A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3945wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "58267B59-FCBE-4AE6-8543-C61B0EFAAF73", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3945wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "A35D9D22-4979-443B-ABBD-8D8E40513FB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBDB6866-7C3D-4EB2-B000-F166585F4AA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "E1C74B15-7443-4E43-ADC7-726AAFEABF48", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7693D322-4846-4DB0-9FB4-D8E85B4663F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "560E511C-5D2C-4DEE-B955-FA21F310CA0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3955wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "EB6666A7-5FBC-44AE-93C7-390B7AD98899", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3955wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "156316E6-7402-488A-B1AF-1330762F7D34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "C59F960F-D975-4CFF-96F1-E15C1A1A89C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3960x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B7838D82-80A9-45BC-9257-A048FA32CCF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3960x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA5F9-93DC-4F28-9CA9-BAAB135CAEF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB68A0C0-E575-4AA0-A312-8B1933085C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3970x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "178209EC-D206-4E58-8271-E0F5E2050810", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3970x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F0B664C7-FC58-408F-9C9A-A5DF56D36FCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB67C763-72E9-4E0D-873A-04220C3583C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3975wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7A6E7C59-8EF7-4528-BF3E-9DCB932BEC73", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3975wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E1A2FEF2-627A-4A8D-A84C-C3A10ECF4B67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2AAD377-B60E-4EF5-BE1F-944B19CAA02A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3990x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "36213007-7403-43B0-B72F-A910BDA65F95", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3990x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "A53D810E-5174-4D32-AB09-CDBBE4F2C670", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E682064-7B94-46F1-A906-20482941B80D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3995wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DF7AED6B-6E59-4D30-8BB7-097D2A2EC77B", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_3995wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "A17E1510-028A-45C1-A88E-81B9494D0BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DAA0D7A-E918-419D-BC89-65AA9E136C30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "97FFF3B2-7A27-40AB-93F0-49B5BE7DD94C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9A85FDD4-D1CA-4D45-8617-CCC0EAF1789B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F1A16A9F-E40A-456E-B0C8-8C5ED31604BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "8F25C9C6-300A-475D-9902-A1E9B3220DB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F647CAED-7FC5-4EC8-BF20-A3837F79B25D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0C682396-5BCA-439C-9074-C38D67EC2405", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D484F4C6-4773-4A46-8F6B-E2359C5B2B9E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "4C4871C8-9F18-4971-A83E-5CA9D96C5446", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "301511C4-D774-4088-A3F6-0F5FB6876CDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9300C196-41AD-4250-9734-E709066874A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EC547660-B5FB-4392-80E7-6CC16E03139F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "5423F6D1-DA8B-4960-B87B-FA03C3539EDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B9669BBE-1423-41A1-824D-44DF9F865BEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "07B0851C-3909-4E2A-B0D4-595124B6E265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "242DD3F8-014D-4993-9DBD-D2C9370C8029", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "646EE796-D98E-4C2C-87B7-483EB2EA9372", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D263E6A7-382E-4CF6-B746-F7FF9E22C11C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "A97F5DA1-328C-4A1C-80BC-78A8E93ED95B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "8E2654E0-A8BD-4A36-ADF3-1EEFA2030A8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB24DB1-A6E6-4628-B35E-08F2AD2775C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48415287-EEF4-483B-AB16-CB5B5DA66205", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC9F829-1987-48BD-B77D-CF2DCFA0EB63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "59F5ACA5-CF77-47B0-8352-949CABA86260", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "5FB22FA5-2404-4D86-8CE6-645E54901820", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7CB7B879-4412-4741-B455-584F361D04FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "4766DC5E-C43C-4A05-A278-60A6B53AA19B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3D8E75D7-1501-4343-AD41-0990597B58E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "2E208BA5-537A-4CC8-9102-CC88A4F076CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2FC8D5-A4CC-433F-AC14-D2EF1971A36E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B4FCA8DE-70E7-4E59-BC04-CAAF3AC364DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF250F8D-F113-49D5-BC25-A0BA9FD403FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F5B794D3-A606-4B42-9BC6-5A6A962802FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7AB3E8AD-E1E6-42E4-A17A-3A6E835E8185", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5900_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "744F3E6A-1B66-4ADC-9378-5DF6E584C68D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "485A41D3-D266-4FBB-B381-DF585957D3AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "2F63947D-1928-450B-9EC8-FBC3D40A2BC5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5945wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3350665F-B04D-45BF-8198-2A325ACF5994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D541CC0A-DBAC-440C-80A1-DBE153D7E0B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BB4398B0-6FEF-4A68-936D-E1C5F9BE7C95", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5955wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "1C42CD96-2211-4EE6-8579-9FC04496D6DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0AD18B6-091C-4017-9448-2F0A3EBA70F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5965wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "52FEE5F7-31B2-4103-9953-8E0C2D1654B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "797DAA58-A85C-433D-91AC-28A9F2AB3D60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5975wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "5D4ACD8D-E8DC-48AF-BB4D-9DC35EFBDFBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC0E50CF-D4EA-430D-B4FA-491F59B09A73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5995wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0678ED23-62CD-4FCA-8C08-58398E50A6D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "608C1128-2346-4D64-9030-EAE4EB41D285", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4300g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "349C4C97-7BC7-4D46-8625-F621448CCCC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C49FF17-B382-4573-916F-1BC91CEC7D24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4300ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "863B3916-5BEA-4B8B-9EDC-EFB2463F8626", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E18DAAB-84F8-464C-8051-BB9A6A48B83C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "6305628E-38B3-463F-9FB5-11E51D8E0BB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "832FEAC3-D1AF-4577-81E6-DC370D90D754", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4600ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F99C178D-27C5-4A8E-A6E5-CF24EFA3A13A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "87C277ED-941B-4C53-B2C3-8A779B084DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4700g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0569AAFC-11BC-421E-902D-55A78D3EE541", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "343DAC16-B8BD-4071-A743-4803C2359B28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4700ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3740F43B-402F-4C4E-9015-7476DA662D30", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADA33D7-EE0D-4394-86F3-58AF452A2C0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4700s_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F5699D63-3186-45AE-9AD8-C0909A763FAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C1D755E-9826-42EA-AA8C-B955BF1F9A90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3A21279D-029C-4FCE-A7AE-71E4017328B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "DE01A55D-0B9B-4E62-A72A-50674B984AC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "242BCD75-F7A3-4B89-B308-3F5079784AE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "889F40F5-0F37-4302-A8E0-49B2B79F1FEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "60FAC9B3-756C-4439-923B-CFD25238CBCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "999E4DF0-1D58-4E29-AC8D-1163A700D381", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A0D98038-B6C2-4D2D-957E-B699DAC0CCC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "3F25978A-68A2-4BED-B050-3ABE062A259D", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "AA5BBB9D-E831-425A-AB61-5B73F54682C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "5CA57874-D930-454F-83E5-59A8898CDC58", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "BF37F375-AB8B-4096-B3B2-38771128ED62", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "matchCriteriaId": "86CB47C4-C71A-4ABB-9C01-DD5E967B15B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C7BE32B7-462C-4ED1-82A5-BAF01A51B922", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4300g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "000AD784-1278-454E-98D1-C46B033DDB73", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C49FF17-B382-4573-916F-1BC91CEC7D24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4300ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "73C7E0BA-988C-4F94-9E16-D2EA4CBF4936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E18DAAB-84F8-464C-8051-BB9A6A48B83C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4600g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "131FB2A5-D65E-4B46-871F-EA8D1B70B716", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "832FEAC3-D1AF-4577-81E6-DC370D90D754", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4600ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "03F2EC33-49DB-4A17-BF3B-F274BFB909AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "87C277ED-941B-4C53-B2C3-8A779B084DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4700g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "43BC81D0-FCBC-46A5-8778-7E0B3BC825AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "343DAC16-B8BD-4071-A743-4803C2359B28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4700ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1EDC877B-CB19-483E-872F-BABBB4D20E0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADA33D7-EE0D-4394-86F3-58AF452A2C0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_4700s_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "E30293DA-9162-457E-833B-8186312974BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_4700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C1D755E-9826-42EA-AA8C-B955BF1F9A90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "E92C93E7-97E2-4009-8A7D-263ACB5580E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "F6A21632-DDA0-47AA-ACF8-34E3B43535CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "C328BCF1-97B5-4FBE-BB7B-EF522703A205", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "B71BD155-477C-4BF9-AE70-7A1B941CA6E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "1C31491C-AC11-4303-A2E0-96242EA896EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "613717A1-E9EE-48C9-AD8C-080E067D8D62", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "4BAA38A1-6646-4916-89BF-6E83EB66F8C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "A9B2C90F-67B5-4B50-A3B5-D822C6CD5680", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "C9622794-C04F-4FBC-8738-6CABE12B7998", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "46D00959-3AB1-452D-994F-A9C5A9361214", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "CA8E4790-4D2F-444E-8DE6-C178CAF1C897", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "5423F6D1-DA8B-4960-B87B-FA03C3539EDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "B7F390C0-B691-49C9-999C-B733BC0AFC57", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "2C6EE1C8-4AE3-4FB0-9B88-141FD074BCDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "DB769827-52EC-4785-8BE1-1CD8212F96A3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "32254962-A459-4860-9A86-487C201C714E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "43FC8BF2-5EBC-4F0B-91F4-9EB68ABE951E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "6D800464-E2F7-4A31-8A71-01E481E4A6F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "B9E5E4C5-A406-4E62-84B9-8CC5EEE0CD5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB24DB1-A6E6-4628-B35E-08F2AD2775C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "0E45877D-45C6-47BA-8F76-65E9F2DA1D6F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC9F829-1987-48BD-B77D-CF2DCFA0EB63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "2EC47758-8D39-4EC7-80F0-B2F5FA8EC791", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "F40523C5-44BC-4830-895C-887210275CC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "D24082BA-B1AC-46E8-9662-765C4ABA335D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "D28BB08B-8236-4BCD-880E-61C54945F0A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "9A3F1372-0C34-4098-AF1F-5240CB6802C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "DB566834-A1ED-4450-8EBB-D104F0942992", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2FC8D5-A4CC-433F-AC14-D2EF1971A36E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "9C0A775E-8BA7-4298-A39B-F50273C565FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF250F8D-F113-49D5-BC25-A0BA9FD403FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "0FA594D8-C503-4891-A7C3-8CD7DD43F56E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "E723001B-699A-4CEF-88BF-B0368D847592", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "78817551-2B84-4113-B6B1-6C4682F2F960", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "485A41D3-D266-4FBB-B381-DF585957D3AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "50D5D913-84CE-44B2-8233-F3687CEF75DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "45510BA2-4D56-4196-8F0A-3D9224FE4AA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D541CC0A-DBAC-440C-80A1-DBE153D7E0B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "A335198F-5E71-4DDF-9E1B-CDA128FB4472", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "C8239463-AA83-44AA-886F-8D77751FE447", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0AD18B6-091C-4017-9448-2F0A3EBA70F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "F2F03661-613B-43D0-B13E-1F75D8D25B36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "797DAA58-A85C-433D-91AC-28A9F2AB3D60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "05C61057-0481-424C-B891-02913C01AAD7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC0E50CF-D4EA-430D-B4FA-491F59B09A73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "matchCriteriaId": "3C26EB8C-9323-4F42-BE10-1FF670A02DE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "608C1128-2346-4D64-9030-EAE4EB41D285", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6600h_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "04EE9F72-C8DC-40DC-A922-E666F9FC92D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D56DC44-0323-420B-9DC7-1865589ECEDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6600hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0342C673-DF44-4428-BF11-322010E47CD4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2414CBD-EC69-4763-8137-7EB5194651DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6600u_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA070123-3EA4-4316-8D03-C09336B57CC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DDEE4BF-2AB6-4701-A0AB-0A133E467D9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6800h_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "F5D3BD21-E142-451F-99C1-C23AFE8E2995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF3D1705-1B38-4DF8-BCF9-F385708BB6EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6800hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "617C8E2C-1FB0-4713-88C5-156B229CC412", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "F03245A6-D7B1-475A-969F-8FC0A3139B53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6800u_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CB0EB290-2245-490E-9A7D-87E080AC29DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "63D88016-5C47-49F3-8620-8AB4D714C8AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6900hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "55F4DC53-7228-4354-A2BF-0544FC87C7D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB534AF6-D5C1-49D0-8FF3-80C88DC8485C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6900hx_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "A4D4DAC0-EE83-4E37-AA2C-ECCDF16DE263", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3B23291-EC4B-4B0E-A7E1-497786A69213", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6980hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "66D4E374-168E-4348-9ABD-7D93E38CD61D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0A15D23-13F1-4C7E-A7C9-2EF44EA561DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_6980hx_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DA667ACC-CB9A-43CB-AA25-3AB25C8953B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_6980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3007574-E0B6-454C-8A97-4BFEEFFB5F4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nImproper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "La inicializaci\u00f3n incorrecta de variables en el controlador DXE puede permitir que un usuario privilegiado filtre informaci\u00f3n sensible a trav\u00e9s del acceso local." } ], "id": "CVE-2023-20594", "lastModified": "2024-11-21T07:41:11.453", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-20T18:15:12.187", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-08 18:15
Modified
2024-11-21 07:41
Severity ?
Summary
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | http://www.openwall.com/lists/oss-security/2023/08/08/4 | Mailing List | |
psirt@amd.com | http://xenbits.xen.org/xsa/advisory-434.html | Third Party Advisory | |
psirt@amd.com | https://comsec.ethz.ch/research/microarch/inception/ | Exploit, Third Party Advisory | |
psirt@amd.com | https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html | Mailing List | |
psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ | Third Party Advisory | |
psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/ | Mailing List | |
psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/ | Mailing List | |
psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ | Mailing List, Third Party Advisory | |
psirt@amd.com | https://security.netapp.com/advisory/ntap-20240605-0006/ | ||
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005 | Vendor Advisory | |
psirt@amd.com | https://www.debian.org/security/2023/dsa-5475 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2023/08/08/4 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://xenbits.xen.org/xsa/advisory-434.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://comsec.ethz.ch/research/microarch/inception/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/ | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/ | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240605-0006/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5475 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | fedora | 37 | |
fedoraproject | fedora | 38 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
debian | debian_linux | 12.0 | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5900_firmware | * | |
amd | ryzen_9_5900 | - | |
amd | ryzen_9_pro_5945_firmware | * | |
amd | ryzen_9_pro_5945 | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | * | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_7_pro_5845_firmware | * | |
amd | ryzen_7_pro_5845 | - | |
amd | ryzen_5_5600x3d_firmware | * | |
amd | ryzen_5_5600x3d | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_pro_5645_firmware | * | |
amd | ryzen_5_pro_5645 | - | |
amd | ryzen_7_5700_firmware | * | |
amd | ryzen_7_5700 | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_3_5100_firmware | * | |
amd | ryzen_3_5100 | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge_firmware | * | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_5_5600g_firmware | * | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge_firmware | * | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_3_5300g_firmware | * | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge_firmware | * | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_9_7950x3d_firmware | * | |
amd | ryzen_9_7950x3d | - | |
amd | ryzen_9_7950x_firmware | * | |
amd | ryzen_9_7950x | - | |
amd | ryzen_9_7900x3d_firmware | * | |
amd | ryzen_9_7900x3d | - | |
amd | ryzen_9_7900x_firmware | * | |
amd | ryzen_9_7900x | - | |
amd | ryzen_9_7900_firmware | * | |
amd | ryzen_9_7900 | - | |
amd | ryzen_9_pro_7945_firmware | * | |
amd | ryzen_9_pro_7945 | - | |
amd | ryzen_7_7800x3d_firmware | * | |
amd | ryzen_7_7800x3d | - | |
amd | ryzen_7_7700x_firmware | * | |
amd | ryzen_7_7700x | - | |
amd | ryzen_7_7700_firmware | * | |
amd | ryzen_7_7700 | - | |
amd | ryzen_7_pro_7745_firmware | * | |
amd | ryzen_7_pro_7745 | - | |
amd | ryzen_5_7600x_firmware | * | |
amd | ryzen_5_7600x | - | |
amd | ryzen_5_7600_firmware | * | |
amd | ryzen_5_7600 | - | |
amd | ryzen_5_pro_7645_firmware | * | |
amd | ryzen_5_pro_7645 | - | |
amd | ryzen_5_7500f_firmware | * | |
amd | ryzen_5_7500f | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | * | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | * | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | * | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | * | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | * | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_7_5700u_firmware | * | |
amd | ryzen_7_5700u | - | |
amd | ryzen_5_5500u_firmware | * | |
amd | ryzen_5_5500u | - | |
amd | ryzen_3_5300u_firmware | * | |
amd | ryzen_3_5300u | - | |
amd | ryzen_9_5980hx_firmware | * | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_9_5980hs_firmware | * | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5900hx_firmware | * | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900hs_firmware | * | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_7_5800h_firmware | * | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | * | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5825u_firmware | * | |
amd | ryzen_7_5825u | - | |
amd | ryzen_7_5800u_firmware | * | |
amd | ryzen_7_5800u | - | |
amd | ryzen_5_5600h_firmware | * | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | * | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5625u_firmware | * | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5600u_firmware | * | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5560u_firmware | * | |
amd | ryzen_5_5560u | - | |
amd | ryzen_3_5425u_firmware | * | |
amd | ryzen_3_5425u | - | |
amd | ryzen_3_5400u_firmware | * | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5125c_firmware | * | |
amd | ryzen_3_5125c | - | |
amd | ryzen_9_6980hx_firmware | * | |
amd | ryzen_9_6980hx | - | |
amd | ryzen_9_6980hs_firmware | * | |
amd | ryzen_9_6980hs | - | |
amd | ryzen_9_6900hx_firmware | * | |
amd | ryzen_9_6900hx | - | |
amd | ryzen_9_6900hs_firmware | * | |
amd | ryzen_9_6900hs | - | |
amd | ryzen_7_6800h_firmware | * | |
amd | ryzen_7_6800h | - | |
amd | ryzen_7_6800hs_firmware | * | |
amd | ryzen_7_6800hs | - | |
amd | ryzen_7_6800u_firmware | * | |
amd | ryzen_7_6800u | - | |
amd | ryzen_5_6600h_firmware | * | |
amd | ryzen_5_6600h | - | |
amd | ryzen_5_6600hs_firmware | * | |
amd | ryzen_5_6600hs | - | |
amd | ryzen_5_6600u_firmware | * | |
amd | ryzen_5_6600u | - | |
amd | ryzen_7_7735hs_firmware | * | |
amd | ryzen_7_7735hs | - | |
amd | ryzen_7_7736u_firmware | * | |
amd | ryzen_7_7736u | - | |
amd | ryzen_7_7735u_firmware | * | |
amd | ryzen_7_7735u | - | |
amd | ryzen_5_7535hs_firmware | * | |
amd | ryzen_5_7535hs | - | |
amd | ryzen_5_7535u_firmware | * | |
amd | ryzen_5_7535u | - | |
amd | ryzen_3_7335u_firmware | * | |
amd | ryzen_3_7335u | - | |
amd | ryzen_7_pro_7730u_firmware | * | |
amd | ryzen_7_pro_7730u | - | |
amd | ryzen_5_pro_7530u_firmware | * | |
amd | ryzen_5_pro_7530u | - | |
amd | ryzen_3_pro_7330u_firmware | * | |
amd | ryzen_3_pro_7330u | - | |
amd | ryzen_9_pro_7640hs_firmware | * | |
amd | ryzen_9_pro_7640hs | - | |
amd | ryzen_9_7940h_firmware | * | |
amd | ryzen_9_7940h | - | |
amd | ryzen_7_pro_7840hs_firmware | * | |
amd | ryzen_7_pro_7840hs | - | |
amd | ryzen_7_7840h_firmware | * | |
amd | ryzen_7_7840h | - | |
amd | ryzen_7_7840u_firmware | * | |
amd | ryzen_7_7840u | - | |
amd | ryzen_5_pro_7640hs_firmware | * | |
amd | ryzen_5_pro_7640hs | - | |
amd | ryzen_5_7640h_firmware | * | |
amd | ryzen_5_7640h | - | |
amd | ryzen_5_7640u_firmware | * | |
amd | ryzen_5_7640u | - | |
amd | ryzen_5_7540u_firmware | * | |
amd | ryzen_5_7540u | - | |
amd | ryzen_3_7440u_firmware | * | |
amd | ryzen_3_7440u | - | |
amd | ryzen_9_7945hx3d_firmware | * | |
amd | ryzen_9_7945hx3d | - | |
amd | ryzen_9_7945hx_firmware | * | |
amd | ryzen_9_7945hx | - | |
amd | ryzen_9_7845hx_firmware | * | |
amd | ryzen_9_7845hx | - | |
amd | ryzen_7_7745hx_firmware | * | |
amd | ryzen_7_7745hx | - | |
amd | ryzen_5_7645hx_firmware | * | |
amd | ryzen_5_7645hx | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
microsoft | windows_10_1507 | * | |
microsoft | windows_10_1607 | * | |
microsoft | windows_10_1809 | * | |
microsoft | windows_10_21h2 | * | |
microsoft | windows_10_22h2 | * | |
microsoft | windows_11_21h2 | * | |
microsoft | windows_11_22h2 | * | |
microsoft | windows_server_2008 | - | |
microsoft | windows_server_2008 | r2 | |
microsoft | windows_server_2012 | - | |
microsoft | windows_server_2012 | r2 | |
microsoft | windows_server_2016 | * | |
microsoft | windows_server_2019 | * | |
microsoft | windows_server_2022 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA80E2CA-F643-4181-B64C-BFD012DE1EEC", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59044C37-26AE-4F1E-922A-E220CE4884BB", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5BD9C12-1B7B-4213-906C-0F20EE02686C", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0FC666B-47C6-4EAD-8399-5DE3469D5157", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AD7AE84-3299-4C99-97A2-4159086FBC61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B633C0D-5FB9-48AD-A512-FF65477B3135", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB4906EF-7250-43D4-A3BB-E7025179BF04", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50117943-6DEA-41DE-9695-A45BBFB99D8E", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8F12A2D-4CFF-4AAD-B6A8-54585F2B9043", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BDF36B9-B57F-44FE-BEE7-43069B2D2CD7", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*", "matchCriteriaId": "342D9BCB-5C64-426E-8546-7D38C4DE6288", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68406DC8-5B8D-4A89-9B4D-F3CB9E25B032", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "5423F6D1-DA8B-4960-B87B-FA03C3539EDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23CD69BD-F783-4151-9B03-A62E9400D116", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A74A3D-FC39-46B9-A544-1E5A51B05351", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58647F0-4E83-4857-A49A-E1CC1450BEB8", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0D0239-0550-4B9C-9342-916B5462F791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C94E09E7-7699-47D0-814B-E01D7FEABCF5", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB1E8B8A-649C-4C2F-A8E1-C39815512F2B", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E04578E-7580-463F-BAB0-49A9ECF048C7", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8576A19F-AC8F-457B-8EA5-651B552ED0F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E77C9FB-419C-4AFB-83C0-D3BEE8C372D6", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10F0BE72-B95C-45FA-92CF-7976B96A31F4", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "491AF1F4-1807-4536-ABC3-FD2F9FB94C70", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89B72122-7F69-4541-831D-17360565E6B9", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DACCE645-BF3D-45CF-A1F7-7157CCA4FFD9", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4027487A-01D9-47D1-8467-B8390B95935D", "versionEndExcluding": "comboam4v2pi_1.2.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "773D55A1-8EB8-4C16-91F9-6EB953AD5952", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05C8669-6348-4A1B-B1D4-D22022E1F67E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D5BE0C1-1ACC-4CEF-849A-5916B2AE2B1F", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECFFC31E-CD28-42E6-8FAD-F6349D6EF9A0", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "86CAA682-9666-4929-B1AC-D9DB3109DB1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCB0B5D-5D10-4AA0-AB8E-EB10D2590C3B", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA666DF3-C5F3-4127-A8EE-B784DD41F642", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2A5832B-E4EF-439B-999B-28F9EB1500D1", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5602B902-9FDB-4946-BE4C-236262285F2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24FC993D-CBBE-424D-92FB-5F8BE029EF85", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3DE32CA-168F-4812-AEAE-D771EB01E15D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C67DA4B-EFFA-4C1C-AA92-6942D963A9B7", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA6CD984-A8C7-4B23-8FF9-896C503EBA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83012AC9-9A24-469C-8B7E-741B14D7379D", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "225E8405-04FF-4885-92C8-8581ACC66E06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B92B0C31-572D-4FE0-AA5C-5E40ABC9CA45", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "76121981-8DC2-4779-833E-4B15CFCF7FC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87ECCD10-31FB-45BB-AED9-9C94E714B799", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", "matchCriteriaId": "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "895B3038-56A8-4E59-BC9D-E8568B2FF4BC", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C05D51F-469D-487D-9FC8-E1AD699A6F74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C9554CF-9FAE-4F4B-AD61-7AC50A289B5A", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6740A06F-4512-427D-9CB9-A4A6DB046BA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAE63027-A73F-43E6-B667-44F3B8D120B2", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2787C72-42D5-42B0-BE5B-E548B319BCF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FACBACEC-0BD8-4E74-93E4-4AC4CF193290", "versionEndExcluding": "comboam5_1.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", "matchCriteriaId": "1232B034-1214-4F9A-823D-DC76D5C5956B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E47DE060-45D0-4703-B9FD-D45E90276B66", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "815DEC82-52E2-4CAB-88E3-FF00E35D0A20", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E576F58F-4E66-4EF4-8E69-71F94D34955C", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0FA0121-4245-483C-AEDE-4F3EDFD49E52", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A57E99DA-DFB6-4D64-AA53-28209E47039B", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45AB5F8E-1357-498B-B86C-676E7E8D1D60", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24A0A2C9-8B74-4AEF-8BC7-157B1BEF4B8A", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6405E0B-FC0A-440E-B59A-8234883C1BA1", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44A1DB8C-EEE4-40E6-A5F1-B0969DCEFC70", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35954F0F-8BCF-4070-B89F-CD96993909C2", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF79D918-2FFD-4ABA-AF94-57338B9C742C", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A2C3D9A-4DD0-4538-B248-CD2A90FC0198", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "075717AC-01F7-4FF2-94CA-C49EEA15ACA9", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E24CD07-3BD0-45EA-BEC7-1FD74914DB67", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2BD1F51-6D87-4D1E-A67A-09E42185B108", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75B064-737F-4750-817B-A46244C60EF0", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1638CF0C-047A-45D0-B522-E022055A5C1B", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35D5BE39-5678-4742-8545-4B77F638933A", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FCD9CE1-26B7-4589-93C8-800543FCCA1D", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B2E0FA6-17D1-4F31-8BBA-D799B6193A72", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "691CF38C-BE0A-41B6-B0D9-555C3889F375", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DBA2870-E8E3-40E8-9CE3-2D4E0AA7689D", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5E06C18-3F26-4FBB-929E-CC3FC5E430BC", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "367AB427-A2E0-4AAA-898D-051E37021A33", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDFD9B8E-8321-443D-9887-E79D5F5DF25C", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17D72983-2F49-4B46-8627-129823FBF0FA", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1DA08DC-16C4-490B-9041-748328303C92", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C64DE1-DEAB-49AB-9586-705C8789F898", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1638E21-FA6B-43BB-A852-745B7E3E2D57", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE87BC83-9726-48D6-9B3F-3907D0A85D58", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F740D54E-289F-4812-9BDC-88F0EC73EBB4", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3470DDF-5647-48B8-9576-41DEC0793377", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "381CDFB7-F091-4EA8-8850-71BE1387F246", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "179F30A4-958B-4857-B11D-6FD0A2F6D1BC", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8383A5AC-6870-4DC4-BE3E-39298B5972C3", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_7736u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70EB1DB9-C6DB-40B4-BC68-087A90D7EBB8", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D50E8EA-ECB2-463D-BA51-D13CF5A02266", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_7735u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E4310D-A980-465C-9DF2-2EE5D93FEDA3", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1893BB4F-77A6-4048-AEAA-61C92958C32B", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE36D471-57BF-4385-A825-029F7313E4DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_7535u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C8A16-B6D4-4F6D-AB3E-C1EBE4F56512", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", "matchCriteriaId": "082BE536-F29C-4A73-B030-A19DD3A448B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_7335u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24D61C84-9AEC-400B-AAA5-C8F5AF5D021C", "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", "matchCriteriaId": "495E436C-B0EE-4B72-AB49-332F4752C140", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50ED8913-F725-4A67-84B6-9F0F0B636F5E", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", "matchCriteriaId": "29805A0A-1E52-4545-9D41-B9A1EE571778", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D5FD5DB-D500-442B-B1AF-BCB88F3FF978", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C822A153-C32B-423B-8660-EAE0A1DEB4EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31A63A5D-1495-404D-820A-D16CB89A63CE", "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*", "matchCriteriaId": "86704116-43D0-47FD-8896-AB00C265AAE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_pro_7640hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E339576E-062A-4C93-AA5D-1F8E0E2ED693", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7640hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "D306FF3F-87D0-48BF-93EA-733896DBB8A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_7940h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76F008FC-D32F-4923-93FA-23B00E2E88BE", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A7E6806-A7AC-4C96-960B-B8934CEA2439", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E28301E7-9423-4E2B-8E8F-FE05B760F35A", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8480A7E0-882C-4B03-ADBC-697304B0B7C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_7840h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F55A6F8-E8C1-4DEE-BCCA-BC86748409C9", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2D0429F-F186-4F78-9AE0-574E3A39926D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_7840u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EC28C1E-9EA4-40E5-9493-620277FB6B40", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53225D2B-EAE1-4772-A8FC-2AE107B20836", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E3657C6-1047-4CA9-8D44-C7143F7D877D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_7640h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7030541-E143-4885-B24D-ECE18FBC2B16", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_7640u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877037A7-FDA1-4147-BAEC-228E25A177DD", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BC5E111-A7AA-4A45-A2E3-47013F9135D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_7540u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "532D67C0-B127-4F99-9D0C-8F7CDD71FEA0", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*", "matchCriteriaId": "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_7440u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "584DA20B-8E0B-4572-9134-5F7E47D99190", "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_7945hx3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4862DE44-922F-4983-B7BE-6CB80B7CD0A8", "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "82CCEE11-392D-4486-A6AD-CB64FB8B7081", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_7945hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B152085B-B26F-4A19-A450-85E15781FBED", "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "74DD4A40-B712-4B54-9CC7-0BFD79E917BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_7845hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "312F52E6-0224-4B9A-BAF2-047F7230B871", "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD27234D-ACFC-4144-8980-2B706822C579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_7745hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6506B081-C9F6-4C13-85D0-341B5E6C35C3", "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "69289284-2ED2-4D8B-8AE2-B835AAF31EAD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_7645hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717556C1-D45C-4C71-B5C8-6D90CF9A8432", "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5D5B25-F32A-493E-BD54-57098981E15A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DC71137-5861-4413-AE37-FBA5EA15CD84", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB947EC3-B3CF-4E35-86C1-DDD831D4518D", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB9F211-8998-44FF-91FE-723BA6315B85", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3A4256B-4211-4A15-B33C-743A4898CB76", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DCADA15-DE56-4993-977D-5BE701476D46", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF7D4F3A-CE7A-4C84-B872-E1206912AD62", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFEA67F1-83B8-461D-8066-91BBD3FD9E24", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B86A8C8F-BEFC-439B-A712-E931CC229708", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6651DED0-FD67-406B-845A-553ABBBCCB02", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "025B7A4B-0CF9-401E-AF18-3581CD04BDB5", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F64D3037-AC84-411D-AF23-2B6E49C26896", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBC1FE8-F91B-407A-B4DC-C3EE38676828", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00B84AD1-3F32-46B5-88D1-50CE43844977", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10654574-BACF-41D7-8B2D-73E2E0CBFBFB", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC29525-306B-4E29-A846-8439487042D6", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC6AF23-8DE0-4402-B707-F9DC3E83B906", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C45FD0CE-4B69-4C95-9EA1-575736A55045", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEDA7A65-34F0-454C-9040-A7024DB82D6C", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46DA46A4-B52A-4DE2-9D15-A6CFA8100626", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B65F0EE-B8BD-47C1-B018-40304328111E", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38872F0B-9FEC-4FFF-B23A-0363563B363D", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCB8097F-A467-4F0F-A4A9-DBDC1A8D64E4", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "763B1559-1F1F-499E-AA99-3D985FE29B30", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0552FCA-39A4-440C-974D-58DA3B7DA1A4", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22CAB170-3ED4-4D5E-8B3B-CE8D4BA9B3D5", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B66B44E-2DEC-46C1-9083-C0E27FCE9B7F", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59B9F850-7916-4CBE-B823-9933A726B345", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7B16A0E-1188-4FD9-9E69-B8F4DD33ED3D", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71545221-A01F-4C17-A3FA-C124137212AB", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C3CEB6D-0B14-44AA-87B5-1FDFDEC1F8A2", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1F9F957-1FA8-41D5-B9BC-429B217DCBBF", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBBA0738-1981-4E82-90C8-676C50404E21", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA7824A-CDDF-49FC-8982-86BD72EBF93E", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7634433-80B0-4007-A968-FE6210F13981", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D2A24DF-73EB-47DA-AE17-727743CF1F77", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DAD9B0E-BFA4-447F-B24C-A0BA9325F20C", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DADD9549-3769-4F4A-A898-9BDFF892A8F5", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40A82ECB-1839-4DD5-AC35-E0D598790900", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABA02A3E-81B9-4A81-BE29-C4A829B13BC3", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D548FCE5-7B25-490C-B777-1202EA6F18E2", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "742306EC-A9CB-43C4-BC82-4E657FB38623", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0060C2B-DD7A-4886-859A-5A6FCEA9A758", "versionEndExcluding": "genoapi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B6341EE-9F08-41F4-AAC9-69FCFD57AA29", "versionEndExcluding": "10.0.10240.20107", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "matchCriteriaId": "27D3DBDC-310E-41F1-A2B2-F0D3B09E1C25", "versionEndExcluding": "10.0.14393.6167", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "matchCriteriaId": "412DCA62-8009-40C3-B76C-F3791104F0C8", "versionEndExcluding": "10.0.17763.5206", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6873B3B-E106-4E56-B8EC-5D5A6EEEA5B5", "versionEndExcluding": "10.0.19044.3324", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "72882593-8B44-4DF3-A6A1-8EFE2D7BBCF6", "versionEndExcluding": "10.0.19045.3324", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "32AAA0B2-DF17-4CFA-851E-6B31C11DD38C", "versionEndExcluding": "10.0.22000.2295", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "478EF06F-1EF8-45B5-981F-79159BFD709F", "versionEndExcluding": "10.0.22621.2134", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6C6551D-670F-4EA1-84B5-70BEE90A0C46", "versionEndExcluding": "10.0.14393.6167", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "matchCriteriaId": "812E15CB-8BBE-47D6-9837-E3144A5F5485", "versionEndExcluding": "10.0.17763.4737", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "matchCriteriaId": "A975F8A8-D539-4F16-8185-328703B8120F", "versionEndExcluding": "10.0.20348.1906", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "Una vulnerabilidad de canal lateral en algunas de las CPU de AMD puede permitir que un atacante influya en la predicci\u00f3n de la direcci\u00f3n de retorno. Esto puede dar lugar a una ejecuci\u00f3n especulativa en una direcci\u00f3n controlada por el atacante, lo que podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2023-20569", "lastModified": "2024-11-21T07:41:08.533", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T18:15:11.530", "references": [ { "source": "psirt@amd.com", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/08/08/4" }, { "source": "psirt@amd.com", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-434.html" }, { "source": "psirt@amd.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://comsec.ethz.ch/research/microarch/inception/" }, { "source": "psirt@amd.com", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "source": "psirt@amd.com", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" }, { "source": "psirt@amd.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/" }, { "source": "psirt@amd.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/" }, { "source": "psirt@amd.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "source": "psirt@amd.com", "url": "https://security.netapp.com/advisory/ntap-20240605-0006/" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005" }, { "source": "psirt@amd.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/08/08/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-434.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://comsec.ethz.ch/research/microarch/inception/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240605-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5475" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 06:34
Severity ?
Summary
Insufficient input validation in the SMU may
enable a privileged attacker to write beyond the intended bounds of a shared
memory buffer potentially leading to a loss of integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.9 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.9 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.9 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.9 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.9 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.9 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.9 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.e | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.e | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.e | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.e | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.e | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.e | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.e | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.e | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.e | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.e | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.e | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.e | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.e | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.e | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.e | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.e | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.e | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.e | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.e | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.e | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.e | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.e | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.e | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.e | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.e | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SMU may\nenable a privileged attacker to write beyond the intended bounds of a shared\nmemory buffer potentially leading to a loss of integrity.\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-46763", "lastModified": "2024-11-21T06:34:40.117", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:11.123", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5300g_firmware | - | |
amd | ryzen_5300g | - | |
amd | ryzen_5300ge_firmware | - | |
amd | ryzen_5300ge | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_5600g_firmware | - | |
amd | ryzen_5600g | - | |
amd | ryzen_5600ge_firmware | - | |
amd | ryzen_5600ge | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_5600x_firmware | - | |
amd | ryzen_5600x | - | |
amd | ryzen_5700g_firmware | - | |
amd | ryzen_5700g | - | |
amd | ryzen_5700ge_firmware | - | |
amd | ryzen_5700ge | - | |
amd | ryzen_5800x_firmware | - | |
amd | ryzen_5800x | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5800x3d_firmware | - | |
amd | ryzen_5800x3d | - | |
amd | ryzen_5900x_firmware | - | |
amd | ryzen_5900x | - | |
amd | ryzen_5950x_firmware | - | |
amd | ryzen_5950x | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_pro_5350g_firmware | - | |
amd | ryzen_pro_5350g | - | |
amd | ryzen_pro_5350ge_firmware | - | |
amd | ryzen_pro_5350ge | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_pro_5650g_firmware | - | |
amd | ryzen_pro_5650g | - | |
amd | ryzen_pro_5650ge_firmware | - | |
amd | ryzen_pro_5650ge | - | |
amd | ryzen_pro_5750g_firmware | - | |
amd | ryzen_pro_5750g | - | |
amd | ryzen_pro_5750ge_firmware | - | |
amd | ryzen_pro_5750ge | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_pro_3200g_firmware | - | |
amd | ryzen_pro_3200g | - | |
amd | ryzen_pro_3200ge_firmware | - | |
amd | ryzen_pro_3200ge | - | |
amd | ryzen_pro_3350g_firmware | - | |
amd | ryzen_pro_3350g | - | |
amd | ryzen_pro_3400g_firmware | - | |
amd | ryzen_pro_3400g | - | |
amd | ryzen_pro_3400ge_firmware | - | |
amd | ryzen_pro_3400ge | - | |
amd | ryzen_pro_3600_firmware | - | |
amd | ryzen_pro_3600 | - | |
amd | ryzen_pro_3700_firmware | - | |
amd | ryzen_pro_3700 | - | |
amd | ryzen_pro_3900_firmware | - | |
amd | ryzen_pro_3900 | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "833B79C9-7F23-4CDB-8B9B-3699E43B9AE4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74FA8650-B46B-4034-85DA-AC568B517D37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "80F2BF6E-E3B0-456D-ABC1-A8687C6E8CA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D32F62EA-D89E-4F30-8ABA-4887EC82EEF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58F07C72-3C8F-493D-A94E-4FEDD43936D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A60E8FD3-F6E4-42FB-96C3-B07D597560AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93E2C9E-66AA-433B-ADB8-A6AD4F0C9A80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34D0CF3A-54CC-42A0-9075-6923EB3023A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "888D3667-BBD7-45E5-BA38-37D0A007408D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E11988B-5467-4585-9A95-AD3C7E0480F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7522E8A-74E4-42D8-9B6C-DD1FB6C4CE65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5350g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A150494-C143-44BA-8AA8-348D145C1EE0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5350g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE04DA51-EAE2-4D3F-9480-03DBCCD44E4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5350ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49D44CE-0494-405A-8DC7-92B982A64943", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5350ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E0677A0-E13B-4A45-A280-D835E74D191F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5650g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2DFE4DB-D2B8-4885-BB20-05214218E986", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5650g:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3C69416-4F96-44EB-B117-F3C99CE75A69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5650ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBFC849E-949F-4F0F-8FF0-4B1B3112E857", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5650ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "54637AC1-FE05-4AB5-A358-15A2E36F7472", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5750g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF7AFD1-3FB3-4FF2-A8D2-AA1426C260A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5750g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5E5A7D-C42D-41E8-8FFD-D27F91BFA516", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5750ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81942F9B-9D81-4F6A-B155-0ABB302E9DAA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5750ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED62FB0-4ED8-472C-9267-2F90B0970401", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_3200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDC0F908-6B59-4FFF-890E-1BCA7C427766", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA9DE186-D8E8-47BC-B601-F5D3F66F66A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_3200ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "763E5352-513D-438E-8F6B-61B21AD96FBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_3200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A9B80AB-F2A5-4541-839A-BC68B3566F02", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_3350g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "096CEE2A-8623-4BCC-B6E9-4ECE2E0F0855", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_3350g:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B026242-29E0-43FE-832D-B8AF03793531", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38396B07-A94D-459A-AA87-EEF17570C30E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B492DD9B-DDB0-4C36-BCBA-D42BA01726B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_3400ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22F14358-F9B2-45DC-916D-94E2B3037214", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_3400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8066679-77B1-4A36-852F-5A5E7C59E8A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7B822-ADF6-4292-9204-C1AA1A7E2396", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "A66BAFE5-96CE-4859-B1F7-BA452FEA3D48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_3700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "284BB905-170E-440D-B6A4-F3842A04FB9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3B9C6C9-E877-40A5-942C-A874A3041028", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82911836-078F-4CA9-A90B-D24F7C37F389", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB7B70E0-0F62-4472-B89C-5EAC66531A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests." }, { "lang": "es", "value": "Una comprobaci\u00f3n insuficiente de la direcci\u00f3n de la DRAM en System Management Unit (SMU) puede resultar en una lectura DMA desde una direcci\u00f3n de la DRAM no v\u00e1lida a la SRAM, resultando en que la SMU no atienda m\u00e1s peticiones" } ], "id": "CVE-2021-26337", "lastModified": "2024-11-21T05:56:08.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:08.380", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient bound checks related to PCIE in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0094538-161A-4877-9247-EA6DD83C9E54", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5841138E-BDAC-4F59-9BC8-9313A49DBECB", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAD73E1A-C4E6-4ECA-907C-99F84DBC7765", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FB232-0930-4F05-A4EC-D06DBED8E54A", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21B5752-F187-4BA9-94E8-C6525C7824A2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5EA931-ED74-4086-B9A9-9F1A9A359590", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E603AC01-F362-4B2E-9A08-DF2C24A49DDD", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F384C3-11D5-42EB-BF44-A6707358E063", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0A9A96-25CF-47AC-9AF3-96725B3863E4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E3EC-4358-4A82-807B-BBA7F03D5884", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA8E2F-2E73-47AD-B671-A952B9A4BFD6", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62B278C-BF08-4CC2-A843-1888AEF37638", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88713545-D2E4-47CC-8F5F-EAEE0CF53BF2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E4971-594B-4D1E-AFD5-D6B8A8B8F8A8", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "576BF517-1021-48AA-A065-305A50F9645D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B6DBC4-F298-45E1-90FF-A87AEA06810E", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08067DB-AD49-4B3D-BCBB-A4C9A7D9E7F4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B1F0A4-655A-44B9-87C0-B8A8F95B2BE0", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFDB2131-CDC3-463D-958F-0BF8D0FF5EA2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED75D47-160E-4E80-ADC6-4F84748231D5", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45F46F-A3C0-4FA4-BCB6-DD1A8DC0E190", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bound checks related to PCIE in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service." }, { "lang": "es", "value": "Unas comprobaciones de l\u00edmites insuficientes relacionadas con PCIE en la Unidad de Administraci\u00f3n del Sistema (SMU) pueden resultar en un acceso a un espacio de direcciones no v\u00e1lido que podr\u00eda resultar en una denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26372", "lastModified": "2024-11-21T05:56:14.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.547", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9B075FD-7DCA-4FA6-94CA-50135093FDCB", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3A8CA97-418C-47FA-B2D6-8366ABECF4FC", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1662EDB-2E2B-4AB5-BD7B-6D5DF88366BD", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "529531D7-0C7E-49E5-882D-782ED63F4B4D", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78C090AE-76BD-4EAE-A8A2-85E4B4EDE11E", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE1AEEEB-8ABF-46AE-8821-D00501B77354", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41688F63-8B56-4875-82E5-F8D31F8EA6F1", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A816BE56-A986-4460-9F9D-FE2DF3D4E2DA", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A6367A3-C160-47D8-9E59-C7C143B1EDA2", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FF2F8E4-C40E-4340-9904-CA73E47277C8", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68415A9D-8795-4EAE-B058-0881D5009067", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77070835-6E8F-4BCC-8CA2-E9E5BA63BD94", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECB858E9-2C6E-4FBA-8AB8-840015B2EFB1", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C885-5914-4B85-8E87-6324E0723E8F", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "434E12D6-885D-4E57-BA0D-F9E8D8EEB435", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C01EAFF9-60D9-40AC-9F02-0ED93C931BF5", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C67B8C1-6CAD-4018-806A-4E70E861C89E", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFAD987E-3B64-4E6B-80EA-F85E0F75652D", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEA5AD7F-77CF-4C58-B3D7-7147BA72618C", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2C84D88-13F0-4B1D-A0C1-DD0CE6FCCBB2", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2788E8F7-0A82-4653-9D3F-49EB651A028F", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "099071F5-F923-4321-94D2-4F16DF2E6071", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FBF709-4399-470E-91BB-E17D309DA22B", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C118D307-3212-4509-A947-34A36390CB5F", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.\n\n" }, { "lang": "es", "value": "La comprobaci\u00f3n de los l\u00edmites insuficientes en el firmware ASP (AMD Secure Processor) mientras se manejan los comandos del buz\u00f3n del BIOS puede permitir que un atacante escriba datos parcialmente controlados fuera de los l\u00edmites de las regiones SMM o SEV-ES, lo que puede provocar una posible p\u00e9rdida de integridad y disponibilidad." } ], "id": "CVE-2021-26402", "lastModified": "2024-11-21T05:56:18.433", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:11.537", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution." }, { "lang": "es", "value": "AMD System Management Unit (SMU) contiene un problema potencial en el que un usuario malicioso puede ser capaz de manipular las entradas del buz\u00f3n de correo, conllevando a una ejecuci\u00f3n de c\u00f3digo arbitrario" } ], "id": "CVE-2021-26331", "lastModified": "2024-11-21T05:56:07.273", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:08.197", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service." }, { "lang": "es", "value": "Una comprobaci\u00f3n insuficiente de la entrada en el comando SNP_GUEST_REQUEST puede conllevar un potencial error de aborto de datos y una denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26325", "lastModified": "2024-11-21T05:56:06.257", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.920", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:00
Severity ?
Summary
A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification." }, { "lang": "es", "value": "Un efecto secundario de una opci\u00f3n integrada en el chipset puede ser usado por un atacante para omitir las protecciones de la ROM SPI, permitiendo la modificaci\u00f3n no autorizada de la ROM SPI" } ], "id": "CVE-2020-12954", "lastModified": "2024-11-21T05:00:34.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.480", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-693" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_threadripper_1900x_firmware | - | |
amd | ryzen_threadripper_1900x | - | |
amd | ryzen_threadripper_1920x_firmware | - | |
amd | ryzen_threadripper_1920x | - | |
amd | ryzen_threadripper_1950x_firmware | - | |
amd | ryzen_threadripper_1950x | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39B10F2F-6796-4267-9664-C6C68B8EEA47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "304C61BE-2438-49EE-A581-4A4EEC2923E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "807AA72C-4BC8-4A02-B158-98C52648AA09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B92717AF-0F69-4A7D-BC06-B0E287AA8008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF47017-569D-4333-8F2D-A6C1D1EE166E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "82854E42-76EC-4428-9975-B5FBC8DC6FF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components." }, { "lang": "es", "value": "Una comprobaci\u00f3n de l\u00edmites insuficiente en System Management Unit (SMU) puede causar accesos/actualizaciones de memoria no v\u00e1lidos que podr\u00edan resultar en el colapso de la SMU y la consiguiente incapacidad para atender otras peticiones de otros componentes" } ], "id": "CVE-2021-26336", "lastModified": "2024-11-21T05:56:08.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:08.323", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:49
Severity ?
1.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB9C77FA-9807-4233-BE30-9275ADEF6930", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4960A6A2-CEAB-4970-A1B8-9ABA220ACBE6", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4ADE7FD0-2BE7-4928-A556-5831C7CEA16D", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E95DA74-848F-4036-9A79-35D29ECE3D09", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93A27BB9-F55D-43A4-A439-5D5773057B3B", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A46BF53F-F940-44A1-9E0B-068677C4AC90", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECB7FCFC-A27A-4656-967A-517F591BB3C8", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90030672-613B-4252-922D-7F26D2FCA877", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EFBA5F7-E9BE-4EDB-BD4E-D4316B0D945A", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F21FC32C-DDA2-4804-9EDA-C9BEB18C9AC6", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DAF542F-040B-4681-BCEA-E4F1F99ABD00", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3710FCB-CAF1-4BFE-A984-0C46BA27F9BF", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EC0604A-D5DA-4966-AF48-EBAB46F1BD61", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E087AEC-06E1-4A95-A644-7587331DEE55", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED6C058-3CE9-4E68-8FBF-19942D6678F6", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53BDC783-1492-4A3A-B75E-DA98B366D43D", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8937722-6B70-42F4-913F-55881066C571", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3857E72-56F0-426D-A9AD-60B5711CE5DB", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C3F794-B9D2-4BDA-ABB4-397C8B074B30", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDC6D4D7-F7DE-4B35-AE48-C20A86CB56B2", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB1C6B4C-0A4A-4F47-B22A-9B070C3834E7", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6521FCD8-ACD3-4EFC-881D-C82AFBB57100", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93096670-AB65-461B-AD8C-725B525AB2D0", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A7CE606-63D1-488C-BCCE-37098C57BBB9", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE8D62F4-A1FE-4865-ACE3-22E621873085", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A95DADE-44C0-4A3B-8ED9-9F32CEFE28C4", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04468F0E-494D-43F5-898A-FBBF60CBDEF5", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92561B70-9884-461C-B493-437BC64DE56A", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "229D581F-A875-4E50-9C70-4978F4213110", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A239F9E-D957-43B9-BE84-925E034C7D1B", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86181C40-CBE2-4AAC-A853-F36372372D41", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF54712-9455-453E-82C6-A64209D2F1D8", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7340146-AF63-444A-915D-DC78E509C8D8", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BF77B4F-61B5-4F13-9724-A085329D6827", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E35B55E0-0EBD-4232-B24D-D8D9B10540A5", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C00B3DBF-DF5C-4B22-B945-9B2A0E04946C", "versionEndExcluding": "genoapi_1.0.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB3B006E-3930-4DD8-9E4E-1B520DB45535", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30013429-BC7F-4A52-A7AB-49FE91F6C5CE", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3D1AF4-E79F-4B8B-ACD1-286A1CF354E1", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30C1D9D9-875C-4841-9B32-48344DEA077D", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E8D2D9C-20CD-48C4-AA06-365D78250058", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "285125AF-8AA5-437E-AF78-F2625D9136A2", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F6E8DC7-2E57-490D-B32D-E1F33BB36839", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7FAFC36-0BCA-43CE-B22B-65C98C748315", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C9015CD-8EDF-4D8E-A582-D04DD2425887", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4680D11-F4E7-4F76-93AB-EF6183D024A2", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB47A44F-26AF-42DC-B388-C2A84B95C8FE", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "204719EA-FF4B-4674-B270-1790035594A5", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F523DAE-2F55-4822-92A1-218AA886313B", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AC49F14-804A-480A-BA66-373C00606F98", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B12BD5A2-3A94-4016-BDE1-F268AB8A142A", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C61B330-4DD0-47E7-ACEC-0871EB497DF4", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C0E4DD8-E76E-4938-9680-64C70A2FE378", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA9F63C2-A774-4B4C-BDD4-1F374AABCC81", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FCBCFE9-D650-4149-871D-4F4597198C6C", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E88129DB-E22D-4AB3-8A0C-4F067711C767", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBE8BBCE-3D9F-4F8E-AEB8-1FCBA3FF0D87", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33CAD962-9D64-430A-A1DC-15B05B4670F0", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2FEC040-4236-4E6D-85D5-BB52E5A81B5B", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A9166CC-1C29-430F-B766-7408B3F47855", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91DAAC8F-AF6C-4146-BCFE-1DCE96D49644", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEAE9F6D-54F8-46B6-BB04-6EA9E46CE742", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0218786D-D198-44BE-9CA2-FCD1B622BD9E", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F21B87C3-72D1-4CEC-8D63-58E38C741AA1", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB0AE5AB-0490-453A-9D27-81DE5F08CE1C", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity." }, { "lang": "es", "value": "Es posible que la configuraci\u00f3n de SMM no sea inmutable, como se esperaba, cuando SNP est\u00e1 habilitado, lo que genera una posible p\u00e9rdida limitada de la integridad de la memoria del hu\u00e9sped." } ], "id": "CVE-2022-23830", "lastModified": "2024-11-21T06:49:20.293", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 1.4, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:10.570", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP" }, { "lang": "es", "value": "Una comprobaci\u00f3n insuficiente de la clave de firma de AMD SEV (ASK) en el comando SEND_START en el firmware de SEV puede permitir a un atacante local autenticado llevar a cabo una denegaci\u00f3n de servicio de la PSP" } ], "id": "CVE-2021-26320", "lastModified": "2024-11-21T05:56:05.443", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.750", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 07:41
Severity ?
Summary
Improper access control settings in ASP
Bootloader may allow an attacker to corrupt the return address causing a
stack-based buffer overrun potentially leading to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.5 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.5 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.5 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.5 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.5 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.5 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.5 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.5 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.5 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.5 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.5 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.5 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.5 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.5 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.5 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.5 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.5 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.5 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.5 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.5 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.5 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.5 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.5 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.d | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.d | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.d | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.d | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.d | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.d | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.d | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.d | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.d | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.d | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.d | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.d | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.d | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.d | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.d | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.d | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.d | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.d | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.d | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.d | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.d | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.d | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.d | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.d | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.d | |
amd | epyc_7h12 | - | |
amd | epyc_7251_firmware | naplespi_1.0.0.h | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | naplespi_1.0.0.h | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | naplespi_1.0.0.h | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | naplespi_1.0.0.h | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | naplespi_1.0.0.h | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | naplespi_1.0.0.h | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | naplespi_1.0.0.h | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | naplespi_1.0.0.h | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | naplespi_1.0.0.h | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | naplespi_1.0.0.h | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | naplespi_1.0.0.h | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | naplespi_1.0.0.h | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | naplespi_1.0.0.h | |
amd | epyc_7551p | - | |
amd | epyc_7571_firmware | naplespi_1.0.0.h | |
amd | epyc_7571 | - | |
amd | epyc_7601_firmware | naplespi_1.0.0.h | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9420AA3C-1389-4EC6-8723-71CD968164AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8A3DA4E8-BEC3-433F-8B12-27B66D454431", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "651FB077-E9EF-47A2-BDA8-289FF8438024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EB28D336-462E-4D27-BA14-6EDAC33931DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "43997A61-1AC6-450F-B166-990841C6F5EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B0955CB1-B3CF-4B7A-AB74-99FC274332C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "085B7E03-F5FB-4150-85E9-BBFBB0DCEE3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF484B3C-7524-4348-9CB2-D99F22CF6886", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "50898ED8-B85C-4D83-A644-724BB191FF40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1E34454-36D9-4D32-8169-15285A40BD75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "03B28F55-D809-4646-8BB8-516CD4749834", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFCEA8-B8E5-401B-BA03-9A65FD380A29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F01BA258-C253-4219-8E1D-1C7530AD0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8D7A4FEB-54D6-4C62-B454-832FE97063DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "4EE9DFEE-0DBA-45E4-BA36-5110B6056B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F54E341F-1813-462D-BC0A-E995C746FC6F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "6F6DB6F7-5129-4143-9D0F-60DCF9112FA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC0BE1-5C1E-47C4-8E2D-873682C15CD0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "727A3552-D7B2-4C2A-BCCD-0ED2CE45BDF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7A10ED7C-9F22-4A5F-B4F8-9E24F2778D65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "627C5574-97A4-4E72-8A79-C3E41E9209EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "733D1FEF-9AC5-4C77-9EBA-D091DB9F53CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8B69D-AD1E-4326-9669-885425E685FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "E55E16BE-9B36-4477-B4F0-E197E79560FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "C47625A7-BDF4-4653-83D4-40DB810B3CC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "FE3D15EC-6C51-46CD-AE03-CE6EB1EE77EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "69DE49E5-5B1B-4875-9B67-6A39F8FA377F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "7A013CE0-DE2F-41E5-91B9-41B02C42E768", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "7DF8C725-8D7A-407D-9A41-716126EA9D71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "1DE9300B-6E29-4668-BF96-2FD986106554", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "917220AB-3C21-4F35-99DE-6959BE14621A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "0D59157D-6FBA-4390-9F40-C51FCC14B723", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "DF460FEC-F283-4632-B449-31D3712AF5B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "768297D5-8BAC-4236-B13C-AFB079063C59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "2873869A-A588-4598-A717-9F4311E626F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "8A6780DE-3615-4364-9485-B7992B75ED0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "807809D3-941E-44E5-95E1-0D880AA13EBE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "F17A8498-094D-4149-BF31-5024A0ABD6C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "BB1289A7-8547-48F2-80A5-0A672A107716", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "F20E9089-C518-4745-9F7B-A74FFED8CFC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "88AEBF95-52F0-4C20-9285-38F6F85A21C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "A938510C-A874-4E5D-9375-544821B7DA91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "6F682D91-D0EA-4EEC-9440-5331FA5B38F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "BBFBF2BA-E6CB-4D35-8631-70D16377DFFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "3F2CBBB5-843E-4EAC-957F-A5EC9FB0EC61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "3D4CADA0-E30F-4C55-B6EA-A8D597D0E1EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "DF423A7A-E843-42A4-9320-A13838B3D33A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.d:*:*:*:*:*:*:*", "matchCriteriaId": "B8CECF80-791B-4D6D-98C2-1B02CED1D832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "9D33FF94-5649-49EB-952C-1C3F714FE238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "573E7062-6CBA-4E9B-92C2-EECCDFB94120", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "3D199D11-C7CD-4ADE-95D4-5A3509E3B1EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "D88CA43A-C004-41F0-8F29-689F29E08219", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "46EC10B9-75F6-43BE-8764-169EDCC20D58", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "69817995-C3AB-479F-AF7E-B6294988C2DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "4231D6B1-2FBD-4891-8D48-E7B7E576379A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "1BF1A8AC-5EBA-4577-A2A6-C9B41863AC79", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "FA414F47-6E1D-47EB-AECC-4162E7D9B84D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "B229965B-1B66-40EB-84CE-F776EFB95B5C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "01690FC2-A6C2-41C0-9746-666CC836613D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "F9F89C10-8E43-421C-84A6-4B9BCB9A5F6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "9412E8D7-2540-4D47-A5C2-3A3E9FF1BDF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7571_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "1A558D9E-B38F-4447-8359-E0756F9D23FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7571:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3CF0651-A320-40D1-986F-D2790488929E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:naplespi_1.0.0.h:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD812D-3147-40EB-9BB2-40B03EB14650", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control settings in ASP\nBootloader may allow an attacker to corrupt the return address causing a\nstack-based buffer overrun potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n" } ], "id": "CVE-2023-20520", "lastModified": "2024-11-21T07:41:04.147", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:11.507", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 05:56
Severity ?
1.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10DE39E7-BCB0-4F09-BB25-24175500D7A4", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A23447-6743-4C3C-8F21-4B2C13BB3A03", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25790CE9-54DC-4DDE-BB67-3BAA0B8DD9A8", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AC182FF-E9B3-4CA0-882D-D314CA659DB8", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F548D1-8F12-47B8-BD01-96558C87D6E7", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F10020FB-E050-44B7-BEA8-DDE8838CBE5F", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D03802CA-8832-4A82-93E7-36ED73C724A6", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D0AF119-379D-4B7D-9D9C-ECA882402723", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B7F1C85-BEA5-4B60-A085-C9A8AD61B0E1", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E8DC6B7-B129-472D-8DC2-C0233B677DFD", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECCE34B-5BD7-44C4-B9C4-3E42977B2976", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4FBC28E-C7D7-486E-B7DB-79859292B25B", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B90E852B-A939-4C58-B25E-866E707004D3", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BD0878E-EEDA-4E0F-8186-A571D7651C6D", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00089249-EC6A-4A5C-95E6-61654EF8B63B", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E79244B-D0E9-41C7-A7AF-5C02105B4391", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38B95A87-CFA3-4F61-A9A6-D59A4FFCBAD5", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A99739A-179C-4E6B-AA6B-D0BE4A62C20D", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE9FB7B5-1106-4762-A346-CEA40263F232", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B17487-075F-47AE-8B1E-31621E8CE89F", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C32CD5CE-6216-4BB1-8C5A-773F19D40F41", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "035F2E73-01BF-460A-B781-82AEACCA1ABD", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A2B6750-0689-4547-B97F-0B876CFC7B03", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB602241-CC7E-415C-900C-C5BEC39768CA", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D844AE-628B-433D-9D22-1D501992A231", "versionEndExcluding": "romepi_1.0.0.f", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB0AE5AB-0490-453A-9D27-81DE5F08CE1C", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F21B87C3-72D1-4CEC-8D63-58E38C741AA1", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0218786D-D198-44BE-9CA2-FCD1B622BD9E", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEAE9F6D-54F8-46B6-BB04-6EA9E46CE742", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91DAAC8F-AF6C-4146-BCFE-1DCE96D49644", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A9166CC-1C29-430F-B766-7408B3F47855", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2FEC040-4236-4E6D-85D5-BB52E5A81B5B", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33CAD962-9D64-430A-A1DC-15B05B4670F0", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBE8BBCE-3D9F-4F8E-AEB8-1FCBA3FF0D87", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E88129DB-E22D-4AB3-8A0C-4F067711C767", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FCBCFE9-D650-4149-871D-4F4597198C6C", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA9F63C2-A774-4B4C-BDD4-1F374AABCC81", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C0E4DD8-E76E-4938-9680-64C70A2FE378", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C61B330-4DD0-47E7-ACEC-0871EB497DF4", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B12BD5A2-3A94-4016-BDE1-F268AB8A142A", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AC49F14-804A-480A-BA66-373C00606F98", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F523DAE-2F55-4822-92A1-218AA886313B", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "204719EA-FF4B-4674-B270-1790035594A5", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB47A44F-26AF-42DC-B388-C2A84B95C8FE", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4680D11-F4E7-4F76-93AB-EF6183D024A2", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C9015CD-8EDF-4D8E-A582-D04DD2425887", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7FAFC36-0BCA-43CE-B22B-65C98C748315", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F6E8DC7-2E57-490D-B32D-E1F33BB36839", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "285125AF-8AA5-437E-AF78-F2625D9136A2", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E8D2D9C-20CD-48C4-AA06-365D78250058", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30C1D9D9-875C-4841-9B32-48344DEA077D", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3D1AF4-E79F-4B8B-ACD1-286A1CF354E1", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30013429-BC7F-4A52-A7AB-49FE91F6C5CE", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB3B006E-3930-4DD8-9E4E-1B520DB45535", "versionEndExcluding": "milanpi_1.0.0.a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1006C8E0-57F5-41C2-8D93-57E0C5B334B8", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C62779A-AD1A-4163-B112-598E31D2B53C", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F67D569-24A8-4FD5-A446-FEC0FF1385C7", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B456C747-612C-4BF9-B412-41A383653A8C", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB4B5325-45DF-4C38-B1B0-119B921B2E73", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1DCBA4-2BF7-4B9D-86C3-ECCDF73EB1E3", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB88585E-B79A-465A-B94A-B5AEA932EDE2", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1C5AC7-5757-47AB-92C0-F26AA4DEC82C", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FDBB6C9-ECBB-4499-909E-0032E2A8E4E0", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D17E0ABE-03A0-4DF3-9225-8C82E616AA4B", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22B828D9-81F0-4E41-9F2D-BEB335819B9A", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "587904B8-34E0-4D1D-A62B-2BE8B4BF76EF", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8895C80-61C1-4568-B16A-1CAC1C86CCA5", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CA979BF-A827-48D0-9B6D-16870457E43B", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DADBE68-A5A9-4A6F-81E9-48A124E521DA", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A93FE19A-582C-4094-862F-5092B1C0104F", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73627617-3435-4277-BEC9-3C4146D212A6", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79EE59E9-84AC-441B-9437-CD764664B2B0", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E6F01A4-71D3-4F6F-91B7-965F4C760595", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB9564E5-0C30-4C4C-A8CE-740D39F00B0F", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "950FEFA7-3D82-493E-BB56-D9438CB78545", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81C91375-9065-4259-A268-5CDB9F4FEDAD", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC85C0D-3B22-4DF8-91C1-E70366B6E9EB", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:.", "matchCriteriaId": "1CCE3A33-1B05-40AF-B853-A58B035E675C", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "607853F9-9355-47CE-8B8B-532293661F32", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "634BFB98-7DF6-4CAA-B525-DDDF74A8487E", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DEFE393-61D0-4148-9947-9AA0FB14464E", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C993F09-67DA-450C-AEF3-A9A3705C472D", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA87365-25E7-4622-998F-F7C6E031FA8A", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32A70EA8-2473-42A4-A606-028F856A645A", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6AC9673-7A2F-4F33-A4CC-CF0D5D48A61A", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "925C930E-0875-4401-AD79-CFC4C81D6600", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D44266D5-181A-420C-BEC5-3D9FC30BD8B8", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0C76B7B-B530-4465-BA5A-370339877BAE", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FDB378F-D980-4CFD-8DE8-00C979E33848", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA512C1-8FBC-4488-9A93-DA3A8C2E8C59", "versionEndExcluding": "genoapi_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service." }, { "lang": "es", "value": "No validar el valor en APCB puede permitir que un atacante privilegiado altere el token APCB para forzar una lectura de memoria fuera de los l\u00edmites, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2021-26345", "lastModified": "2024-11-21T05:56:09.803", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 1.4, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:10.190", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient address validation, may allow an
attacker with a compromised ABL and UApp to corrupt sensitive memory locations
potentially resulting in a loss of integrity or availability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "263AB8A4-3F7B-438F-808D-742FCCA4C51C", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71C28200-421A-4CAB-9D6A-D05C9F56A4FD", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "425EC5D5-CF0C-416F-91DA-0BC6EF24237A", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F821EFAC-1FDA-433E-880B-3B5E165708BE", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9DC9C16-E1C3-4A45-ADF6-17F0A763CB41", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5804A608-E90A-4EA3-9FE3-48B839B250F0", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FC3377B-6BE5-4044-9FBB-73CD0BF511F3", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A788DBB-D426-4200-BFF6-85DB621D0081", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BC50066-6F94-4D7C-A13F-D2AC82D0F78D", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B07E5CE-AF11-4604-AA3D-389A93BA4A04", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE405A6E-591B-4071-A85A-CA0E58A20C5B", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9208F862-3ECD-43F6-932F-3B12BAB90A3B", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF7B3F45-D6F0-4C1A-B119-8BA44721DD29", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5810391D-A9D5-4143-88C3-768FC209DEB5", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD06657-B191-42D9-A617-253116A94214", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DD1876D-FA52-416F-AE70-46501E485BDE", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D11F267-D5DF-46A8-8835-8D204A8090E2", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7940013E-9F28-463B-AE85-CD1D9C191322", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F17D48A-00D1-45C1-9235-9889561E5A5E", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "420022FB-EF46-4D78-B9A3-C21F16895F1B", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3F2ADB-9CBA-4F23-BB30-26D7DD096EC5", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0EB4211-6B22-4B04-93EC-BAE8E0515548", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3490F5BE-9886-4596-B79C-C79B70822C6D", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient address validation, may allow an\nattacker with a compromised ABL and UApp to corrupt sensitive memory locations\npotentially resulting in a loss of integrity or availability.\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-26397", "lastModified": "2024-11-21T05:56:17.807", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:10.903", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-05 16:15
Modified
2024-11-26 19:13
Severity ?
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_embedded_7313_firmware | * | |
amd | epyc_embedded_7313 | - | |
amd | epyc_embedded_7313p_firmware | * | |
amd | epyc_embedded_7313p | - | |
amd | epyc_embedded_7413_firmware | * | |
amd | epyc_embedded_7413 | - | |
amd | epyc_embedded_7443_firmware | * | |
amd | epyc_embedded_7443 | - | |
amd | epyc_embedded_7443p_firmware | * | |
amd | epyc_embedded_7443p | - | |
amd | epyc_embedded_7543_firmware | * | |
amd | epyc_embedded_7543 | - | |
amd | epyc_embedded_7543p_firmware | * | |
amd | epyc_embedded_7543p | - | |
amd | epyc_embedded_7643_firmware | * | |
amd | epyc_embedded_7643 | - | |
amd | epyc_embedded_7713_firmware | * | |
amd | epyc_embedded_7713 | - | |
amd | epyc_embedded_7713p_firmware | * | |
amd | epyc_embedded_7713p | - | |
amd | epyc_embedded_9124_firmware | * | |
amd | epyc_embedded_9124 | - | |
amd | epyc_embedded_9254_firmware | * | |
amd | epyc_embedded_9254 | - | |
amd | epyc_embedded_9354_firmware | * | |
amd | epyc_embedded_9354 | - | |
amd | epyc_embedded_9354p_firmware | * | |
amd | epyc_embedded_9354p | - | |
amd | epyc_embedded_9454_firmware | * | |
amd | epyc_embedded_9454 | - | |
amd | epyc_embedded_9454p_firmware | * | |
amd | epyc_embedded_9454p | - | |
amd | epyc_embedded_9534_firmware | * | |
amd | epyc_embedded_9534 | - | |
amd | epyc_embedded_9554_firmware | * | |
amd | epyc_embedded_9554 | - | |
amd | epyc_embedded_9554p_firmware | * | |
amd | epyc_embedded_9554p | - | |
amd | epyc_embedded_9654_firmware | * | |
amd | epyc_embedded_9654 | - | |
amd | epyc_embedded_9654p_firmware | * | |
amd | epyc_embedded_9654p | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B590923-B6F9-48A2-9BA8-833E22DE2E43", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1BED240-E334-4A8F-9070-D57D54B0ED2A", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84E4A21E-DC60-4ABB-94AD-BDC785717A96", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C1D50EA-07CA-43E0-90A2-6AFE444A5381", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDEAA93E-431A-4476-B431-5983296CCAAD", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED357082-5FDA-4E76-9903-ACE49D241195", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68733A3D-95A9-45A7-B2D4-AD32439DAB08", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "218E19EA-5493-475D-A51E-771BB281D5C2", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85514025-4FC5-4C5B-B6A6-7AC020E192F6", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5710382-A1D0-4E21-AC47-6F14CBE28329", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E47E9840-6143-4355-BFB0-B402FDF16617", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "739AF0E3-62A6-43D0-8ECD-CF7720624613", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC0E511C-CC66-43BE-A907-027828C75403", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5687A37A-3E72-4972-8F1A-A8266DE6A4A3", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C462E4FF-2285-46E1-927B-C8FFB018BF35", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44C45AEA-6436-4012-9A0D-C591A64444A9", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FDB30FD-24BF-4597-97B5-7A3732673DD1", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27A4A53B-F26C-44DF-BABB-C17357A7B549", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F405F5CD-1255-4FD9-902C-45EF0D5C657A", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D65F2DB9-51C0-40CA-B5C9-A85CF43A593D", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2432608F-0E9E-49D5-9A22-2A2A6E89489F", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9403D7F-0349-4CC8-B566-5054E4A96D83", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F512316F-131F-4EAD-A7FA-CFE172AD4FA5", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DF39DE-83FC-4DD2-812A-F2D50AA85ADF", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DC68072-5AEA-4768-9CDB-57303996CA17", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F396A75-7B5E-4544-92B9-7D4EFCD375B9", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FED2F309-48ED-4556-B562-3F01D7FB4141", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B79FF23A-6660-4513-A633-535B7543C8C9", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6FFB29-9DFD-44FE-8AB5-32D8F765164F", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "482B19D4-3695-45A2-9CC7-1C0962414117", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8ACBF4D-E173-477F-8E7C-33DA3C034AF0", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "486F652A-8DDA-4C01-B2DB-A4F981F56016", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5C40AD4-5F07-4F57-89DE-A0658464E4A1", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602C520-8244-4BAA-A483-BC31A5305942", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5088B73-27FC-4AA8-AB57-21EC0E0E7425", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD662D4-8D44-42FE-971C-C501574F6744", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3AD7201-E73D-48FE-87F1-B62715700A70", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAEB0D25-E423-45EF-9E52-57DA7E594429", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F291B-0CE4-4D1D-8A5F-7DF66703C3B8", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E1BBA30-F9D1-4AD9-BAF7-F4D40D356C15", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43DCB063-0676-4615-93FC-64D98ACAAD57", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "492476F9-F8E1-47AB-AAF7-67AADA160678", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A89F3343-7DAC-4662-987E-7629610D3C32", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "714CC372-0E0D-4075-94CD-4723BE694D2D", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB2C6A30-90B5-4E74-A4CA-C69FCB4E1E99", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07058C5-3EDC-4615-B447-2438C534B0E0", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E71A9FF8-E8A4-40C4-8DB1-D28AE4136988", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "489653B2-F305-46B6-A4D6-DFE5DCC855C8", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47A571CB-8C43-4AFB-8115-29FDED7C5EEA", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FF3AE7A-A653-444F-9CAF-DEF8C3F25F36", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E48F9-DEF9-43D4-8643-C1CC4D2EB3D1", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E40AC063-BC83-49B5-81E9-56835D0B72D1", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A154914-D1C7-4549-815D-F1F693EE2B8F", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F0A749-9F6F-4D92-81A6-48C30F59A0EB", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A0D8BC-00E2-48EA-8F2D-C23968326032", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67A78FCF-5F78-41C5-B5D4-32815B76288E", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D51EFBB-2509-47C2-BA48-0FE151B993D0", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DF0D18-EC29-4E7F-8970-9D0355D0EDD5", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A172EB43-4526-4A3E-881D-0B6CC72EEA34", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "429B298B-C825-43F0-86CF-30385D4C56CD", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4179752-A4AC-45DA-8A40-89217197D323", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EFA7374-ED9E-4B25-B600-C34F02AFFCF9", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCF05F1E-CF13-47BF-B7D7-2FD13E2A4E46", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AC9DE15-B2E8-4D9E-BC6D-1007C083D0B7", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADE721FF-4323-4C32-91D6-AC085779E411", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F46B6E3-779A-48D3-9D66-9CC19B1C5060", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCA13D-409D-4E0B-9CB1-72C6F255C145", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "849D773E-AB8F-4044-B791-C886662D8BBF", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "375FC62D-D5B4-4698-A9E8-0AF00FEBBDE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C34A942-5EA7-4CEA-A7CA-C0ADBCC65046", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A4B2FBA-2F9E-44CF-A75A-9BCB30964153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30A546D8-3E31-4D4C-BAAC-607EAC46A4CC", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "A273285D-0615-479C-BE60-D2A73532B39A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D56DA98D-95C5-49E5-9174-DAE1ACEF706F", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92BF19E2-C264-48C3-BB38-A23C7DD67BB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8379370-5081-4FB3-890C-2BF2D602095A", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "93995EDA-88C5-41AE-8A56-08728027F2AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF60A69F-21ED-441C-823C-291026E00715", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F04B63D-AF86-466A-B74D-B1C9B2682DCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "552AAF13-377F-4A95-A580-7D906C6CB6A2", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A737AAD-AA75-41F7-B6A6-1B17D984CED5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFE3AC64-538A-4E18-85CF-063F984D735E", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "81287880-A2F0-4260-AA49-489DC2475118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C559424-D75D-440E-8F92-C1AD1B66421B", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B6488C-8707-40B8-A867-87DDDE1B5625", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7525E902-27DA-4A53-A018-53AF96AA73DB", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C8820F4-879C-4B9A-B10C-756DC6F35317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68E124D1-686C-416C-B9DD-B6380C355D92", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB7E7CEC-B263-4020-90E6-C0B77D8036D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E78BCF22-DC43-4A07-971B-CA6A76B23EEF", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CE47EE2-06B8-434F-BEC4-D2EB5B79AFB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7F6F068-1F61-4EBB-A465-381D4EA696EF", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "26C81497-519E-46A2-9F64-E80C82920E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04591375-2E1D-4DBC-8C9B-2E4D4435F8ED", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFBD9E1E-437B-44E7-B148-88513DA7D50A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57BE0E04-FC43-4437-B35F-F94DC8CC9EA6", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A68F57A9-15AB-459C-8ACC-0BE565D230FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36D36B6C-DC77-4E12-AF09-180ACB86551A", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F6DCA27-D098-40B7-9778-B284044CA34B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE6BAF58-5538-43A9-A5A9-9C1CD420F6E2", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "9737ACC0-18DB-4061-A259-D32C16BDA238", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0B68719-100F-402A-B409-DDE9811B2359", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1C35D8-0C2A-4A63-9D1B-0983E0FDB7E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CD6C041-14A7-459B-A3C9-1A6AB55F6006", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C72561-B0CE-4E51-AC5F-CD7EFDBCC5EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BAFE92-C577-4558-AE15-F3E6524701A4", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F27175DE-83A5-42DB-8F8A-886B1D886277", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest\u0027s memory or UMC seed resulting in loss of confidentiality and integrity." }, { "lang": "es", "value": "Una restricci\u00f3n inadecuada de las operaciones de escritura en el firmware SNP podr\u00eda permitir que un hipervisor malicioso sobrescriba potencialmente la memoria de un invitado o la semilla UMC, lo que provocar\u00eda una p\u00e9rdida de confidencialidad e integridad." } ], "id": "CVE-2024-21980", "lastModified": "2024-11-26T19:13:55.167", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.8, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-05T16:15:35.377", "references": [ { "source": "psirt@amd.com", "tags": [ "Broken Link" ], "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 05:00
Severity ?
Summary
AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | http://www.openwall.com/lists/oss-security/2022/08/08/6 | Mailing List, Third Party Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/08/08/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013 | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - | |
amd | epyc_7002_firmware | - | |
amd | epyc_7002 | - | |
amd | epyc_7232p_firmware | - | |
amd | epyc_7232p | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7282_firmware | - | |
amd | epyc_7282 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7552_firmware | - | |
amd | epyc_7552 | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | - | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | - | |
amd | epyc_7h12 | - | |
amd | epyc_embedded_3101_firmware | - | |
amd | epyc_embedded_3101 | - | |
amd | epyc_embedded_3151_firmware | - | |
amd | epyc_embedded_3151 | - | |
amd | epyc_embedded_3201_firmware | - | |
amd | epyc_embedded_3201 | - | |
amd | epyc_embedded_3251_firmware | - | |
amd | epyc_embedded_3251 | - | |
amd | epyc_embedded_3255_firmware | - | |
amd | epyc_embedded_3255 | - | |
amd | epyc_embedded_3351_firmware | - | |
amd | epyc_embedded_3351 | - | |
amd | epyc_embedded_3451_firmware | - | |
amd | epyc_embedded_3451 | - | |
amd | epyc_embedded_7232p_firmware | - | |
amd | epyc_embedded_7232p | - | |
amd | epyc_embedded_7251_firmware | - | |
amd | epyc_embedded_7251 | - | |
amd | epyc_embedded_7252_firmware | - | |
amd | epyc_embedded_7252 | - | |
amd | epyc_embedded_7261_firmware | - | |
amd | epyc_embedded_7261 | - | |
amd | epyc_embedded_7262_firmware | - | |
amd | epyc_embedded_7262 | - | |
amd | epyc_embedded_7272_firmware | - | |
amd | epyc_embedded_7272 | - | |
amd | epyc_embedded_7281_firmware | - | |
amd | epyc_embedded_7281 | - | |
amd | epyc_embedded_7282_firmware | - | |
amd | epyc_embedded_7282 | - | |
amd | epyc_embedded_7301_firmware | - | |
amd | epyc_embedded_7301 | - | |
amd | epyc_embedded_7302_firmware | - | |
amd | epyc_embedded_7302 | - | |
amd | epyc_embedded_7302p_firmware | - | |
amd | epyc_embedded_7302p | - | |
amd | epyc_embedded_7351_firmware | - | |
amd | epyc_embedded_7351 | - | |
amd | epyc_embedded_7352_firmware | - | |
amd | epyc_embedded_7352 | - | |
amd | epyc_embedded_735p_firmware | - | |
amd | epyc_embedded_735p | - | |
amd | epyc_embedded_7371_firmware | - | |
amd | epyc_embedded_7371 | - | |
amd | epyc_embedded_7401_firmware | - | |
amd | epyc_embedded_7401 | - | |
amd | epyc_embedded_7402_firmware | - | |
amd | epyc_embedded_7402 | - | |
amd | epyc_embedded_7402p_firmware | - | |
amd | epyc_embedded_7402p | - | |
amd | epyc_embedded_740p_firmware | - | |
amd | epyc_embedded_740p | - | |
amd | epyc_embedded_7451_firmware | - | |
amd | epyc_embedded_7451 | - | |
amd | epyc_embedded_7452_firmware | - | |
amd | epyc_embedded_7452 | - | |
amd | epyc_embedded_7501_firmware | - | |
amd | epyc_embedded_7501 | - | |
amd | epyc_embedded_7502_firmware | - | |
amd | epyc_embedded_7502 | - | |
amd | epyc_embedded_7502p_firmware | - | |
amd | epyc_embedded_7502p | - | |
amd | epyc_embedded_7532_firmware | - | |
amd | epyc_embedded_7532 | - | |
amd | epyc_embedded_7542_firmware | - | |
amd | epyc_embedded_7542 | - | |
amd | epyc_embedded_7551_firmware | - | |
amd | epyc_embedded_7551 | - | |
amd | epyc_embedded_7552_firmware | - | |
amd | epyc_embedded_7552 | - | |
amd | epyc_embedded_755p_firmware | - | |
amd | epyc_embedded_755p | - | |
amd | epyc_embedded_7601_firmware | - | |
amd | epyc_embedded_7601 | - | |
amd | epyc_embedded_7642_firmware | - | |
amd | epyc_embedded_7642 | - | |
amd | epyc_embedded_7662_firmware | - | |
amd | epyc_embedded_7662 | - | |
amd | epyc_embedded_7702_firmware | - | |
amd | epyc_embedded_7702 | - | |
amd | epyc_embedded_7702p_firmware | - | |
amd | epyc_embedded_7702p | - | |
amd | epyc_embedded_7742_firmware | - | |
amd | epyc_embedded_7742 | - | |
amd | epyc_embedded_7f32_firmware | - | |
amd | epyc_embedded_7f32 | - | |
amd | epyc_embedded_7f52_firmware | - | |
amd | epyc_embedded_7f52 | - | |
amd | epyc_embedded_7f72_firmware | - | |
amd | epyc_embedded_7f72 | - | |
amd | epyc_embedded_7h12_firmware | - | |
amd | epyc_embedded_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4510ACB-D9BA-4183-91B1-AF1367340DA7", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE5A25ED-132D-435E-BE53-9E4D551D5CCB", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4821B41-34B6-4D97-AF00-32767141140A", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "684CC73A-0866-478A-891C-2908EAFED8FA", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1438B05-396D-46F1-AEEE-36676DFC3ADA", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F832AEC-15B6-4065-8DB9-DF9BDD7365BE", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A238766-6B98-4586-8B79-12B6E41FA13A", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86C6A31-D706-4511-A52C-AB8C836E82A9", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A054E461-03EA-4FCC-A526-CC2D46E11B4C", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "964582F8-0DBA-47BF-9D0E-D9CD15FDF137", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81AB437A-2576-498D-9FB8-A5D68DC038E3", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E34FFBF9-66DA-4C96-8D65-A3E754655E38", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBB6F9A9-8A82-41CF-8385-30F32AF61E5A", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "076D58C5-D447-4FF1-B8C6-326B5648AE11", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF5A508-53BC-476F-BA58-C1EDC2E20DB7", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B452FCC-68D9-404C-90E0-B0978FD2E567", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B047325A-6FAF-451B-B3AF-AD3C620EFD88", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FEC88B1-F3F5-43E6-A07D-F56F1EC6DE01", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48597508-4968-415F-8601-7862CE96AF28", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C33F5E4F-38BF-4102-B8F3-0992CAB42095", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "907ABA86-2313-4D2F-832A-5F48E928553F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*", "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*", "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68041D51-331A-4716-AF30-3B37C07F851C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*", "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A518D997-F2ED-4489-AB69-871799C80DA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF9B650-F6D9-463E-8107-33C540A6E093", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "896B4BEE-C14D-4C07-8757-32753F97B00A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81333440-CC8B-4261-B9CC-ECA0A71BA7BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "124C4B7F-BC05-4B65-89D4-935760AD87AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "852C88A6-5381-4D0A-B81A-D567078A6AFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBA5C26B-5987-4DFB-B170-28AB69FDAF4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EE075-60D9-4040-B92C-F9AC4CA2E45A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF23E7EB-C4BB-42F5-AE8E-6E9F6D2265A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A18E7E3-F614-4A73-A270-042D887D49DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17975952-3089-41A0-8749-02C38C1AAAC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD5DA99-B62A-4D07-B772-23F74F7E6A9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "393DAE4B-39F4-4E43-B422-0620013426BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3450FF5-4741-443B-8D63-90C6D8B798A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79011066-90A2-4A2E-9267-B8F318C0F32E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "869DD653-40EB-4DBC-97FA-F3FD45F91147", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8207292-897B-4CF3-ADF1-7315BF1685DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B38FFE-9F43-4256-9ADC-B26C6AE8EAA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF95FF8-2E24-4F11-95A1-413D71BA28A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FDAD440-8EF5-4484-A558-EBC5B38E51A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1963446-5D43-410C-9092-0AEC9B4A0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "157807C6-68D3-4C38-92E0-8711B2E27E6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0132EA29-B3C2-40EE-9742-54803CF2076A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB4C7513-0B72-4737-9636-C796BFBAE8A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73B2E-4D67-45E3-B2AE-BD50261CD128", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "693C9380-D732-4ED2-98AD-B326C6D51715", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA09BAA0-05FB-4B9F-AAAE-043D2E0D5AD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C806BA9-5B49-4791-8106-98AD2B6CE9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD74D15-0FCD-47DC-B98B-C17358C9C396", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BBCDA30-F49D-4692-A995-5F4D2B7EC9D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_735p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCEBE07C-D070-4F55-8068-F3C7C3D8463C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_735p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D5358B3-A3A5-4DCD-A637-A7FCF9E9294D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD0DC74-61B3-41FC-989E-ED9C35DEE2F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED8BA8B1-07F1-49D8-8E42-A5DDA10C65CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "070BCADE-6B21-4A23-98EB-8066FFFAE669", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB985DC-B05A-4443-89EA-426D7E49EE64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "534FC224-188B-42FB-9E77-F88C1068CD14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6EA803F-13EC-4D52-8AA6-F841DC734445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4931C9D0-F5A0-4EE3-843A-A5529351DBFF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1ACE7E0-F73E-4700-A64D-A65AF8A8D585", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_740p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E11EAA0-926A-462D-B9C9-9FDC004570DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_740p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51B59724-FCCB-4FDA-93CA-8B34E05B605D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E4DC937-0674-42F7-A1D1-F7E863B53A91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D080645-4D40-4ED2-B232-924C9C54594C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A14CDA-3C70-4E7A-B443-DA80054F3772", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB6267A-94F9-4048-B7B8-A49DE90A92DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "05CD71FC-AB6D-47E9-9218-C91A234B9C24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE8E000-C771-4DB1-94CE-074F5B93D37D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8947D6DD-A667-4ED6-9376-599D753B6233", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAEF5FCC-916A-4157-862D-F535187BB51D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EB0E55-3622-4022-A987-31D0423F0D4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "500FC809-D29D-4A8D-8DBC-943788FDE017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2A57A1A-5801-4B5D-8B5A-3805A3453A70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "03CB40D5-9553-45EE-8E2C-AD0FE2856D74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14EC642-6373-4FF3-B9F1-659DBBC9057F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "4451C723-AB17-4808-981A-DA8DA9F00F4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "450B1070-7EB3-4CA9-BAE0-A5F1BC8D496F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "D334BA0B-BB66-4358-BA90-FE23517545EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C467DCF-8532-48BC-A6FC-BE4630C1E591", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "2899555F-1866-4C31-AC42-C53F4FA34205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_755p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28ED6E82-E504-4B2F-9461-08CA7EAABDBD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_755p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E7620BA-725F-4FAE-A8F8-E86B68DAB70F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC4AB744-D25D-4957-A59C-88D2DC58C80C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "52F05DED-9EF9-4EA3-AD5A-82A7910A707B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBDD2A07-6611-4E66-9C50-02690CEE7CC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "405516F0-0CFD-463C-9CD7-BD3DA8C1FAFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0499FC7A-B25F-4108-A226-7CFA88147025", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E519255-1852-4E8B-8CB0-923C84A042AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADF2869-5A22-41B8-BA4A-983D458924AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "E79AEAF0-BD56-4B32-B751-8BF0B77EB35F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929C8058-491D-400F-88E9-3639269AAC41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E15528-03C0-457B-8720-7C9AC94A4413", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6E2984-0D6C-4AF1-B804-318C9B0E25BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5520E3-2CE4-4603-9B88-C87B0E8BFFC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE40EA-AD62-4053-9EB8-1A79D80ABB76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E050ADA0-554E-4565-8F9E-12E7428821C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8623221-FED4-4F28-B179-A0F1D5E177FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "049EEAD5-8CDA-46C3-B904-4DF6304ECC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B2C9C9-A3D9-4466-B2A4-C8C7327920A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB940A6-42F3-4655-BFE9-F8781501D791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4524C883-B83C-4725-B7B7-D2EAA5A8CA68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1295268-EEF3-4729-AB5A-92FB1A54DDCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor." }, { "lang": "es", "value": "Los procesadores AMD EPYC\u2122 contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la virtualizaci\u00f3n cifrada segura con estado cifrado (SEV-ES) y la virtualizaci\u00f3n cifrada segura con paginaci\u00f3n anidada segura (SEV-SNP). Un atacante local autenticado podr\u00eda potencialmente explotar esta vulnerabilidad conllevando a una filtraci\u00f3n de los datos del hu\u00e9sped por parte del hipervisor malicioso" } ], "id": "CVE-2020-12966", "lastModified": "2024-11-21T05:00:36.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-04T23:15:10.333", "references": [ { "source": "psirt@amd.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" }, { "source": "psirt@amd.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:29
Severity ?
5.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
Summary
IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98F5728-3653-4F17-804A-B658C1195033", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4046AE4-F5D5-4B82-9E58-5970575E9908", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "030095CD-24D9-4033-A0C5-74C55083726D", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF4299D7-608D-4628-A8FE-DC0DBC09670F", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7138757-214C-44E2-9873-9F00EAAFFBA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E7978A2-777E-45D1-8036-7A4A72750AD8", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A25A14B0-641D-4EAE-93C8-2ED73698BA70", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08631494-65FE-4052-A572-AAA959DDC4A7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52910ADE-A9DE-477A-95DE-F8842BDF8BCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7D4A0-5D38-4505-A272-03AAFA3C3904", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51A9A1EA-F6E1-496D-B406-24602D845392", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFA9B863-5296-44E8-90FE-F07115B32D4A", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD221F-4A56-439B-A25C-E280792ACA60", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCDF1C52-B820-4F82-9E24-F460180D06F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38B20E51-60E2-4309-A6F2-3F3F1F22B325", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3F61F4E-9324-4CC9-B030-33A4B1F1982C", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "865C7A18-D151-4DEA-9279-6EE21CA02EBC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2552E1CD-3D25-4A86-B435-8A2A4223AE35", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1A672DC-A7F4-4115-907C-89570F552582", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45F37CB5-08DB-4E7A-80B8-789FB445E8F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F55ED1-AA9B-476E-AE54-630E8B28911A", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDD8CF52-1EF0-4718-8FE3-C83103BB2459", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "608CCBAB-A934-4989-82BE-25042F0E5A57", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA2412-28EC-4589-9B3F-78F451EF2048", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7493D0B-1DB4-436E-A297-8F931C2EFBCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDCABE02-1723-4859-B863-805A7C37014B", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CECE4403-4C94-4CF0-983C-76720122738E", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3AB732A-0FAD-46FB-994C-38A951F6F186", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F1B97E1-0559-44E0-B2D9-A03354700E9A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83DD388C-713A-4790-8C28-F33DA972B559", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B3B6C95-72E5-4364-930B-75DE7011C9D1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62A5CA50-BFAB-4470-98CB-1478DD281960", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C647A92B-882A-432A-9CC3-7BFDCFF20F07", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71E8010-E3AE-4847-B20D-D4A94FE2E982", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A0BC87-4F31-487E-8142-8B55F67D2261", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "095CA571-847E-47F2-AD91-DFD2B1DE99FF", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F7E9590-2921-4539-A88A-9031256141B8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76ED00CB-FAEC-401F-BCE6-7505FC79052D", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14FE1816-DFCE-442B-9AF1-132F7E909445", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5427628C-6F24-4615-BD65-263EC4001E4A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25CCA953-04A4-4698-9985-FB97DA3EB536", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13E4D0A9-CF7D-41B0-B024-7D6726481280", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A499E19-B92C-4B89-84C5-8C66B42077E9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BEE89-7D49-44C1-B608-940C453AC6A8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5E0C31-BF05-4B92-ACA1-84071764E077", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised Hypervisor to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity." }, { "lang": "es", "value": "IOMMU maneja incorrectamente ciertos rangos de direcciones especiales con entradas de tabla de dispositivos (DTE) no v\u00e1lidas, lo que puede permitir que un atacante con privilegios y un hipervisor comprometido induzca fallas de DTE para eludir las comprobaciones de RMP en SEV-SNP, lo que podr\u00eda provocar una p\u00e9rdida de integridad del hu\u00e9sped." } ], "id": "CVE-2023-20584", "lastModified": "2024-12-12T20:29:14.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4.0, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:19.713", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | ryzen_7_2700x_firmware | * | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2700x_firmware | * | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2700_firmware | * | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700_firmware | * | |
amd | ryzen_7_2700 | - | |
amd | ryzen_5_2600x_firmware | * | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2600x_firmware | * | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2700_firmware | * | |
amd | ryzen_5_2700 | - | |
amd | ryzen_5_2700_firmware | * | |
amd | ryzen_5_2700 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3300 | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - | |
amd | ryzen_5_5600g_firmware | * | |
amd | ryzen_5_5600g | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_3990x_firmware | * | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_3970x_firmware | * | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3960x_firmware | * | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_1950x_firmware | * | |
amd | ryzen_threadripper_1950x | - | |
amd | ryzen_threadripper_1920x_firmware | * | |
amd | ryzen_threadripper_1920x | - | |
amd | ryzen_threadripper_1900x_firmware | * | |
amd | ryzen_threadripper_1900x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | * | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | * | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | * | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | * | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | * | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | * | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | * | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | * | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | * | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | * | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_7_2700x_firmware | * | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2700x_firmware | * | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2700_firmware | * | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700_firmware | * | |
amd | ryzen_7_2700 | - | |
amd | ryzen_3_5300u_firmware | * | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_5500u_firmware | * | |
amd | ryzen_5_5500u | - | |
amd | ryzen_7_5700u_firmware | * | |
amd | ryzen_7_5700u | - | |
amd | ryzen_3_5125c_firmware | * | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5400u_firmware | * | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425u_firmware | * | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_5560u_firmware | * | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600u_firmware | * | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5625u_firmware | * | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5600h_firmware | * | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | * | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | * | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825u_firmware | * | |
amd | ryzen_7_5825u | - | |
amd | ryzen_7_5800h_firmware | * | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | * | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_9_5900hs_firmware | * | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | * | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | * | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | * | |
amd | ryzen_9_5980hx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0094538-161A-4877-9247-EA6DD83C9E54", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5841138E-BDAC-4F59-9BC8-9313A49DBECB", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAD73E1A-C4E6-4ECA-907C-99F84DBC7765", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FB232-0930-4F05-A4EC-D06DBED8E54A", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21B5752-F187-4BA9-94E8-C6525C7824A2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5EA931-ED74-4086-B9A9-9F1A9A359590", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E603AC01-F362-4B2E-9A08-DF2C24A49DDD", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F384C3-11D5-42EB-BF44-A6707358E063", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0A9A96-25CF-47AC-9AF3-96725B3863E4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E3EC-4358-4A82-807B-BBA7F03D5884", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA8E2F-2E73-47AD-B671-A952B9A4BFD6", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62B278C-BF08-4CC2-A843-1888AEF37638", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88713545-D2E4-47CC-8F5F-EAEE0CF53BF2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E4971-594B-4D1E-AFD5-D6B8A8B8F8A8", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "576BF517-1021-48AA-A065-305A50F9645D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B6DBC4-F298-45E1-90FF-A87AEA06810E", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08067DB-AD49-4B3D-BCBB-A4C9A7D9E7F4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B1F0A4-655A-44B9-87C0-B8A8F95B2BE0", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFDB2131-CDC3-463D-958F-0BF8D0FF5EA2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED75D47-160E-4E80-ADC6-4F84748231D5", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45F46F-A3C0-4FA4-BCB6-DD1A8DC0E190", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6D58B4E-67BF-4DC3-B1F0-B58D0F2AB798", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C125D0D-B785-41FC-BE13-9B3036B11985", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F300A76F-3C66-4C2D-B0EF-63FEFF139E4E", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F228F00-05BA-4859-ABFC-2E5384BC4958", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC48B37F-CF5D-47B4-AC55-ACC004C2A4A5", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91C2B320-1F92-4210-8ED6-B665F0AF64FC", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D11575-CFDD-4CCD-B86E-457EF881EE77", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67555209-8F6F-4106-A1BF-52CE1559538A", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F45285B-E6D7-404F-9A04-D102F720AD0F", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84521477-8F0E-47C0-A605-62F168FBAC5B", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DDE5209-41F7-4C8B-AB02-CED82D78FC2D", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6930FCB0-CFC6-4A46-B373-DA6F805F82D6", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AF1AF4-3DE9-49A8-8CA9-B27F6A1C8E38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C69B1D1-DE50-4D70-821E-FDE2049C9107", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70F3D9FE-3025-4CE9-834B-755E79A20C38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A93567B-2DA9-44B2-AB09-E7A6706588F5", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5621CF89-55BD-41F0-8A31-211D42157DE2", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "499FAFEA-A965-47A2-B1DB-B262B189C91F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A70A1A9A-D8A2-4A2B-8058-FE92E1FEAB07", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51592960-E74B-4414-A4F8-209D3D29D49F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC7064C1-67AF-4A2F-A284-846700D45614", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBE28F-9DF5-4D9C-BCC2-0D2ACB9D6B8F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6B2EB39-833A-40E7-9C0D-797D1878C925", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5012CEC2-A60C-433F-ACDE-0FF589E9EE50", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE56DEA5-F95E-465F-A93F-047D8765ACD7", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DF3D087-A373-435E-9085-B4D436259FEA", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27705130-C969-416F-94DF-4ACF94AEBE6F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27B3BE05-DBBC-471B-9052-D6FEAC051033", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F94DE3D-D26D-4B40-BF1B-E8269BEEA817", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07A724-54FB-40D1-8CD4-3D8636EF3E09", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0840EC2-3616-4E41-B806-BAB03FBC8EE5", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14B2D769-233B-42EB-BE17-F1A857B48863", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43A08D27-BC7C-464B-9250-578E80AB718F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC4DDD43-4F29-45B2-B56F-5731F9495E6C", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "82854E42-76EC-4428-9975-B5FBC8DC6FF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D248B1FF-E981-4F0A-BDD7-22B64159F050", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B92717AF-0F69-4A7D-BC06-B0E287AA8008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9400C6E0-11E8-4FD4-A559-6254FC7509CC", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "304C61BE-2438-49EE-A581-4A4EEC2923E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F6FEDE-E686-4FCC-AA4B-9E28060506C4", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F63D4BA1-0706-4137-8492-5A5AC76D6F45", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE382518-267B-4411-8A6F-6AE41DDF49D2", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F85495-9937-40DC-AD18-2285CE8F40BA", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D09402A0-0BCF-45C7-BC80-0894D204D854", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "476549F9-B827-4587-B67F-1D1B12396031", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37DCA506-48B5-4963-AA93-4A9174C5767F", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "734E34E4-8090-4939-9CBC-841556834AFA", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D49AB580-A422-40A2-AC14-876CAE31D6E5", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65339D06-D1ED-49EB-A172-6071F3510E09", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69A0A6DA-EFF8-4DC8-BB52-FC35A5260C24", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "153A5BA3-D730-45C6-9660-002E6512BCA1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5269FF7-5220-4707-9642-138D59438AC1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E004F6-3488-48EB-A2B0-ABBE32729139", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F7E6D13-6343-4A2B-AF6F-044B9E93C656", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9297E-63CD-4956-8C3F-417EF8AB27DF", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA0C644-DFE5-432E-8078-45BEC5681519", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A2A1A42-FA9E-4CA3-A666-7EF61D8ED794", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B02CD770-8BD6-4798-8D0B-175F5765765B", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "022C4CD1-F9F5-46F8-A502-93103C771784", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78B69DE-A3CF-45E1-AB93-C73066A619D0", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "178F2AF6-0F65-4F56-B429-A93D31DFF4EB", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4F754E-EB1A-409D-A84C-F8E8D1C54037", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E89A3B6B-EA14-4DF8-9B2F-97E74715D8F3", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEA674FE-CC7E-4D7F-9AE1-4A9A3C695224", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FAE5380-5C41-4ECC-96DF-EDCEE06AA36F", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC0C3FD4-2D4B-43F7-BD9C-39B9B71444CC", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5DCC668-E44F-4004-A500-B53D37A96DFD", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AC44D47-0B13-4607-BE44-F351092E33FF", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DAA9292-6C8D-44DA-8B67-6E26E0619BFC", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99656971-4F6C-48F4-89A3-52FFF15D934C", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F55EEAA-2E20-4DBB-860F-010A757B9B3E", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE217D96-C33E-470B-9BC9-36AA6C257BEA", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB01C6CC-2F9A-487C-A587-62622DA75AAF", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C08A1B2-1DF1-474B-BB5E-3085A03C9BE6", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "262E6ECB-AAA9-4DFF-A7A2-C4457087A49F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51CC1E13-BED2-4CE5-9BDF-D177B788E5A1", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B745B7F-DDD9-4DAF-8511-76F2C4F7FA20", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB99535-B654-4F63-A30A-F51FF934694B", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0989D19D-9721-47AF-B4F1-3DAFE98FE52A", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABEC5CE9-E81B-4D7C-A565-09D7B03ABC5A", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F319382-49F1-4472-9018-7067033C1A23", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33A6688A-CDC4-4005-9EC4-9EB5FA155C81", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF72CC78-4AEA-415F-82E5-B4BCE683A679", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDAD11-FB62-4F46-92C4-8EA4200218C4", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9766178-B8A2-40F2-AAFC-9999A1F672F1", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7D66CE6-6D34-4247-9A54-2723E9D458AD", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F0E769-09E3-4D99-81E3-4419794478C8", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BC71F5-5048-43A6-A87A-F87B446243F3", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "886EE0BF-C13C-43E2-B2C7-F7CE2B0E8472", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38845C5E-1761-4722-8368-B9439A0DAB14", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "657F1F0E-DDC7-43E7-95AB-70515CB78B7F", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8A79007-A57B-49FB-BB88-9A095CF3BA7A", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8A79007-A57B-49FB-BB88-9A095CF3BA7A", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E406201-0F7A-40D9-84C8-5EC5EDE5725F", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E406201-0F7A-40D9-84C8-5EC5EDE5725F", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B19496B-1181-4292-8B17-665C47B7293B", "versionEndExcluding": "cezannepi-fp6_1.0.0._9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D15C9E37-DE83-43D7-B3D5-2645F027FB8A", "versionEndExcluding": "cezannepi-fp6_1.0.0._9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F88B5DA9-2847-479F-AF6A-51176B4FB32F", "versionEndExcluding": "cezannepi-fp6_1.0.0._9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A274267-5A91-4752-856F-3F84D85BB9CB", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17F026FB-D58E-4A61-87E7-249B3E0B1293", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D09CDB5E-3184-49DF-AC0E-367D0EFF0E36", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4C2DF5C-5BF9-42AF-A2FB-F1EC7F3B5BFE", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD0DEC3-6D14-43DB-9FE7-AEDF42C547A9", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB62DD2-2352-43D6-87F4-53FC84DA80AF", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7C7B5DC-98A4-4966-A41B-B6A1C655B1A3", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE644693-0BFE-49D2-AE58-79D52B110169", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAC0EB2D-0AC1-4F0D-9D48-94C039E16579", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FE756D6-6BE7-45F3-A40D-46CB74EFD6A9", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91F6E921-B63E-419D-BEFC-29C92832A44F", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1E154A8-DA3F-4E87-8C41-DA9465288BD0", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0E6BA3E-FDA4-4996-B3AC-508D7EC1FC08", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CD4943E-9B99-4EDB-B9EF-75F15B097FFE", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "372D68C2-87E3-436C-96A0-E2855AAFD910", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E36A1096-E2AF-4F0D-BD52-527AA7E59B56", "versionEndExcluding": "cezannepi-fp6_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service." }, { "lang": "es", "value": "Una comprobaci\u00f3n inapropiada del directorio de la BIOS puede permitir que las b\u00fasquedas lean m\u00e1s all\u00e1 de la copia de la tabla del directorio en la RAM, exponiendo contenidos de memoria fuera de l\u00edmites, resultando en una potencial denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26388", "lastModified": "2024-11-21T05:56:16.203", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.747", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:00
Severity ?
Summary
Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service." }, { "lang": "es", "value": "Una validaci\u00f3n de entrada insuficiente en el firmware de ASP para comandos TPM discretos podr\u00eda permitir una posible p\u00e9rdida de integridad y una denegaci\u00f3n de servicio." } ], "id": "CVE-2020-12946", "lastModified": "2024-11-21T05:00:34.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.367", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 18:15
Modified
2024-11-21 05:56
Severity ?
Summary
Persistent platform private key may not be protected with a random IV leading to a potential “two time pad attack”.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Persistent platform private key may not be protected with a random IV leading to a potential \u201ctwo time pad attack\u201d." }, { "lang": "es", "value": "La clave privada de la plataforma persistente puede no estar protegida con un IV aleatorio, conllevando a un potencial \"two time pad attack\"" } ], "id": "CVE-2021-26322", "lastModified": "2024-11-21T05:56:05.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T18:15:07.230", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-320" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 07:41
Severity ?
Summary
Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.\n" }, { "lang": "es", "value": "Las comprobaciones limitadas insuficientes en la SMU pueden permitir que un atacante actualice el espacio de direcciones desde/hasta a un valor no v\u00e1lido, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20529", "lastModified": "2024-11-21T07:41:05.610", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:13.897", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 18:15
Modified
2024-11-21 05:56
Severity ?
Summary
Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources." }, { "lang": "es", "value": "Unos controles de acceso inapropiados en System Management Unit (SMU) pueden permitir a un atacante anular las tablas de control de rendimiento ubicadas en la DRAM, resultando en una falta potencial de recursos del sistema" } ], "id": "CVE-2021-26338", "lastModified": "2024-11-21T05:56:08.473", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T18:15:07.387", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-13 20:15
Modified
2024-11-21 08:01
Severity ?
Summary
Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DC71137-5861-4413-AE37-FBA5EA15CD84", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB947EC3-B3CF-4E35-86C1-DDD831D4518D", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB9F211-8998-44FF-91FE-723BA6315B85", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3A4256B-4211-4A15-B33C-743A4898CB76", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DCADA15-DE56-4993-977D-5BE701476D46", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1063F18B-600E-46FB-B6DA-95C8D4C32ACD", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF7D4F3A-CE7A-4C84-B872-E1206912AD62", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5D9E427-F642-4EA3-9213-616D4FC5BFCE", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFEA67F1-83B8-461D-8066-91BBD3FD9E24", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B86A8C8F-BEFC-439B-A712-E931CC229708", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6651DED0-FD67-406B-845A-553ABBBCCB02", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "025B7A4B-0CF9-401E-AF18-3581CD04BDB5", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F64D3037-AC84-411D-AF23-2B6E49C26896", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBC1FE8-F91B-407A-B4DC-C3EE38676828", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00B84AD1-3F32-46B5-88D1-50CE43844977", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10654574-BACF-41D7-8B2D-73E2E0CBFBFB", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC29525-306B-4E29-A846-8439487042D6", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC6AF23-8DE0-4402-B707-F9DC3E83B906", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C45FD0CE-4B69-4C95-9EA1-575736A55045", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C2B77A7-357B-4F13-83B9-BB45EB2C1F4A", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6EEB19-3507-439B-912F-C19D3E8D9A96", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEDA7A65-34F0-454C-9040-A7024DB82D6C", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A71852A5-4EBF-4127-B36D-53B113F3CFA3", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32A17247-5FFB-4293-805F-37A2FDE25141", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4046AE4-F5D5-4B82-9E58-5970575E9908", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98F5728-3653-4F17-804A-B658C1195033", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "030095CD-24D9-4033-A0C5-74C55083726D", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7138757-214C-44E2-9873-9F00EAAFFBA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF4299D7-608D-4628-A8FE-DC0DBC09670F", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A25A14B0-641D-4EAE-93C8-2ED73698BA70", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E7978A2-777E-45D1-8036-7A4A72750AD8", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08631494-65FE-4052-A572-AAA959DDC4A7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7D4A0-5D38-4505-A272-03AAFA3C3904", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52910ADE-A9DE-477A-95DE-F8842BDF8BCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3F61F4E-9324-4CC9-B030-33A4B1F1982C", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2552E1CD-3D25-4A86-B435-8A2A4223AE35", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1A672DC-A7F4-4115-907C-89570F552582", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45F37CB5-08DB-4E7A-80B8-789FB445E8F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "865C7A18-D151-4DEA-9279-6EE21CA02EBC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCDF1C52-B820-4F82-9E24-F460180D06F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDD8CF52-1EF0-4718-8FE3-C83103BB2459", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F55ED1-AA9B-476E-AE54-630E8B28911A", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "608CCBAB-A934-4989-82BE-25042F0E5A57", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA2412-28EC-4589-9B3F-78F451EF2048", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7493D0B-1DB4-436E-A297-8F931C2EFBCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDCABE02-1723-4859-B863-805A7C37014B", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CECE4403-4C94-4CF0-983C-76720122738E", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38B20E51-60E2-4309-A6F2-3F3F1F22B325", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "No inicializar la memoria en el firmware SEV puede permitir que un atacante privilegiado acceda a datos obsoletos de otros invitados." } ], "id": "CVE-2023-31346", "lastModified": "2024-11-21T08:01:46.650", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-13T20:15:52.737", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
5.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5E0C31-BF05-4B92-ACA1-84071764E077", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BEE89-7D49-44C1-B608-940C453AC6A8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A499E19-B92C-4B89-84C5-8C66B42077E9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13E4D0A9-CF7D-41B0-B024-7D6726481280", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25CCA953-04A4-4698-9985-FB97DA3EB536", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5427628C-6F24-4615-BD65-263EC4001E4A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14FE1816-DFCE-442B-9AF1-132F7E909445", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76ED00CB-FAEC-401F-BCE6-7505FC79052D", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F7E9590-2921-4539-A88A-9031256141B8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "095CA571-847E-47F2-AD91-DFD2B1DE99FF", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A0BC87-4F31-487E-8142-8B55F67D2261", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71E8010-E3AE-4847-B20D-D4A94FE2E982", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C647A92B-882A-432A-9CC3-7BFDCFF20F07", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62A5CA50-BFAB-4470-98CB-1478DD281960", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B3B6C95-72E5-4364-930B-75DE7011C9D1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83DD388C-713A-4790-8C28-F33DA972B559", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F1B97E1-0559-44E0-B2D9-A03354700E9A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3AB732A-0FAD-46FB-994C-38A951F6F186", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14808E8C-AB59-4989-BE9D-B97FD7923F8D", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74F50F36-25D0-4DA4-8CA0-886C0EAB5E2E", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "082C4EA1-81D7-44AE-A541-ABF671C2B090", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A05E8AD-508C-4559-96E1-9DEF177AA2E7", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88873335-352B-4E63-9549-B59CAEF64CF1", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D84CF54-B439-473E-B9E4-85C90F51AACE", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F4238A3-881F-4228-9C89-502CD84E4D7D", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B307DC4A-6AA7-408F-9B08-638D7D15F0FC", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B79EBE3-3F66-4990-83E7-0C0D19DBBAE1", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58E6A323-F04E-4D35-873B-1BF0AF1E90C4", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877EF1AC-9148-4E54-BDC4-0D8BAD54C49A", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D09B6F98-9B13-4FD7-ACBD-3518C2171E9B", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A98DA452-BE77-4A37-9ED2-60B86F8D43FE", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2B1159B-716A-44B2-AE20-69C7B13DC022", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C53C00D-654C-40DA-B3AF-BBA4604187ED", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E790D2BD-E1C4-4B54-892B-B2E807F7470C", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A974C32E-F0AA-446E-85F7-5D97EBD8C3DC", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19B9DE89-2BE2-45D4-B0D4-B98816405526", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A34AEDD4-F125-4C54-8702-2EF2A8FA56C5", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D05F42B-72D8-4A76-8AC5-29FA79487FC1", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B490BF74-9BA2-42A9-97F9-8FBA15B61D47", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B3C52BB-0256-4997-AADC-2E86116FB2E8", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45097739-09B3-40A0-8CD3-F8336A140C25", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8C2EBFF-1A24-412B-B45A-71BC6608F4BF", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDC48B77-4822-4851-888A-D59AAD3B57EC", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34BD5E71-2566-4F18-9722-1E934FB37F8A", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01F8B254-7030-423C-BC00-03996DD50AB8", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B3B84-BF69-49AC-A77A-FB16156EAD74", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0281B9B7-F019-4205-B28A-637FC96C30F4", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78D2BB83-A307-4E49-B68F-782E325D30A4", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A4AF050-3553-4775-BCF8-264514915DFA", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDF8362F-43EA-4D54-9AA9-C9E1775F58BC", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6499B2A8-7F9E-4AEA-B334-F686FC782033", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "276C4BFA-2476-4791-A597-44D63FED6675", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "849E8C64-C24B-413A-A70E-24B06CF41E8F", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "285BBB3D-2BA9-4ACB-AD14-20B1EF0C4447", "versionEndExcluding": "genoapi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity." }, { "lang": "es", "value": "Una validaci\u00f3n de direcci\u00f3n incorrecta en ASP con SNP habilitado puede permitir que un atacante comprometa la integridad de la memoria del invitado." } ], "id": "CVE-2023-20566", "lastModified": "2024-11-21T07:41:08.080", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4.0, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:15.837", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-11 19:15
Modified
2024-11-27 16:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_embedded_3101_firmware | - | |
amd | epyc_embedded_3101 | - | |
amd | epyc_embedded_3151_firmware | - | |
amd | epyc_embedded_3151 | - | |
amd | epyc_embedded_3201_firmware | - | |
amd | epyc_embedded_3201 | - | |
amd | epyc_embedded_3251_firmware | - | |
amd | epyc_embedded_3251 | - | |
amd | epyc_embedded_3255_firmware | - | |
amd | epyc_embedded_3255 | - | |
amd | epyc_embedded_3451_firmware | - | |
amd | epyc_embedded_3451 | - | |
amd | epyc_7232p_firmware | - | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_5552_firmware | - | |
amd | epyc_5552 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | - | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_72f3_firmware | - | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | - | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | - | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | - | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | - | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | - | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | - | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | - | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | - | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | - | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | - | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | - | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | - | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | - | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | - | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | - | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | - | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | - | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | - | |
amd | epyc_7773x | - | |
amd | epyc_9124_firmware | - | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | - | |
amd | epyc_9174f | - | |
amd | epyc_9184x_firmware | - | |
amd | epyc_9184x | - | |
amd | epyc_9224_firmware | - | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | - | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | - | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | - | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | - | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | - | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | - | |
amd | epyc_9374f | - | |
amd | epyc_9384x_firmware | - | |
amd | epyc_9384x | - | |
amd | epyc_9454_firmware | - | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | - | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | - | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | - | |
amd | epyc_9534 | - | |
amd | epyc_9554p_firmware | - | |
amd | epyc_9554p | - | |
amd | epyc_9554_firmware | - | |
amd | epyc_9554 | - | |
amd | epyc_9634_firmware | - | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | - | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | - | |
amd | epyc_9654p | - | |
amd | epyc_9684x_firmware | - | |
amd | epyc_9684x | - | |
amd | epyc_9734_firmware | - | |
amd | epyc_9734 | - | |
amd | epyc_9754_firmware | - | |
amd | epyc_9754 | - | |
amd | epyc_9754s_firmware | - | |
amd | epyc_9754s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "907ABA86-2313-4D2F-832A-5F48E928553F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*", "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*", "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68041D51-331A-4716-AF30-3B37C07F851C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*", "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A518D997-F2ED-4489-AB69-871799C80DA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF9B650-F6D9-463E-8107-33C540A6E093", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81333440-CC8B-4261-B9CC-ECA0A71BA7BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_5552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA4DD36F-5A92-4D89-9FFA-580C30A5036C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_5552:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEFF9571-88E1-4BF1-B576-06AE45D58E91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EA7278D-8165-4E5C-A9ED-F465B2A2D2E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "379AAAA6-F0BA-43AA-AFC6-CC1F4FACBEF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7889643-98F3-49E8-BD57-2DE56CC72B95", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35151FC3-1B84-4BD5-8B99-EAFD3BAFCC9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E5F12-4818-4D67-B27C-36744D5F9B71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC521A8E-84A4-4831-8433-3CA909226FE5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "947EE825-C45D-4090-9855-260AA9903E5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E06330-E43A-4A35-AE5D-FCC7E792C514", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E56DB5A-965B-4448-86C8-2E417665E4F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DC4D67-1C38-4118-BED6-71E5727CA55A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "421268E7-3C0D-42FB-90A8-6BA8E4A29F9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E61EB9F-8AF9-49FC-B142-B109DA826E66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5BC4AC-09CF-456A-8021-E931D61B09DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5F0F8E5-32F2-40C9-814A-663A19B37D1D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ED7A173-AAB9-4EEF-957F-7940EB22F4A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D43773D-4565-4273-A719-ACEAEBD679D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F36AB-0E6D-4854-A86B-3DE9AD084879", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37E9F62C-4DF2-45A6-BDC1-20AA24E85BF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F50338E3-725A-455F-9680-F700F5690057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7D70506-EDBC-4ED9-9AD3-925610C03D7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B1A2179-8415-460D-959B-1917AA2FCED7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8916EDB2-B9BA-4FA7-9591-DFB2E00DDC96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D4BC04-155E-4A68-BFBD-9F7D81DB3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3A52919-B5ED-41F6-9CC6-C8468812322F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program\u2019s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\n\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2023-20575", "lastModified": "2024-11-27T16:15:08.010", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-07-11T19:15:09.547", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9B075FD-7DCA-4FA6-94CA-50135093FDCB", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3A8CA97-418C-47FA-B2D6-8366ABECF4FC", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1662EDB-2E2B-4AB5-BD7B-6D5DF88366BD", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "529531D7-0C7E-49E5-882D-782ED63F4B4D", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78C090AE-76BD-4EAE-A8A2-85E4B4EDE11E", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE1AEEEB-8ABF-46AE-8821-D00501B77354", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41688F63-8B56-4875-82E5-F8D31F8EA6F1", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A816BE56-A986-4460-9F9D-FE2DF3D4E2DA", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A6367A3-C160-47D8-9E59-C7C143B1EDA2", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FF2F8E4-C40E-4340-9904-CA73E47277C8", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68415A9D-8795-4EAE-B058-0881D5009067", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77070835-6E8F-4BCC-8CA2-E9E5BA63BD94", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECB858E9-2C6E-4FBA-8AB8-840015B2EFB1", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E99C885-5914-4B85-8E87-6324E0723E8F", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "434E12D6-885D-4E57-BA0D-F9E8D8EEB435", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C01EAFF9-60D9-40AC-9F02-0ED93C931BF5", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C67B8C1-6CAD-4018-806A-4E70E861C89E", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFAD987E-3B64-4E6B-80EA-F85E0F75652D", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEA5AD7F-77CF-4C58-B3D7-7147BA72618C", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2C84D88-13F0-4B1D-A0C1-DD0CE6FCCBB2", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2788E8F7-0A82-4653-9D3F-49EB651A028F", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "099071F5-F923-4321-94D2-4F16DF2E6071", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FBF709-4399-470E-91BB-E17D309DA22B", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C118D307-3212-4509-A947-34A36390CB5F", "versionEndExcluding": "milanpi_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BD7B00D-ECD9-419E-B927-7AD293360BB3", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1053118D-84FB-4126-8558-F731AF578D51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2567B7A7-23AF-4A5E-B5B4-50A15EBF58FA", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10630C1F-3EAE-47EE-AD1C-6C35052B1C51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "214D44A0-2B4F-4C3B-BC77-3388F60BEE21", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91DC33A9-7EE5-443F-A195-5739E25880D8", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA6066FB-CE27-447A-B9E3-ECFBB59DF4CC", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D9898-5A45-4F76-89F9-A0E0F9B68195", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6554840-DD72-4CB7-B72B-40F0EB4AAB5D", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EB8E56A-20CD-4722-91F8-A4BC9E629F84", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17C9FDD3-74A4-4848-B6CE-7861658C3A30", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B748EBB3-37A9-4F2A-A4A4-AAEEF56BABC0", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "264D28A9-A104-4333-9094-8251FBF00880", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02967552-68C0-4111-B05D-BC17EFEF37DD", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.\n\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada insuficiente en la llamada al sistema SYS_KEY_DERIVE en una aplicaci\u00f3n de usuario comprometida o ABL puede permitir que un atacante corrompa la memoria del sistema operativo ASP (AMD Secure Processor), lo que puede conducir a una posible ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2021-26398", "lastModified": "2024-11-21T05:56:17.933", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:11.487", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 18:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity." }, { "lang": "es", "value": "Si no se comprueba VM_HSAVE_PA durante SNP_INIT puede producirse una p\u00e9rdida de integridad de la memoria" } ], "id": "CVE-2021-26326", "lastModified": "2024-11-21T05:56:06.407", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T18:15:07.283", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 07:41
Severity ?
Summary
Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada insuficiente de los mensajes del buz\u00f3n del BIOS en SMU puede provocar lecturas de memoria fuera de los l\u00edmites, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20530", "lastModified": "2024-11-21T07:41:05.747", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:13.950", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality." }, { "lang": "es", "value": "Una comprobaci\u00f3n insuficiente del contexto del hu\u00e9sped en el Firmware SNP podr\u00eda conllevar una potencial p\u00e9rdida de confidencialidad del hu\u00e9sped" } ], "id": "CVE-2021-26327", "lastModified": "2024-11-21T05:56:06.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.987", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD14E00-D597-4099-B4DF-58EE8EEE0B2E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C66D2D-BFCB-430C-8A18-FC3C21D2BD40", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31595722-F102-447D-9BAE-9C36567342DD", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC7C2B2-F31B-4257-AFE0-6DC22FB8F616", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0094538-161A-4877-9247-EA6DD83C9E54", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5EA931-ED74-4086-B9A9-9F1A9A359590", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E603AC01-F362-4B2E-9A08-DF2C24A49DDD", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F384C3-11D5-42EB-BF44-A6707358E063", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0A9A96-25CF-47AC-9AF3-96725B3863E4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E3EC-4358-4A82-807B-BBA7F03D5884", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5841138E-BDAC-4F59-9BC8-9313A49DBECB", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA8E2F-2E73-47AD-B671-A952B9A4BFD6", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62B278C-BF08-4CC2-A843-1888AEF37638", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAD73E1A-C4E6-4ECA-907C-99F84DBC7765", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88713545-D2E4-47CC-8F5F-EAEE0CF53BF2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E4971-594B-4D1E-AFD5-D6B8A8B8F8A8", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FB232-0930-4F05-A4EC-D06DBED8E54A", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "576BF517-1021-48AA-A065-305A50F9645D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B6DBC4-F298-45E1-90FF-A87AEA06810E", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08067DB-AD49-4B3D-BCBB-A4C9A7D9E7F4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B1F0A4-655A-44B9-87C0-B8A8F95B2BE0", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFDB2131-CDC3-463D-958F-0BF8D0FF5EA2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED75D47-160E-4E80-ADC6-4F84748231D5", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21B5752-F187-4BA9-94E8-C6525C7824A2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45F46F-A3C0-4FA4-BCB6-DD1A8DC0E190", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F406CA9-BF5D-4AF3-91FE-64712D8B9A9F", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service." }, { "lang": "es", "value": "El problema de TOCTOU (time-of-check to time-of-use) en la Unidad de Administraci\u00f3n del Sistema (SMU) puede resultar en un DMA (acceso directo a memoria) a una direcci\u00f3n de DRAM no v\u00e1lida que podr\u00eda resultar en una denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26347", "lastModified": "2024-11-21T05:56:10.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.340", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 06:49
Severity ?
Summary
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | http://www.openwall.com/lists/oss-security/2022/11/10/2 | Mailing List, Mitigation, Patch, Third Party Advisory | |
psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/ | ||
psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ | ||
psirt@amd.com | https://security.gentoo.org/glsa/202402-07 | ||
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040 | Mitigation, Vendor Advisory | |
psirt@amd.com | https://www.debian.org/security/2023/dsa-5378 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/11/10/2 | Mailing List, Mitigation, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202402-07 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5378 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
xen | xen | - | |
amd | a10-9600p | - | |
amd | a10-9630p | - | |
amd | a12-9700p | - | |
amd | a12-9730p | - | |
amd | a4-9120 | - | |
amd | a6-9210 | - | |
amd | a6-9220 | - | |
amd | a6-9220c | - | |
amd | a9-9410 | - | |
amd | a9-9420 | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_silver_3050u | - | |
amd | athlon_x4_750 | - | |
amd | athlon_x4_760k | - | |
amd | athlon_x4_830 | - | |
amd | athlon_x4_835 | - | |
amd | athlon_x4_840 | - | |
amd | athlon_x4_845 | - | |
amd | athlon_x4_860k | - | |
amd | athlon_x4_870k | - | |
amd | athlon_x4_880k | - | |
amd | athlon_x4_940 | - | |
amd | athlon_x4_950 | - | |
amd | athlon_x4_970 | - | |
amd | epyc_7001 | - | |
amd | epyc_7002 | - | |
amd | epyc_7003 | - | |
amd | epyc_7251 | - | |
amd | epyc_7252 | - | |
amd | epyc_7261 | - | |
amd | epyc_7262 | - | |
amd | epyc_7272 | - | |
amd | epyc_7281 | - | |
amd | epyc_7282 | - | |
amd | epyc_72f3 | - | |
amd | epyc_7301 | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p | - | |
amd | epyc_7343 | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p | - | |
amd | epyc_7352 | - | |
amd | epyc_7371 | - | |
amd | epyc_7373x | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p | - | |
amd | epyc_7413 | - | |
amd | epyc_7443 | - | |
amd | epyc_7443p | - | |
amd | epyc_7451 | - | |
amd | epyc_7452 | - | |
amd | epyc_7473x | - | |
amd | epyc_74f3 | - | |
amd | epyc_7501 | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p | - | |
amd | epyc_7513 | - | |
amd | epyc_7532 | - | |
amd | epyc_7542 | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p | - | |
amd | epyc_7552 | - | |
amd | epyc_7573x | - | |
amd | epyc_75f3 | - | |
amd | epyc_7601 | - | |
amd | epyc_7642 | - | |
amd | epyc_7643 | - | |
amd | epyc_7662 | - | |
amd | epyc_7663 | - | |
amd | epyc_7702 | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p | - | |
amd | epyc_7742 | - | |
amd | epyc_7763 | - | |
amd | epyc_7773x | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12 | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2700 | - | |
amd | ryzen_5_2700x | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800u | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_7_pro_3700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3795wx | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | athlon_x4_750_firmware | - | |
amd | athlon_x4_750 | - | |
amd | athlon_x4_760k_firmware | - | |
amd | athlon_x4_760k | - | |
amd | athlon_x4_830_firmware | - | |
amd | athlon_x4_830 | - | |
amd | athlon_x4_835_firmware | - | |
amd | athlon_x4_835 | - | |
amd | athlon_x4_840_firmware | - | |
amd | athlon_x4_840 | - | |
amd | athlon_x4_845_firmware | - | |
amd | athlon_x4_845 | - | |
amd | athlon_x4_860k_firmware | - | |
amd | athlon_x4_860k | - | |
amd | athlon_x4_870k_firmware | - | |
amd | athlon_x4_870k | - | |
amd | athlon_x4_880k_firmware | - | |
amd | athlon_x4_880k | - | |
amd | athlon_x4_940_firmware | - | |
amd | athlon_x4_940 | - | |
amd | athlon_x4_950_firmware | - | |
amd | athlon_x4_950 | - | |
amd | athlon_x4_970_firmware | - | |
amd | athlon_x4_970 | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_3795wx_firmware | - | |
amd | ryzen_threadripper_pro_3795wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | a12-9700p_firmware | - | |
amd | a12-9700p | - | |
amd | a12-9730p_firmware | - | |
amd | a12-9730p | - | |
amd | a10-9600p_firmware | - | |
amd | a10-9600p | - | |
amd | a10-9630p_firmware | - | |
amd | a10-9630p | - | |
amd | a9-9410_firmware | - | |
amd | a9-9410 | - | |
amd | a9-9420_firmware | - | |
amd | a9-9420 | - | |
amd | a6-9210_firmware | - | |
amd | a6-9210 | - | |
amd | a6-9220_firmware | - | |
amd | a6-9220 | - | |
amd | a6-9220c_firmware | - | |
amd | a6-9220c | - | |
amd | a4-9120_firmware | - | |
amd | a4-9120 | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2700_firmware | - | |
amd | ryzen_5_2700 | - | |
amd | ryzen_5_2700x_firmware | - | |
amd | ryzen_5_2700x | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3200u_firmware | - | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_pro_3700u_firmware | - | |
amd | ryzen_7_pro_3700u | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_7_4700g_firmware | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge_firmware | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_5_4600g_firmware | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge_firmware | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_3_4300g_firmware | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge_firmware | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_9_4900h_firmware | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_7_4800u_firmware | - | |
amd | ryzen_7_4800u | - | |
amd | ryzen_7_4700u_firmware | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h_firmware | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_5_4600u_firmware | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4500u_firmware | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600h_firmware | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_3_4300u_firmware | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | athlon_gold_3150u_firmware | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_silver_3050u_firmware | - | |
amd | athlon_silver_3050u | - | |
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7002_firmware | - | |
amd | epyc_7002 | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | - | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | - | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | - | |
amd | epyc_7h12 | - | |
amd | epyc_7773x_firmware | - | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | - | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | - | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | - | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | - | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | - | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | - | |
amd | epyc_7573x | - | |
amd | epyc_7543p_firmware | - | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | - | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | - | |
amd | epyc_7513 | - | |
amd | epyc_74f3_firmware | - | |
amd | epyc_74f3 | - | |
amd | epyc_7473x_firmware | - | |
amd | epyc_7473x | - | |
amd | epyc_7443p_firmware | - | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | - | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | - | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | - | |
amd | epyc_7373x | - | |
amd | epyc_7313_firmware | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | - | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | - | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | - | |
amd | epyc_72f3 | - | |
amd | epyc_7003_firmware | - | |
amd | epyc_7003 | - | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 37 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*", "matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*", "matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*", "matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*", "matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*", "matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*", "matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*", "matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "211D05DA-2A44-4FC6-9EE4-8A6D713AC967", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*", "matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AADD2AB0-D3F7-43BD-A1FF-3CBE33044661", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*", "matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EB1063F-5264-4036-A2C0-4473E9E5119C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03C008C-2705-42DC-9BC4-DF1414F536A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*", "matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95702F66-17CF-4C92-AF63-CD7A8A54A351", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*", "matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1582461F-9752-43C5-A2E2-099956D94341", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA058E5-3CB8-4C30-AE22-3B6759A5F905", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "856830B6-6EAF-483C-91FD-940EC248E533", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD598982-D2BE-4313-85A7-A2169C08A288", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*", "matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAFF906F-6379-4BFF-8E23-A9AC9AE443DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*", "matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "94221075-DD47-45FD-8A2A-D364573FFDF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*", "matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B9A2B-F23D-4EFE-8ACC-3D8357158D02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "382DA0A9-0ADF-4ECC-AF71-CE021DC8B359", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F67023B-114D-46FC-A26B-23E2BAB8DD61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F54EB87-09B7-4E80-A646-5284B884B059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E157B59-9642-457B-BB3C-FBA629F43CBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62FAEA47-94A3-4C5A-9A6E-4E47A42BA130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1811B5C7-013C-4965-AB2E-B0A089605E42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6A82FC5-5646-47B7-B6BB-84A374DFD864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE02F8EE-421E-4487-8C91-AB2880C7056B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCF86B7B-4028-41C7-938E-8F299568CB19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E33072D-4807-4803-83EA-90D0A721B835", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "540041FD-F241-4EA4-BBBC-16B28449779A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1C9BEEF-1773-4DE0-BB4B-6E8F0D01873D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62878C38-D2E3-452E-98FF-2ED2B6C256B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02B85FAD-49E4-4DE4-BF8B-88F3C9772779", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFCD485-4013-48A4-8D88-F5D53BAC9065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BBC2B42-DEBE-4696-928A-353F48FA9546", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EF33521-012B-45BC-A860-7A5ADAB74488", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE6D732-6F55-4130-B95A-01ACC6EAB85F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC61EAFD-15EA-427B-8419-E6EB2BCD78CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68244A90-6F59-4960-BB91-F2B8A745E2BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6F176F-78BA-4E92-8C3E-0B7C7018F265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E839C5C6-5544-4976-9AE7-55AADA09A48E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "738B7B07-8F15-4DCD-A361-70C1FF9CB4EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B48649-1E70-49CC-8E1A-5262B58A43B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure." }, { "lang": "es", "value": "IBPB no puede evitar que las predicciones de sucursales de retorno sean especificadas por objetivos de sucursales anteriores a IBPB, lo que lleva a una posible divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2022-23824", "lastModified": "2024-11-21T06:49:19.587", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-09T21:15:13.530", "references": [ { "source": "psirt@amd.com", "tags": [ "Mailing List", "Mitigation", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "source": "psirt@amd.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "source": "psirt@amd.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "source": "psirt@amd.com", "url": "https://security.gentoo.org/glsa/202402-07" }, { "source": "psirt@amd.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "source": "psirt@amd.com", "url": "https://www.debian.org/security/2023/dsa-5378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202402-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2023/dsa-5378" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-13 20:15
Modified
2024-11-21 08:01
Severity ?
Summary
Due to a code bug in
Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a
guest to observe an incorrect TSC when Secure TSC is enabled potentially
resulting in a loss of guest integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DC71137-5861-4413-AE37-FBA5EA15CD84", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB947EC3-B3CF-4E35-86C1-DDD831D4518D", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB9F211-8998-44FF-91FE-723BA6315B85", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DCADA15-DE56-4993-977D-5BE701476D46", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1063F18B-600E-46FB-B6DA-95C8D4C32ACD", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF7D4F3A-CE7A-4C84-B872-E1206912AD62", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5D9E427-F642-4EA3-9213-616D4FC5BFCE", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFEA67F1-83B8-461D-8066-91BBD3FD9E24", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B86A8C8F-BEFC-439B-A712-E931CC229708", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6651DED0-FD67-406B-845A-553ABBBCCB02", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "025B7A4B-0CF9-401E-AF18-3581CD04BDB5", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F64D3037-AC84-411D-AF23-2B6E49C26896", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBC1FE8-F91B-407A-B4DC-C3EE38676828", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00B84AD1-3F32-46B5-88D1-50CE43844977", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10654574-BACF-41D7-8B2D-73E2E0CBFBFB", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC29525-306B-4E29-A846-8439487042D6", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC6AF23-8DE0-4402-B707-F9DC3E83B906", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C45FD0CE-4B69-4C95-9EA1-575736A55045", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C2B77A7-357B-4F13-83B9-BB45EB2C1F4A", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6EEB19-3507-439B-912F-C19D3E8D9A96", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEDA7A65-34F0-454C-9040-A7024DB82D6C", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A71852A5-4EBF-4127-B36D-53B113F3CFA3", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32A17247-5FFB-4293-805F-37A2FDE25141", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4046AE4-F5D5-4B82-9E58-5970575E9908", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98F5728-3653-4F17-804A-B658C1195033", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "030095CD-24D9-4033-A0C5-74C55083726D", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7138757-214C-44E2-9873-9F00EAAFFBA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF4299D7-608D-4628-A8FE-DC0DBC09670F", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A25A14B0-641D-4EAE-93C8-2ED73698BA70", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E7978A2-777E-45D1-8036-7A4A72750AD8", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08631494-65FE-4052-A572-AAA959DDC4A7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7D4A0-5D38-4505-A272-03AAFA3C3904", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52910ADE-A9DE-477A-95DE-F8842BDF8BCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3F61F4E-9324-4CC9-B030-33A4B1F1982C", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2552E1CD-3D25-4A86-B435-8A2A4223AE35", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1A672DC-A7F4-4115-907C-89570F552582", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45F37CB5-08DB-4E7A-80B8-789FB445E8F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "865C7A18-D151-4DEA-9279-6EE21CA02EBC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCDF1C52-B820-4F82-9E24-F460180D06F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDD8CF52-1EF0-4718-8FE3-C83103BB2459", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F55ED1-AA9B-476E-AE54-630E8B28911A", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "608CCBAB-A934-4989-82BE-25042F0E5A57", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA2412-28EC-4589-9B3F-78F451EF2048", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7493D0B-1DB4-436E-A297-8F931C2EFBCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDCABE02-1723-4859-B863-805A7C37014B", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CECE4403-4C94-4CF0-983C-76720122738E", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38B20E51-60E2-4309-A6F2-3F3F1F22B325", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \u00a0\n\n\n\n\n" }, { "lang": "es", "value": "Debido a un error de c\u00f3digo en Secure_TSC, el firmware SEV puede permitir que un atacante con altos privilegios haga que un invitado observe un TSC incorrecto cuando Secure TSC est\u00e1 habilitado, lo que podr\u00eda provocar una p\u00e9rdida de integridad del invitado." } ], "id": "CVE-2023-31347", "lastModified": "2024-11-21T08:01:46.837", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-13T20:15:52.790", "references": [ { "source": "psirt@amd.com", "tags": [ "Broken Link" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 18:15
Modified
2024-11-21 05:56
Severity ?
Summary
AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources." }, { "lang": "es", "value": "AMD System Management Unit (SMU) puede experimentar un desbordamiento de enteros cuando se proporciona una longitud no v\u00e1lida, que puede resultar en una potencial p\u00e9rdida de recursos" } ], "id": "CVE-2021-26329", "lastModified": "2024-11-21T05:56:06.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T18:15:07.333", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-130" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-05 16:15
Modified
2024-11-26 19:13
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Summary
Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_embedded_7313_firmware | * | |
amd | epyc_embedded_7313 | - | |
amd | epyc_embedded_7313p_firmware | * | |
amd | epyc_embedded_7313p | - | |
amd | epyc_embedded_7413_firmware | * | |
amd | epyc_embedded_7413 | - | |
amd | epyc_embedded_7443_firmware | * | |
amd | epyc_embedded_7443 | - | |
amd | epyc_embedded_7443p_firmware | * | |
amd | epyc_embedded_7443p | - | |
amd | epyc_embedded_7543_firmware | * | |
amd | epyc_embedded_7543 | - | |
amd | epyc_embedded_7543p_firmware | * | |
amd | epyc_embedded_7543p | - | |
amd | epyc_embedded_7643_firmware | * | |
amd | epyc_embedded_7643 | - | |
amd | epyc_embedded_7713_firmware | * | |
amd | epyc_embedded_7713 | - | |
amd | epyc_embedded_7713p_firmware | * | |
amd | epyc_embedded_7713p | - | |
amd | epyc_embedded_9124_firmware | * | |
amd | epyc_embedded_9124 | - | |
amd | epyc_embedded_9254_firmware | * | |
amd | epyc_embedded_9254 | - | |
amd | epyc_embedded_9354_firmware | * | |
amd | epyc_embedded_9354 | - | |
amd | epyc_embedded_9354p_firmware | * | |
amd | epyc_embedded_9354p | - | |
amd | epyc_embedded_9454_firmware | * | |
amd | epyc_embedded_9454 | - | |
amd | epyc_embedded_9454p_firmware | * | |
amd | epyc_embedded_9454p | - | |
amd | epyc_embedded_9534_firmware | * | |
amd | epyc_embedded_9534 | - | |
amd | epyc_embedded_9554_firmware | * | |
amd | epyc_embedded_9554 | - | |
amd | epyc_embedded_9554p_firmware | * | |
amd | epyc_embedded_9554p | - | |
amd | epyc_embedded_9654_firmware | * | |
amd | epyc_embedded_9654 | - | |
amd | epyc_embedded_9654p_firmware | * | |
amd | epyc_embedded_9654p | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B590923-B6F9-48A2-9BA8-833E22DE2E43", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1BED240-E334-4A8F-9070-D57D54B0ED2A", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84E4A21E-DC60-4ABB-94AD-BDC785717A96", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C1D50EA-07CA-43E0-90A2-6AFE444A5381", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDEAA93E-431A-4476-B431-5983296CCAAD", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED357082-5FDA-4E76-9903-ACE49D241195", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68733A3D-95A9-45A7-B2D4-AD32439DAB08", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "218E19EA-5493-475D-A51E-771BB281D5C2", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85514025-4FC5-4C5B-B6A6-7AC020E192F6", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5710382-A1D0-4E21-AC47-6F14CBE28329", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E47E9840-6143-4355-BFB0-B402FDF16617", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "739AF0E3-62A6-43D0-8ECD-CF7720624613", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC0E511C-CC66-43BE-A907-027828C75403", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5687A37A-3E72-4972-8F1A-A8266DE6A4A3", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C462E4FF-2285-46E1-927B-C8FFB018BF35", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44C45AEA-6436-4012-9A0D-C591A64444A9", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FDB30FD-24BF-4597-97B5-7A3732673DD1", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27A4A53B-F26C-44DF-BABB-C17357A7B549", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F405F5CD-1255-4FD9-902C-45EF0D5C657A", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D65F2DB9-51C0-40CA-B5C9-A85CF43A593D", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2432608F-0E9E-49D5-9A22-2A2A6E89489F", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9403D7F-0349-4CC8-B566-5054E4A96D83", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F512316F-131F-4EAD-A7FA-CFE172AD4FA5", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DF39DE-83FC-4DD2-812A-F2D50AA85ADF", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DC68072-5AEA-4768-9CDB-57303996CA17", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F396A75-7B5E-4544-92B9-7D4EFCD375B9", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FED2F309-48ED-4556-B562-3F01D7FB4141", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B79FF23A-6660-4513-A633-535B7543C8C9", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6FFB29-9DFD-44FE-8AB5-32D8F765164F", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "482B19D4-3695-45A2-9CC7-1C0962414117", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8ACBF4D-E173-477F-8E7C-33DA3C034AF0", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "486F652A-8DDA-4C01-B2DB-A4F981F56016", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5C40AD4-5F07-4F57-89DE-A0658464E4A1", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602C520-8244-4BAA-A483-BC31A5305942", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5088B73-27FC-4AA8-AB57-21EC0E0E7425", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD662D4-8D44-42FE-971C-C501574F6744", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3AD7201-E73D-48FE-87F1-B62715700A70", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAEB0D25-E423-45EF-9E52-57DA7E594429", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F291B-0CE4-4D1D-8A5F-7DF66703C3B8", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E1BBA30-F9D1-4AD9-BAF7-F4D40D356C15", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43DCB063-0676-4615-93FC-64D98ACAAD57", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "492476F9-F8E1-47AB-AAF7-67AADA160678", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A89F3343-7DAC-4662-987E-7629610D3C32", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "714CC372-0E0D-4075-94CD-4723BE694D2D", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB2C6A30-90B5-4E74-A4CA-C69FCB4E1E99", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07058C5-3EDC-4615-B447-2438C534B0E0", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E71A9FF8-E8A4-40C4-8DB1-D28AE4136988", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "489653B2-F305-46B6-A4D6-DFE5DCC855C8", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47A571CB-8C43-4AFB-8115-29FDED7C5EEA", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FF3AE7A-A653-444F-9CAF-DEF8C3F25F36", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E48F9-DEF9-43D4-8643-C1CC4D2EB3D1", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E40AC063-BC83-49B5-81E9-56835D0B72D1", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A154914-D1C7-4549-815D-F1F693EE2B8F", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F0A749-9F6F-4D92-81A6-48C30F59A0EB", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A0D8BC-00E2-48EA-8F2D-C23968326032", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67A78FCF-5F78-41C5-B5D4-32815B76288E", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D51EFBB-2509-47C2-BA48-0FE151B993D0", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DF0D18-EC29-4E7F-8970-9D0355D0EDD5", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A172EB43-4526-4A3E-881D-0B6CC72EEA34", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "429B298B-C825-43F0-86CF-30385D4C56CD", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4179752-A4AC-45DA-8A40-89217197D323", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EFA7374-ED9E-4B25-B600-C34F02AFFCF9", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCF05F1E-CF13-47BF-B7D7-2FD13E2A4E46", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AC9DE15-B2E8-4D9E-BC6D-1007C083D0B7", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADE721FF-4323-4C32-91D6-AC085779E411", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F46B6E3-779A-48D3-9D66-9CC19B1C5060", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCA13D-409D-4E0B-9CB1-72C6F255C145", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "849D773E-AB8F-4044-B791-C886662D8BBF", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "375FC62D-D5B4-4698-A9E8-0AF00FEBBDE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C34A942-5EA7-4CEA-A7CA-C0ADBCC65046", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A4B2FBA-2F9E-44CF-A75A-9BCB30964153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30A546D8-3E31-4D4C-BAAC-607EAC46A4CC", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "A273285D-0615-479C-BE60-D2A73532B39A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D56DA98D-95C5-49E5-9174-DAE1ACEF706F", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92BF19E2-C264-48C3-BB38-A23C7DD67BB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8379370-5081-4FB3-890C-2BF2D602095A", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "93995EDA-88C5-41AE-8A56-08728027F2AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF60A69F-21ED-441C-823C-291026E00715", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F04B63D-AF86-466A-B74D-B1C9B2682DCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "552AAF13-377F-4A95-A580-7D906C6CB6A2", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A737AAD-AA75-41F7-B6A6-1B17D984CED5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFE3AC64-538A-4E18-85CF-063F984D735E", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "81287880-A2F0-4260-AA49-489DC2475118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C559424-D75D-440E-8F92-C1AD1B66421B", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B6488C-8707-40B8-A867-87DDDE1B5625", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7525E902-27DA-4A53-A018-53AF96AA73DB", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C8820F4-879C-4B9A-B10C-756DC6F35317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68E124D1-686C-416C-B9DD-B6380C355D92", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB7E7CEC-B263-4020-90E6-C0B77D8036D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E78BCF22-DC43-4A07-971B-CA6A76B23EEF", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CE47EE2-06B8-434F-BEC4-D2EB5B79AFB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7F6F068-1F61-4EBB-A465-381D4EA696EF", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "26C81497-519E-46A2-9F64-E80C82920E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04591375-2E1D-4DBC-8C9B-2E4D4435F8ED", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFBD9E1E-437B-44E7-B148-88513DA7D50A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57BE0E04-FC43-4437-B35F-F94DC8CC9EA6", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A68F57A9-15AB-459C-8ACC-0BE565D230FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36D36B6C-DC77-4E12-AF09-180ACB86551A", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F6DCA27-D098-40B7-9778-B284044CA34B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE6BAF58-5538-43A9-A5A9-9C1CD420F6E2", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "9737ACC0-18DB-4061-A259-D32C16BDA238", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0B68719-100F-402A-B409-DDE9811B2359", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1C35D8-0C2A-4A63-9D1B-0983E0FDB7E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CD6C041-14A7-459B-A3C9-1A6AB55F6006", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C72561-B0CE-4E51-AC5F-CD7EFDBCC5EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BAFE92-C577-4558-AE15-F3E6524701A4", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F27175DE-83A5-42DB-8F8A-886B1D886277", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption." }, { "lang": "es", "value": "Una validaci\u00f3n de entrada incorrecta en SEV-SNP podr\u00eda permitir que un hipervisor malicioso lea o sobrescriba la memoria del hu\u00e9sped, lo que podr\u00eda provocar una fuga o corrupci\u00f3n de datos." } ], "id": "CVE-2024-21978", "lastModified": "2024-11-26T19:13:33.683", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.2, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-05T16:15:35.193", "references": [ { "source": "psirt@amd.com", "tags": [ "Broken Link" ], "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity." }, { "lang": "es", "value": "Una no comprobaci\u00f3n de los comandos SEV mientras SNP est\u00e1 activo puede resultar en un impacto potencial en la integridad de la memoria" } ], "id": "CVE-2021-26323", "lastModified": "2024-11-21T05:56:05.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.863", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:41
Severity ?
7.2 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
An out of bounds memory write when processing the AMD
PSP1 Configuration Block (APCB) could allow an attacker with access the ability
to modify the BIOS image, and the ability to sign the resulting image, to
potentially modify the APCB block resulting in arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BB5D70A-1627-4878-8F12-FB439C2BB2F0", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80BEF1BA-4533-40CA-8DC6-FCB6D9A291C4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "948D4C27-EBB2-4578-BE09-2F237B9B8D59", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C1AD7A8-7E0F-4EDD-B93F-D4800D54D776", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32FA4160-368C-46AC-A7DD-623CB8CF1F01", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36F046AD-A8BC-4BE1-812F-99E096779C77", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "910DFF12-DF71-444C-89A0-10CFE6A1BAA4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out of bounds memory write when processing the AMD\nPSP1 Configuration Block (APCB) could allow an attacker with access the ability\nto modify the BIOS image, and the ability to sign the resulting image, to\npotentially modify the APCB block resulting in arbitrary code execution." }, { "lang": "es", "value": "Una escritura de memoria fuera de los l\u00edmites al procesar el bloque de configuraci\u00f3n AMD PSP1 (APCB) podr\u00eda permitir que un atacante con acceso a la capacidad de modificar la imagen del BIOS y la capacidad de firmar la imagen resultante modifique potencialmente el bloque APCB, lo que resultar\u00eda en la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2021-26344", "lastModified": "2024-12-12T20:41:30.647", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.6, "impactScore": 6.0, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:17.113", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient input validation of mailbox data in the
SMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially
leading to a loss of integrity and privilege escalation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "263AB8A4-3F7B-438F-808D-742FCCA4C51C", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71C28200-421A-4CAB-9D6A-D05C9F56A4FD", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "425EC5D5-CF0C-416F-91DA-0BC6EF24237A", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F821EFAC-1FDA-433E-880B-3B5E165708BE", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9DC9C16-E1C3-4A45-ADF6-17F0A763CB41", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5804A608-E90A-4EA3-9FE3-48B839B250F0", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FC3377B-6BE5-4044-9FBB-73CD0BF511F3", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A788DBB-D426-4200-BFF6-85DB621D0081", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BC50066-6F94-4D7C-A13F-D2AC82D0F78D", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B07E5CE-AF11-4604-AA3D-389A93BA4A04", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE405A6E-591B-4071-A85A-CA0E58A20C5B", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9208F862-3ECD-43F6-932F-3B12BAB90A3B", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF7B3F45-D6F0-4C1A-B119-8BA44721DD29", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5810391D-A9D5-4143-88C3-768FC209DEB5", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD06657-B191-42D9-A617-253116A94214", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DD1876D-FA52-416F-AE70-46501E485BDE", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D11F267-D5DF-46A8-8835-8D204A8090E2", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7940013E-9F28-463B-AE85-CD1D9C191322", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F17D48A-00D1-45C1-9235-9889561E5A5E", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "420022FB-EF46-4D78-B9A3-C21F16895F1B", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3F2ADB-9CBA-4F23-BB30-26D7DD096EC5", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0EB4211-6B22-4B04-93EC-BAE8E0515548", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3490F5BE-9886-4596-B79C-C79B70822C6D", "versionEndExcluding": "milanpi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "443D8E0D-0925-47D8-A4B3-92C8844D4638", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F1AD346-06F8-45ED-9A29-7DD29F3D455C", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F7673A0-B47C-4C12-A222-502539B85F13", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7560995-416D-4A35-A225-AE579A89358B", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C895A49-6CF7-4738-9EF1-97A3B157FE88", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A291ADDC-B41D-44A3-9B99-49776559CCBD", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2567694E-5C61-4A71-A5B5-C81D0A223C3E", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E51399D-D55B-44E4-B153-5E905C8196A6", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "942F0900-CF74-4E28-ADDA-79235BFF12A5", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC04CEC8-2F79-4958-82CB-38E512A06400", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "767D0D61-E6A1-42DE-ACFD-A4FF45DDB9C2", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D78C54BB-3A1B-41D8-B757-4B3CD5429804", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C5E345B-2760-464C-A323-C9D580959E27", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A88F9F24-FDF9-488E-A758-298BFDDDB1F3", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E396A-8669-4659-BD82-723B744E6133", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21627FCD-778E-4560-BB99-8BA950927ED2", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BF92ECF-74F1-4F94-B905-C3968A05BF2D", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32A4BF40-FFED-4415-B1B2-912D2E0F3F65", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64F4BFB2-EC76-422A-AC64-CC6947C9D05F", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51F8F1AB-8F58-4AA3-BF9B-2B5D874996F1", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DE74ABF-E9E7-4B36-B048-E750CA5E7D86", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CA71EFF-0B7E-47AF-B3B7-B847287760E4", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "200C2271-219C-492B-85E4-B2A2FD07F6B7", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48B4109E-D323-4C16-9EF7-3C464A649BCF", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC92B429-9743-4B8A-89E0-045357287E06", "versionEndExcluding": "romepi_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation of mailbox data in the\nSMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially\nleading to a loss of integrity and privilege escalation.\n\n\n\n" } ], "id": "CVE-2021-26379", "lastModified": "2024-11-21T05:56:15.457", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:10.863", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E499C61-3359-4640-B128-DD3530196F87", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16D8C19A-DFE6-46EE-B6FC-4B31A2207161", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03DE77AA-3E25-4118-AA8C-8C11BDAF60B5", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "967966C5-D889-4957-AEF8-B4C6AA862406", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C781429D-A2AB-49DD-BD4F-D6927DA8F70A", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5480AFE-B8EE-4B93-85FD-4EED10F971C4", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A07311-E3ED-4CD0-BC38-45D64F0D0028", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01EE19CC-0038-495B-9045-D83FA24BD957", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5D76DE0-48AB-4836-AE06-BD2765AD4B28", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80B95B1D-1BD2-483D-9B7A-BEFDFB55D89A", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E41600C-05BB-4248-8D67-406ABD618273", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A89D1AC-1027-4B97-808D-04855045DDAC", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "381F0305-767D-4844-A4BF-65D6DB0477F1", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C27DB3DA-51DA-4BA7-A73D-E73DFD1BDF76", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA5AF78B-E2B7-477A-8889-6AA2B0349FF3", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE9B914A-9E5C-497E-8FC5-65D088F7C357", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64DBC1A7-5FE9-40F1-9E7F-5034F5DBDCCF", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4C42E77-6F6B-4D30-9321-3C5DFFD21C06", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEAD9EE6-380B-4E07-BB5D-3255CD48200E", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18B9F85B-1E48-4A4F-A7D9-D5AD2B60D94B", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60E3CD4B-2468-4823-83CD-349B6D279E14", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E9D3B-7317-48DD-AF1A-F743960E3F8D", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9784ACCC-205F-4D8E-813B-3D80207EE865", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3B3FB12-65E2-40AF-8C2D-17021B5C182D", "versionEndExcluding": "milanpi_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.\n\n\n" }, { "lang": "es", "value": "Una validaci\u00f3n insuficiente en los comandos ASP BIOS y DRTM puede permitir que el software supervisor x86 malicioso revele el contenido de la memoria confidencial, lo que puede resultar en la divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2021-26343", "lastModified": "2024-11-21T05:56:09.520", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:10.503", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0094538-161A-4877-9247-EA6DD83C9E54", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5841138E-BDAC-4F59-9BC8-9313A49DBECB", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAD73E1A-C4E6-4ECA-907C-99F84DBC7765", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FB232-0930-4F05-A4EC-D06DBED8E54A", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21B5752-F187-4BA9-94E8-C6525C7824A2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5EA931-ED74-4086-B9A9-9F1A9A359590", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E603AC01-F362-4B2E-9A08-DF2C24A49DDD", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F384C3-11D5-42EB-BF44-A6707358E063", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0A9A96-25CF-47AC-9AF3-96725B3863E4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E3EC-4358-4A82-807B-BBA7F03D5884", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA8E2F-2E73-47AD-B671-A952B9A4BFD6", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62B278C-BF08-4CC2-A843-1888AEF37638", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88713545-D2E4-47CC-8F5F-EAEE0CF53BF2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E4971-594B-4D1E-AFD5-D6B8A8B8F8A8", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "576BF517-1021-48AA-A065-305A50F9645D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B6DBC4-F298-45E1-90FF-A87AEA06810E", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08067DB-AD49-4B3D-BCBB-A4C9A7D9E7F4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B1F0A4-655A-44B9-87C0-B8A8F95B2BE0", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFDB2131-CDC3-463D-958F-0BF8D0FF5EA2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED75D47-160E-4E80-ADC6-4F84748231D5", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45F46F-A3C0-4FA4-BCB6-DD1A8DC0E190", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service." }, { "lang": "es", "value": "Una condici\u00f3n de carrera TOCTOU en SMU podr\u00eda permitir a la persona que llama obtener y manipular la direcci\u00f3n de un registro de puerto de mensajes, lo que podr\u00eda resultar en una potencial denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26350", "lastModified": "2024-11-21T05:56:11.013", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.467", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted." }, { "lang": "es", "value": "Existe una posible vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el chipset integrado que puede permitir a un atacante malicioso colgar el sistema cuando se reinicie" } ], "id": "CVE-2020-12988", "lastModified": "2024-11-21T05:00:37.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-11T22:15:11.603", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-13 12:15
Modified
2024-11-21 05:56
Severity ?
Summary
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p | - | |
amd | epyc_7251 | - | |
amd | epyc_7252 | - | |
amd | epyc_7261 | - | |
amd | epyc_7262 | - | |
amd | epyc_7272 | - | |
amd | epyc_7281 | - | |
amd | epyc_7282 | - | |
amd | epyc_72f3 | - | |
amd | epyc_7301 | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p | - | |
amd | epyc_7343 | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p | - | |
amd | epyc_7352 | - | |
amd | epyc_7371 | - | |
amd | epyc_73f3 | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p | - | |
amd | epyc_7413 | - | |
amd | epyc_7443 | - | |
amd | epyc_7443p | - | |
amd | epyc_7451 | - | |
amd | epyc_7452 | - | |
amd | epyc_7453 | - | |
amd | epyc_74f3 | - | |
amd | epyc_7501 | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p | - | |
amd | epyc_7513 | - | |
amd | epyc_7532 | - | |
amd | epyc_7542 | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p | - | |
amd | epyc_7552 | - | |
amd | epyc_75f3 | - | |
amd | epyc_7601 | - | |
amd | epyc_7642 | - | |
amd | epyc_7643 | - | |
amd | epyc_7662 | - | |
amd | epyc_7663 | - | |
amd | epyc_7702 | - | |
amd | epyc_7702p | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p | - | |
amd | epyc_7742 | - | |
amd | epyc_7763 | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12 | - | |
amd | epyc_embedded_3101 | - | |
amd | epyc_embedded_3151 | - | |
amd | epyc_embedded_3201 | - | |
amd | epyc_embedded_3251 | - | |
amd | epyc_embedded_3255 | - | |
amd | epyc_embedded_3351 | - | |
amd | epyc_embedded_3451 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*", "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*", "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*", "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor." }, { "lang": "es", "value": "En la funcionalidad SEV/SEV-ES de AMD, la memoria puede ser reorganizada en el espacio de direcciones del invitado que no es detectado por el mecanismo de certificaci\u00f3n que podr\u00eda ser utilizado por un hypervisor malicioso para conllevar potencialmente a una ejecuci\u00f3n de c\u00f3digo arbitraria dentro de la VM invitada si un administrador malicioso tiene acceso para comprometer el hypervisor del servidor" } ], "id": "CVE-2021-26311", "lastModified": "2024-11-21T05:56:04.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-13T12:15:07.597", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 06:49
Severity ?
Summary
Insufficient input validation on the model
specific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest
memory integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.9 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.9 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.9 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.9 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.9 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.9 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.9 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation on the model\nspecific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest\nmemory integrity.\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2022-23818", "lastModified": "2024-11-21T06:49:18.543", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:11.367", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 07:41
Severity ?
Summary
Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.\n" }, { "lang": "es", "value": "Las comprobaciones limitadas insuficientes en la SMU pueden permitir que un atacante actualice la SRAM desde/hacia el espacio de direcciones a un valor no v\u00e1lido, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20531", "lastModified": "2024-11-21T07:41:05.873", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:14.027", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-11 14:15
Modified
2024-11-21 07:41
Severity ?
Summary
A privileged attacker
can prevent delivery of debug exceptions to SEV-SNP guests potentially
resulting in guests not receiving expected debug information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | - | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | - | |
amd | epyc_7713 | - | |
amd | epyc_7663p_firmware | - | |
amd | epyc_7663p | - | |
amd | epyc_7663_firmware | - | |
amd | epyc_7663 | - | |
amd | epyc_7643p_firmware | - | |
amd | epyc_7643p | - | |
amd | epyc_7773x_firmware | - | |
amd | epyc_7773x | - | |
amd | epyc_7643_firmware | - | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | - | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | - | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | - | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | - | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | - | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | - | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | - | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | - | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | - | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | - | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | - | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | - | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | - | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | - | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | - | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | - | |
amd | epyc_7313 | - | |
amd | epyc_7303p_firmware | - | |
amd | epyc_7303p | - | |
amd | epyc_7303_firmware | - | |
amd | epyc_7303 | - | |
amd | epyc_72f3_firmware | - | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | - | |
amd | epyc_7203p | - | |
amd | epyc_7203_firmware | - | |
amd | epyc_7203 | - | |
amd | epyc_9654p_firmware | - | |
amd | epyc_9654p | - | |
amd | epyc_9654_firmware | - | |
amd | epyc_9654 | - | |
amd | epyc_9634_firmware | - | |
amd | epyc_9634 | - | |
amd | epyc_9554p_firmware | - | |
amd | epyc_9554p | - | |
amd | epyc_9554_firmware | - | |
amd | epyc_9554 | - | |
amd | epyc_9534_firmware | - | |
amd | epyc_9534 | - | |
amd | epyc_9474f_firmware | - | |
amd | epyc_9474f | - | |
amd | epyc_9454p_firmware | - | |
amd | epyc_9454p | - | |
amd | epyc_9454_firmware | - | |
amd | epyc_9454 | - | |
amd | epyc_9374f_firmware | - | |
amd | epyc_9374f | - | |
amd | epyc_9354p_firmware | - | |
amd | epyc_9354p | - | |
amd | epyc_9354_firmware | - | |
amd | epyc_9354 | - | |
amd | epyc_9334_firmware | - | |
amd | epyc_9334 | - | |
amd | epyc_9274f_firmware | - | |
amd | epyc_9274f | - | |
amd | epyc_9254_firmware | - | |
amd | epyc_9254 | - | |
amd | epyc_9224_firmware | - | |
amd | epyc_9224 | - | |
amd | epyc_9174f_firmware | - | |
amd | epyc_9174f | - | |
amd | epyc_9124_firmware | - | |
amd | epyc_9124 | - | |
amd | epyc_9684x_firmware | - | |
amd | epyc_9684x | - | |
amd | epyc_9384x_firmware | - | |
amd | epyc_9384x | - | |
amd | epyc_9184x_firmware | - | |
amd | epyc_9184x | - | |
amd | epyc_9754_firmware | - | |
amd | epyc_9754 | - | |
amd | epyc_9754s_firmware | - | |
amd | epyc_9754s | - | |
amd | epyc_9734_firmware | - | |
amd | epyc_9734 | - | |
amd | epyc_8534p_firmware | - | |
amd | epyc_8534p | - | |
amd | epyc_8534pn_firmware | - | |
amd | epyc_8534pn | - | |
amd | epyc_8434p_firmware | - | |
amd | epyc_8434p | - | |
amd | epyc_8434pn_firmware | - | |
amd | epyc_8434pn | - | |
amd | epyc_8324p_firmware | - | |
amd | epyc_8324p | - | |
amd | epyc_8324pn_firmware | - | |
amd | epyc_8324pn | - | |
amd | epyc_8224p_firmware | - | |
amd | epyc_8224p | - | |
amd | epyc_8224pn_firmware | - | |
amd | epyc_8224pn | - | |
amd | epyc_8124p_firmware | - | |
amd | epyc_8124p | - | |
amd | epyc_8124pn_firmware | - | |
amd | epyc_8124pn | - | |
amd | epyc_8024p_firmware | - | |
amd | epyc_8024p | - | |
amd | epyc_8024pn_firmware | - | |
amd | epyc_8024pn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFD3E8F9-8EE0-44F7-8065-C7B631BDA485", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CEC0B5B-B5F6-4CB3-937A-F1F091E399A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E1E4DA9-9D03-470B-B314-DDC2248B1C52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA9A188F-6E38-41D5-83FF-0389E2E07A44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "857CC046-3CB1-425E-B7A2-1CD2C1B79949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D045B33D-897C-4EBF-B2FF-7C3B9A69377E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7D70506-EDBC-4ED9-9AD3-925610C03D7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F50338E3-725A-455F-9680-F700F5690057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37E9F62C-4DF2-45A6-BDC1-20AA24E85BF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D43773D-4565-4273-A719-ACEAEBD679D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F36AB-0E6D-4854-A86B-3DE9AD084879", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ED7A173-AAB9-4EEF-957F-7940EB22F4A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5F0F8E5-32F2-40C9-814A-663A19B37D1D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5BC4AC-09CF-456A-8021-E931D61B09DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E61EB9F-8AF9-49FC-B142-B109DA826E66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DC4D67-1C38-4118-BED6-71E5727CA55A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E56DB5A-965B-4448-86C8-2E417665E4F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E06330-E43A-4A35-AE5D-FCC7E792C514", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "947EE825-C45D-4090-9855-260AA9903E5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC521A8E-84A4-4831-8433-3CA909226FE5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E5F12-4818-4D67-B27C-36744D5F9B71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35151FC3-1B84-4BD5-8B99-EAFD3BAFCC9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "379AAAA6-F0BA-43AA-AFC6-CC1F4FACBEF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EA7278D-8165-4E5C-A9ED-F465B2A2D2E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B1A2179-8415-460D-959B-1917AA2FCED7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "421268E7-3C0D-42FB-90A8-6BA8E4A29F9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7889643-98F3-49E8-BD57-2DE56CC72B95", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D4BC04-155E-4A68-BFBD-9F7D81DB3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3A52919-B5ED-41F6-9CC6-C8468812322F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8916EDB2-B9BA-4FA7-9591-DFB2E00DDC96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B98D-B612-4D50-9BAF-1C92FC7939A2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91763C36-8C02-4F4C-A544-9AC43F1A0CCA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C1DD8B-5C64-4CB8-9C79-3A567920AC3D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30D362F8-2685-4D66-BDC1-4D6CD0D9B8AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "976E774E-C87E-402A-9528-C8F1456720CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23BF0DBE-5649-4A00-998A-83EE9EB9EC7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8F83F3A-A712-4144-9EF7-DA1DFFA75E7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FDA370-1E31-4D68-A532-ECADEB579D16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D9FD90-C289-4AD1-B52E-6943ADAFB681", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6758649E-A61D-40D7-82F0-C4F5BC2B3D85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1412B1-093D-4063-B55D-F258A2FE66DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22E0EE5E-5F74-4A75-8401-2F1A8CB17138", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n" }, { "lang": "es", "value": "Un atacante con privilegios puede impedir la entrega de excepciones de depuraci\u00f3n a invitados SEV-SNP, lo que podr\u00eda provocar que los invitados no reciban la informaci\u00f3n de depuraci\u00f3n esperada." } ], "id": "CVE-2023-20573", "lastModified": "2024-11-21T07:41:09.177", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-11T14:15:43.963", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient checks in System Management Unit (SMU) FeatureConfig may result in reenabling features potentially resulting in denial of resources and/or denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3300 | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - | |
amd | ryzen_5_5600g_firmware | * | |
amd | ryzen_5_5600g | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_3990x_firmware | * | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_3970x_firmware | * | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3960x_firmware | * | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_1950x_firmware | * | |
amd | ryzen_threadripper_1950x | - | |
amd | ryzen_threadripper_1920x_firmware | * | |
amd | ryzen_threadripper_1920x | - | |
amd | ryzen_threadripper_1900x_firmware | * | |
amd | ryzen_threadripper_1900x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | * | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | * | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | * | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | * | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | * | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0094538-161A-4877-9247-EA6DD83C9E54", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5841138E-BDAC-4F59-9BC8-9313A49DBECB", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAD73E1A-C4E6-4ECA-907C-99F84DBC7765", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FB232-0930-4F05-A4EC-D06DBED8E54A", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21B5752-F187-4BA9-94E8-C6525C7824A2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5EA931-ED74-4086-B9A9-9F1A9A359590", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E603AC01-F362-4B2E-9A08-DF2C24A49DDD", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F384C3-11D5-42EB-BF44-A6707358E063", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0A9A96-25CF-47AC-9AF3-96725B3863E4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E3EC-4358-4A82-807B-BBA7F03D5884", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA8E2F-2E73-47AD-B671-A952B9A4BFD6", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62B278C-BF08-4CC2-A843-1888AEF37638", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88713545-D2E4-47CC-8F5F-EAEE0CF53BF2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E4971-594B-4D1E-AFD5-D6B8A8B8F8A8", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "576BF517-1021-48AA-A065-305A50F9645D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B6DBC4-F298-45E1-90FF-A87AEA06810E", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08067DB-AD49-4B3D-BCBB-A4C9A7D9E7F4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B1F0A4-655A-44B9-87C0-B8A8F95B2BE0", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFDB2131-CDC3-463D-958F-0BF8D0FF5EA2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED75D47-160E-4E80-ADC6-4F84748231D5", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45F46F-A3C0-4FA4-BCB6-DD1A8DC0E190", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F45285B-E6D7-404F-9A04-D102F720AD0F", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84521477-8F0E-47C0-A605-62F168FBAC5B", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DDE5209-41F7-4C8B-AB02-CED82D78FC2D", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6930FCB0-CFC6-4A46-B373-DA6F805F82D6", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AF1AF4-3DE9-49A8-8CA9-B27F6A1C8E38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C69B1D1-DE50-4D70-821E-FDE2049C9107", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70F3D9FE-3025-4CE9-834B-755E79A20C38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A93567B-2DA9-44B2-AB09-E7A6706588F5", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5621CF89-55BD-41F0-8A31-211D42157DE2", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "499FAFEA-A965-47A2-B1DB-B262B189C91F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A70A1A9A-D8A2-4A2B-8058-FE92E1FEAB07", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51592960-E74B-4414-A4F8-209D3D29D49F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC7064C1-67AF-4A2F-A284-846700D45614", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBE28F-9DF5-4D9C-BCC2-0D2ACB9D6B8F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6B2EB39-833A-40E7-9C0D-797D1878C925", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5012CEC2-A60C-433F-ACDE-0FF589E9EE50", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE56DEA5-F95E-465F-A93F-047D8765ACD7", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DF3D087-A373-435E-9085-B4D436259FEA", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27705130-C969-416F-94DF-4ACF94AEBE6F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27B3BE05-DBBC-471B-9052-D6FEAC051033", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F94DE3D-D26D-4B40-BF1B-E8269BEEA817", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07A724-54FB-40D1-8CD4-3D8636EF3E09", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0840EC2-3616-4E41-B806-BAB03FBC8EE5", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14B2D769-233B-42EB-BE17-F1A857B48863", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43A08D27-BC7C-464B-9250-578E80AB718F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC4DDD43-4F29-45B2-B56F-5731F9495E6C", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "82854E42-76EC-4428-9975-B5FBC8DC6FF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D248B1FF-E981-4F0A-BDD7-22B64159F050", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B92717AF-0F69-4A7D-BC06-B0E287AA8008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9400C6E0-11E8-4FD4-A559-6254FC7509CC", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "304C61BE-2438-49EE-A581-4A4EEC2923E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F6FEDE-E686-4FCC-AA4B-9E28060506C4", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F63D4BA1-0706-4137-8492-5A5AC76D6F45", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE382518-267B-4411-8A6F-6AE41DDF49D2", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F85495-9937-40DC-AD18-2285CE8F40BA", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65339D06-D1ED-49EB-A172-6071F3510E09", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69A0A6DA-EFF8-4DC8-BB52-FC35A5260C24", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "153A5BA3-D730-45C6-9660-002E6512BCA1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5269FF7-5220-4707-9642-138D59438AC1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E004F6-3488-48EB-A2B0-ABBE32729139", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F7E6D13-6343-4A2B-AF6F-044B9E93C656", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9297E-63CD-4956-8C3F-417EF8AB27DF", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA0C644-DFE5-432E-8078-45BEC5681519", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A2A1A42-FA9E-4CA3-A666-7EF61D8ED794", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B02CD770-8BD6-4798-8D0B-175F5765765B", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "022C4CD1-F9F5-46F8-A502-93103C771784", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78B69DE-A3CF-45E1-AB93-C73066A619D0", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "178F2AF6-0F65-4F56-B429-A93D31DFF4EB", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4F754E-EB1A-409D-A84C-F8E8D1C54037", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E89A3B6B-EA14-4DF8-9B2F-97E74715D8F3", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEA674FE-CC7E-4D7F-9AE1-4A9A3C695224", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FAE5380-5C41-4ECC-96DF-EDCEE06AA36F", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC0C3FD4-2D4B-43F7-BD9C-39B9B71444CC", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5DCC668-E44F-4004-A500-B53D37A96DFD", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AC44D47-0B13-4607-BE44-F351092E33FF", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DAA9292-6C8D-44DA-8B67-6E26E0619BFC", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99656971-4F6C-48F4-89A3-52FFF15D934C", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F55EEAA-2E20-4DBB-860F-010A757B9B3E", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE217D96-C33E-470B-9BC9-36AA6C257BEA", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB01C6CC-2F9A-487C-A587-62622DA75AAF", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C08A1B2-1DF1-474B-BB5E-3085A03C9BE6", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "262E6ECB-AAA9-4DFF-A7A2-C4457087A49F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51CC1E13-BED2-4CE5-9BDF-D177B788E5A1", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B745B7F-DDD9-4DAF-8511-76F2C4F7FA20", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB99535-B654-4F63-A30A-F51FF934694B", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0989D19D-9721-47AF-B4F1-3DAFE98FE52A", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABEC5CE9-E81B-4D7C-A565-09D7B03ABC5A", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F319382-49F1-4472-9018-7067033C1A23", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33A6688A-CDC4-4005-9EC4-9EB5FA155C81", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF72CC78-4AEA-415F-82E5-B4BCE683A679", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDAD11-FB62-4F46-92C4-8EA4200218C4", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9766178-B8A2-40F2-AAFC-9999A1F672F1", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7D66CE6-6D34-4247-9A54-2723E9D458AD", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F0E769-09E3-4D99-81E3-4419794478C8", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BC71F5-5048-43A6-A87A-F87B446243F3", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "886EE0BF-C13C-43E2-B2C7-F7CE2B0E8472", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38845C5E-1761-4722-8368-B9439A0DAB14", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "657F1F0E-DDC7-43E7-95AB-70515CB78B7F", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient checks in System Management Unit (SMU) FeatureConfig may result in reenabling features potentially resulting in denial of resources and/or denial of service." }, { "lang": "es", "value": "Unas comprobaciones insuficientes en la FeatureConfig de la Unidad de Administraci\u00f3n del Sistema (SMU) pueden resultar en una nueva habilitaci\u00f3n de las funciones que podr\u00eda resultar en una denegaci\u00f3n de recursos y/o una denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26376", "lastModified": "2024-11-21T05:56:15.030", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.667", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F344A9F-BD89-49B6-9DF1-7B7CC48DFEFB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31595722-F102-447D-9BAE-9C36567342DD", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C66D2D-BFCB-430C-8A18-FC3C21D2BD40", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD14E00-D597-4099-B4DF-58EE8EEE0B2E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C98C8F3-752C-460D-A192-71EF9AE15824", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.\n\n" }, { "lang": "es", "value": "Una protecci\u00f3n y controles insuficientes en System Management Unit (SMU) pueden dar como resultado el acceso a registros de puertos de mensajes no v\u00e1lidos que podr\u00edan resultar en una posible denegaci\u00f3n de servicio." } ], "id": "CVE-2021-26355", "lastModified": "2024-11-21T05:56:11.930", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:11.383", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 18:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | ||
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." }, { "lang": "es", "value": "Un fallo en el vaciado del Translation Lookaside Buffer (TLB) de la unidad de gesti\u00f3n de memoria de E/S (IOMMU) puede hacer que un dispositivo de E/S escriba en una memoria a la que no deber\u00eda poder acceder, lo que puede provocar una p\u00e9rdida de integridad." } ], "id": "CVE-2021-26312", "lastModified": "2024-11-21T05:56:04.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T18:15:07.177", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 06:34
Severity ?
Summary
Improper validation of DRAM addresses in SMU may
allow an attacker to overwrite sensitive memory locations within the ASP
potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.9 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.9 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.9 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.9 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.9 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.9 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.9 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.e | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.e | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.e | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.e | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.e | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.e | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.e | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.e | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.e | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.e | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.e | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.e | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.e | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.e | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.e | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.e | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.e | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.e | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.e | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.e | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.e | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.e | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.e | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.e | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.e | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper validation of DRAM addresses in SMU may\nallow an attacker to overwrite sensitive memory locations within the ASP\npotentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-46764", "lastModified": "2024-11-21T06:34:40.283", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:11.160", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 06:34
Severity ?
Summary
Improper input validation in ABL may enable an
attacker with physical access, to perform arbitrary memory overwrites,
potentially leading to a loss of integrity and code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.9 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.9 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.9 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.9 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.9 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.9 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.9 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.e | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.e | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.e | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.e | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.e | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.e | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.e | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.e | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.e | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.e | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.e | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.e | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.e | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.e | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.e | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.e | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.e | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.e | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.e | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.e | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.e | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.e | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.e | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.e | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.e | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in ABL may enable an\nattacker with physical access, to perform arbitrary memory overwrites,\npotentially leading to a loss of integrity and code execution.\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-46775", "lastModified": "2024-11-21T06:34:41.953", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:11.240", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:00
Severity ?
Summary
A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections." }, { "lang": "es", "value": "Se presenta una vulnerabilidad potencial en AMD Platform Security Processor (PSP) que puede permitir a un atacante poner a cero cualquier registro privilegiado en la Red de Administraci\u00f3n del Sistema, que puede conllevar a una omisi\u00f3n de las protecciones de la ROM SPI" } ], "id": "CVE-2020-12961", "lastModified": "2024-11-21T05:00:35.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.537", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3300 | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - | |
amd | ryzen_5_5600g_firmware | * | |
amd | ryzen_5_5600g | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_3990x_firmware | * | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_3970x_firmware | * | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3960x_firmware | * | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_1950x_firmware | * | |
amd | ryzen_threadripper_1950x | - | |
amd | ryzen_threadripper_1920x_firmware | * | |
amd | ryzen_threadripper_1920x | - | |
amd | ryzen_threadripper_1900x_firmware | * | |
amd | ryzen_threadripper_1900x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | * | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | * | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | * | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | * | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | * | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0094538-161A-4877-9247-EA6DD83C9E54", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5841138E-BDAC-4F59-9BC8-9313A49DBECB", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAD73E1A-C4E6-4ECA-907C-99F84DBC7765", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FB232-0930-4F05-A4EC-D06DBED8E54A", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21B5752-F187-4BA9-94E8-C6525C7824A2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5EA931-ED74-4086-B9A9-9F1A9A359590", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E603AC01-F362-4B2E-9A08-DF2C24A49DDD", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F384C3-11D5-42EB-BF44-A6707358E063", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0A9A96-25CF-47AC-9AF3-96725B3863E4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E3EC-4358-4A82-807B-BBA7F03D5884", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA8E2F-2E73-47AD-B671-A952B9A4BFD6", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62B278C-BF08-4CC2-A843-1888AEF37638", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88713545-D2E4-47CC-8F5F-EAEE0CF53BF2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E4971-594B-4D1E-AFD5-D6B8A8B8F8A8", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "576BF517-1021-48AA-A065-305A50F9645D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B6DBC4-F298-45E1-90FF-A87AEA06810E", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08067DB-AD49-4B3D-BCBB-A4C9A7D9E7F4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B1F0A4-655A-44B9-87C0-B8A8F95B2BE0", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFDB2131-CDC3-463D-958F-0BF8D0FF5EA2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED75D47-160E-4E80-ADC6-4F84748231D5", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45F46F-A3C0-4FA4-BCB6-DD1A8DC0E190", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F45285B-E6D7-404F-9A04-D102F720AD0F", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84521477-8F0E-47C0-A605-62F168FBAC5B", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DDE5209-41F7-4C8B-AB02-CED82D78FC2D", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6930FCB0-CFC6-4A46-B373-DA6F805F82D6", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AF1AF4-3DE9-49A8-8CA9-B27F6A1C8E38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C69B1D1-DE50-4D70-821E-FDE2049C9107", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70F3D9FE-3025-4CE9-834B-755E79A20C38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A93567B-2DA9-44B2-AB09-E7A6706588F5", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5621CF89-55BD-41F0-8A31-211D42157DE2", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "499FAFEA-A965-47A2-B1DB-B262B189C91F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A70A1A9A-D8A2-4A2B-8058-FE92E1FEAB07", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51592960-E74B-4414-A4F8-209D3D29D49F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC7064C1-67AF-4A2F-A284-846700D45614", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBE28F-9DF5-4D9C-BCC2-0D2ACB9D6B8F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6B2EB39-833A-40E7-9C0D-797D1878C925", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5012CEC2-A60C-433F-ACDE-0FF589E9EE50", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE56DEA5-F95E-465F-A93F-047D8765ACD7", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DF3D087-A373-435E-9085-B4D436259FEA", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27705130-C969-416F-94DF-4ACF94AEBE6F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27B3BE05-DBBC-471B-9052-D6FEAC051033", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F94DE3D-D26D-4B40-BF1B-E8269BEEA817", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07A724-54FB-40D1-8CD4-3D8636EF3E09", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0840EC2-3616-4E41-B806-BAB03FBC8EE5", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14B2D769-233B-42EB-BE17-F1A857B48863", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43A08D27-BC7C-464B-9250-578E80AB718F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC4DDD43-4F29-45B2-B56F-5731F9495E6C", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "82854E42-76EC-4428-9975-B5FBC8DC6FF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D248B1FF-E981-4F0A-BDD7-22B64159F050", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B92717AF-0F69-4A7D-BC06-B0E287AA8008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9400C6E0-11E8-4FD4-A559-6254FC7509CC", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "304C61BE-2438-49EE-A581-4A4EEC2923E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F6FEDE-E686-4FCC-AA4B-9E28060506C4", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F63D4BA1-0706-4137-8492-5A5AC76D6F45", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE382518-267B-4411-8A6F-6AE41DDF49D2", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F85495-9937-40DC-AD18-2285CE8F40BA", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65339D06-D1ED-49EB-A172-6071F3510E09", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69A0A6DA-EFF8-4DC8-BB52-FC35A5260C24", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "153A5BA3-D730-45C6-9660-002E6512BCA1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5269FF7-5220-4707-9642-138D59438AC1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E004F6-3488-48EB-A2B0-ABBE32729139", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F7E6D13-6343-4A2B-AF6F-044B9E93C656", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9297E-63CD-4956-8C3F-417EF8AB27DF", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA0C644-DFE5-432E-8078-45BEC5681519", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A2A1A42-FA9E-4CA3-A666-7EF61D8ED794", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B02CD770-8BD6-4798-8D0B-175F5765765B", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "022C4CD1-F9F5-46F8-A502-93103C771784", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78B69DE-A3CF-45E1-AB93-C73066A619D0", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "178F2AF6-0F65-4F56-B429-A93D31DFF4EB", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4F754E-EB1A-409D-A84C-F8E8D1C54037", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E89A3B6B-EA14-4DF8-9B2F-97E74715D8F3", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEA674FE-CC7E-4D7F-9AE1-4A9A3C695224", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FAE5380-5C41-4ECC-96DF-EDCEE06AA36F", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC0C3FD4-2D4B-43F7-BD9C-39B9B71444CC", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5DCC668-E44F-4004-A500-B53D37A96DFD", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AC44D47-0B13-4607-BE44-F351092E33FF", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DAA9292-6C8D-44DA-8B67-6E26E0619BFC", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99656971-4F6C-48F4-89A3-52FFF15D934C", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F55EEAA-2E20-4DBB-860F-010A757B9B3E", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE217D96-C33E-470B-9BC9-36AA6C257BEA", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB01C6CC-2F9A-487C-A587-62622DA75AAF", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C08A1B2-1DF1-474B-BB5E-3085A03C9BE6", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "262E6ECB-AAA9-4DFF-A7A2-C4457087A49F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51CC1E13-BED2-4CE5-9BDF-D177B788E5A1", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B745B7F-DDD9-4DAF-8511-76F2C4F7FA20", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB99535-B654-4F63-A30A-F51FF934694B", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0989D19D-9721-47AF-B4F1-3DAFE98FE52A", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABEC5CE9-E81B-4D7C-A565-09D7B03ABC5A", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F319382-49F1-4472-9018-7067033C1A23", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33A6688A-CDC4-4005-9EC4-9EB5FA155C81", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF72CC78-4AEA-415F-82E5-B4BCE683A679", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDAD11-FB62-4F46-92C4-8EA4200218C4", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9766178-B8A2-40F2-AAFC-9999A1F672F1", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7D66CE6-6D34-4247-9A54-2723E9D458AD", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F0E769-09E3-4D99-81E3-4419794478C8", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BC71F5-5048-43A6-A87A-F87B446243F3", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "886EE0BF-C13C-43E2-B2C7-F7CE2B0E8472", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38845C5E-1761-4722-8368-B9439A0DAB14", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "657F1F0E-DDC7-43E7-95AB-70515CB78B7F", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service." }, { "lang": "es", "value": "Una comprobaci\u00f3n insuficiente de l\u00edmites de las E/S de prop\u00f3sito general (GPIO) en la Unidad de Administraci\u00f3n del Sistema (SMU) puede resultar en un acceso/actualizaci\u00f3n desde/hacia un espacio de direcciones no v\u00e1lido que podr\u00eda resultar en una denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26375", "lastModified": "2024-11-21T05:56:14.807", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.627", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "352EF843-7E8B-4E18-ADA6-FDFF756FF469", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21488227-827C-4F20-8CB3-6DEE51D2D28C", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3F95E1C-0563-486E-9651-F161369C6235", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD80CD1-0373-4597-A3A7-8DB6223FC469", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A67B24D-6198-4912-AFEB-8A2001BDF898", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF84A4C8-7A36-4639-8D1A-1ECDC1FDF57B", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83643022-0D3A-4C54-9890-7931E2A12DF4", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF640C8-95F1-4669-9115-4C0FAC68C5DE", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C9D0F50-B4AD-4764-8CCA-379890935AE1", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "330E4458-5522-4DFE-AE0D-8FE2B9B95671", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF7DADE5-3C8A-453F-A5C8-D73049827712", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39DAA78A-C71F-4FBE-8F23-BC174014A7F2", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F7D899F-8AA0-489E-9785-21BBCE975CFF", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26FDBC98-0EE0-4F9B-8FBD-99B882B83DF9", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C4889EF-5D25-4C3C-B27E-6B751F1D1763", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF411CB-9724-4852-BC25-E8556F097157", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57763579-D84D-4BFC-9648-A392F104F8D5", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80B7DC05-6DCC-47BF-A7D8-78DDAC0E4214", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A56196D-F378-4517-BA3C-458CF1115FCF", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C3160F7-3B7E-4D88-9F0F-8D2396E71B21", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F351896E-8F3E-4A4B-9CC3-51A8B2F7D837", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0252E0FB-F31A-4606-97AB-BA37D8A98E17", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DEAAF95-F5CF-4221-87BB-0C360FA3BE1F", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30AC6BB9-3130-4B58-B6D0-3C0C579229F9", "versionEndExcluding": "milanpi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.\n\n\n" }, { "lang": "es", "value": "No verificar el modo de ejecuci\u00f3n de la CPU en el momento de SNP_INIT puede provocar una posible p\u00e9rdida de integridad de la memoria para los invitados SNP." } ], "id": "CVE-2021-26328", "lastModified": "2024-11-21T05:56:06.710", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:10.447", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 07:41
Severity ?
Summary
Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCCDCB9-AE21-4FDB-AC4D-C71649E2C693", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "580924FD-F11A-44CF-8A85-F2DAD0605399", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46F46CE8-A898-4161-93D3-CABE7DEE4D14", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24769C0B-F0B4-4808-B59A-CF96ED45851D", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46D6253C-3642-4B25-B59D-5B52000C3D7F", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C394DC65-D1D7-44FF-8A0D-480E1E860163", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B274AC3-92CD-4D9F-9E11-90C89108CF22", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68C6B82B-B779-47E2-ABF5-624139288E95", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1BC49C5-FCCB-41DE-A456-FB5D3273E289", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F7D5787-FA9F-47CE-8D4E-40F860F382A1", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F1DAB3E-1E71-4C3E-86D2-179F429461F4", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB9937A8-2DC6-44C6-89E4-1F612F40974A", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFF090D4-7D57-449A-98DC-474848752249", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "130245C1-588E-48F8-B1D5-5CB64C9C7912", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6253A4BA-773B-4BD1-8F7E-46F1FCCB4F4C", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F77E77A-B90D-4D91-933A-ED85DF1F2FFB", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B298C10D-865D-447C-8D2C-5CA4CB7DACEB", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C1AD68-DF36-4DC7-9B63-470D4FB326B3", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B79DE42-0866-4103-BAE2-33263422B0B5", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA66A57-698D-4DA4-8AF0-A3476876AB1F", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4854061C-DE18-41D5-904C-BBE9283CBEFB", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45772673-72DB-4F78-8868-3D8EC1B00F75", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2EDBF32-8EA5-4810-BCA9-973A9B7A9555", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78B74CAE-5800-4584-ADA4-D4DC0F94FE62", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4360ECF3-F62E-4945-A9B5-C01B345F1A7E", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EF501D6-CEAE-41A5-A70E-652AE76BD34E", "versionEndExcluding": "romepi_100d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada de llamada al sistema insuficiente en el cargador de arranque ASP puede permitir que un atacante privilegiado lea la memoria fuera de los l\u00edmites de un registro asignado, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20525", "lastModified": "2024-11-21T07:41:04.990", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:13.747", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution." }, { "lang": "es", "value": "La comprobaci\u00f3n inadecuada de entradas y rangos en la cabecera de la imagen del cargador de arranque de AMD Secure Processor (ASP) puede permitir a un atacante utilizar valores controlados por \u00e9l antes de la validaci\u00f3n de la firma, lo que podr\u00eda dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario" } ], "id": "CVE-2021-26335", "lastModified": "2024-11-21T05:56:07.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:08.260", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 20:15
Modified
2024-11-21 06:34
Severity ?
Summary
Insufficient validation of inputs in
SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an
attacker with a malicious Uapp or ABL to send malformed or invalid syscall to
the bootloader resulting in a potential denial of service and loss of
integrity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.9 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.9 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.9 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.9 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.9 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.9 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.9 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.e | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.e | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.e | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.e | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.e | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.e | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.e | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.e | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.e | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.e | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.e | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.e | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.e | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.e | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.e | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.e | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.e | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.e | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.e | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.e | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.e | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.e | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.e | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.e | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.e | |
amd | epyc_7h12 | - | |
amd | epyc_7251_firmware | naplespi_1.0.0.j | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | naplespi_1.0.0.j | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | naplespi_1.0.0.j | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | naplespi_1.0.0.j | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | naplespi_1.0.0.j | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | naplespi_1.0.0.j | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | naplespi_1.0.0.j | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | naplespi_1.0.0.j | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | naplespi_1.0.0.j | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | naplespi_1.0.0.j | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | naplespi_1.0.0.j | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | naplespi_1.0.0.j | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | naplespi_1.0.0.j | |
amd | epyc_7551p | - | |
amd | epyc_7571_firmware | naplespi_1.0.0.j | |
amd | epyc_7571 | - | |
amd | epyc_7601_firmware | naplespi_1.0.0.j | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "CA309389-9C01-462A-8426-166D4BA12489", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "9866BE6A-470C-41C2-B31D-3907DD4630F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "CC31EBBC-74D7-40A6-A86B-FDA6E9E0EF4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "DFC070BE-8BEE-4281-B6FA-E65409482E9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "0D590BDE-A1E3-43CB-B3D1-82D0F33AA6B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "018C03A5-5DD1-4EA0-B096-8DC7053B46BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "EF441B38-2DAD-4059-8D0B-04E0E4451F1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5F2ED-43AB-4032-803D-AAC11AD72619", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "FD4832E7-2E08-41A8-8296-2602F5D937E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "298D9D69-3AFC-4D5C-A262-0AB1FF913206", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "6D8DE6F3-F9EA-485C-9154-ABE9E2DCE5E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "676633D3-5609-45D6-A043-B13CFD9AAA25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "BDBFC188-C69D-4FBB-892C-D9F62695866C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7571_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "E7319DE9-1C78-46E4-854F-1E7F73F87385", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7571:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3CF0651-A320-40D1-986F-D2790488929E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:naplespi_1.0.0.j:*:*:*:*:*:*:*", "matchCriteriaId": "69D9BFAC-1D52-4578-89A6-3D33F4B8E0B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation of inputs in\nSVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an\nattacker with a malicious Uapp or ABL to send malformed or invalid syscall to\nthe bootloader resulting in a potential denial of service and loss of\nintegrity.\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-46756", "lastModified": "2024-11-21T06:34:38.833", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T20:15:12.200", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD14E00-D597-4099-B4DF-58EE8EEE0B2E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C66D2D-BFCB-430C-8A18-FC3C21D2BD40", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31595722-F102-447D-9BAE-9C36567342DD", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." }, { "lang": "es", "value": "Un fallo en el vaciado del Translation Lookaside Buffer (TLB) de la Unidad de Administraci\u00f3n de Memoria de E/S (IOMMU) puede conllevar a que un dispositivo de E/S escriba en una memoria a la que no deber\u00eda poder acceder, lo que podr\u00eda resultar en una p\u00e9rdida de integridad" } ], "id": "CVE-2021-26348", "lastModified": "2024-11-21T05:56:10.747", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.380", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD14E00-D597-4099-B4DF-58EE8EEE0B2E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C66D2D-BFCB-430C-8A18-FC3C21D2BD40", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31595722-F102-447D-9BAE-9C36567342DD", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA)." }, { "lang": "es", "value": "Un fallo en la asignaci\u00f3n de un nuevo ID de informe a un hu\u00e9sped importado puede resultar potencialmente en que una VM hu\u00e9sped SEV-SNP sea enga\u00f1ada para confiar en un Agente de Migraci\u00f3n (MA) deshonesto" } ], "id": "CVE-2021-26349", "lastModified": "2024-11-21T05:56:10.887", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.427", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-10 19:15
Modified
2024-11-21 06:34
Severity ?
Summary
Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBBDB4C7-ACE7-4E2C-AEB7-43A43D6EDA02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E2E06DC-6338-4D73-A7F4-C004CBAC7D02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E32897E-6D86-4C74-ABB7-05844A1E7CA2", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84179B6A-5F03-4F90-A8B5-730BBBD09CDA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application." }, { "lang": "es", "value": "Una comprobaci\u00f3n insuficiente de las direcciones en la llamada en AMD Secure Processor (ASP) podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo arbitrario por parte de una aplicaci\u00f3n de usuario comprometida" } ], "id": "CVE-2021-46771", "lastModified": "2024-11-21T06:34:41.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-10T19:15:09.037", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD14E00-D597-4099-B4DF-58EE8EEE0B2E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C66D2D-BFCB-430C-8A18-FC3C21D2BD40", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31595722-F102-447D-9BAE-9C36567342DD", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5861CA96-35B4-4F01-96B9-0BB0DCBD2C6A", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E9E309A-5B1A-42DF-9DF4-A7E464D98EF1", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5375E1CE-84FE-4167-A6E8-951B2F7F13E6", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED50A3F0-346B-440E-968B-A74456DA9980", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A681268-4C96-4386-9D85-C7D28EA2FA92", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E3FA966-6703-48F2-A284-637F25226B58", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92402511-F88E-43A9-8CA6-9D90D8E52465", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC21EF29-AA65-4C2B-BB3F-01F0A7685953", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29BF8ACD-4A20-42F6-B54D-AB5259DD18E4", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "435C46DD-B88A-455B-A20E-54E98886B350", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9CE60DC-87A6-4640-B88A-1F0D52B0D226", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA91C836-7E28-427D-9385-37E53397BB44", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F611863-A9AC-42DF-AB51-1B5F75AC4159", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF18091-AFF3-43C4-954E-261295981807", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35C8D8F4-C420-49C0-BACF-4EE7722890C2", "versionEndExcluding": "naplespi-sp3_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability." }, { "lang": "es", "value": "En las m\u00e1quinas virtuales invitadas de SEV, la CPU puede fallar al vaciar la memoria intermedia de traducci\u00f3n (TLB) despu\u00e9s de una secuencia particular de operaciones que incluye la creaci\u00f3n de un nuevo bloque de control de m\u00e1quina virtual (VMCB). El fallo en el vaciado del TLB puede causar que el microc\u00f3digo use traducciones del TLB obsoletas, lo que puede permitir una divulgaci\u00f3n del contenido de la memoria del hu\u00e9sped de SEV. Los usuarios de m\u00e1quinas virtuales invitadas SEV-ES/SEV-SNP no est\u00e1n afectados por esta vulnerabilidad" } ], "id": "CVE-2021-26342", "lastModified": "2024-11-21T05:56:09.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.297", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 07:41
Severity ?
Summary
Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada insuficiente en la SMU puede permitir que un atacante f\u00edsico extraiga el contenido de la memoria de la SMU a trav\u00e9s del bus I2C, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad." } ], "id": "CVE-2023-20528", "lastModified": "2024-11-21T07:41:05.460", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:13.847", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:34
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_3950xt_firmware | - | |
amd | ryzen_9_3950xt | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_3700xt_firmware | - | |
amd | ryzen_7_3700xt | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5900_firmware | * | |
amd | ryzen_9_5900 | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | * | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_threadripper_3960x_firmware | * | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | * | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | * | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_3795wx_firmware | * | |
amd | ryzen_threadripper_pro_3795wx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5871DB40-AF57-4031-990E-E99902CAF8FC", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1661DEF6-006B-4C14-953A-5322141B4CF0", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99C92284-DD9E-4B5D-81D7-67990905C2EE", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E90EDBC7-C8C6-4DF1-BF23-C883611DD4FC", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C459B1FE-D8ED-4483-8780-9134C3246B5E", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1855549F-70B0-4670-BF61-C0DD02525C45", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70A4946C-DF6C-4CD8-9842-E5027FFAA078", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A0DC6B5-3851-40B2-B959-524A6116A6DC", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDCBAB98-1683-47C3-8DDB-BF39F6286B34", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F606E5D6-0113-4908-900D-E94F87E6481A", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFACA3C3-7481-45DF-9870-7761CB858B2D", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "149DCFDB-8062-4376-A7F7-645A8D40AC84", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C28F9044-4D6D-421D-8F8E-9A35DE6DA79E", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07526B36-A301-49B4-A1B4-86D182D3BFD4", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "724E131E-E678-4AD7-B521-5E68882AF4BD", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30A454D-0B71-4651-AFEB-E915BCB8AC9F", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "555BC41D-3E8E-49FE-BDF3-0D496B8A9147", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99144DDA-F3EA-45E2-B470-ACD1652194F1", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C40C74D-A6F9-4428-89E4-2201DD9E9919", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09606942-FF1B-46A1-890D-65BDA7624704", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBA9BBB-0FF7-4D15-8AD3-BF591D136B5F", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8964660C-AB5C-4932-942E-B2C6F223B097", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7C790F3-E6D1-4E00-9E48-C4FA4DB2A6B6", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877949F7-C06F-4804-97BB-4147F348F7A0", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA520E42-E231-456B-AC4A-CBF7B42D1F4D", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D6DC9C5-2804-4320-8FA4-76A8F4665C73", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C812730D-D41C-4606-81E3-AB0A0389354D", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4E7658B-5AE0-451A-8EAA-0713FA20C2C9", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "938BE7DE-6094-4E7B-BC42-88EC0E037C8A", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42707648-1703-4FA0-8D64-2149DA2C7C49", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A30368D7-2E1D-41D5-9E72-FB2D156C1AAF", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0D7C415-6952-4DCC-9EAE-50BD5DD8A226", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "956D2603-DB21-4349-BA0A-3DDD3AD8177A", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4613AA4-BE67-46B5-875C-A5D5CDEADB62", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E7E49B-F739-4B9F-94AA-64041A3E38F8", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6FC45BE-C55D-4FB4-A10E-89A80477251C", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40F03482-025B-4323-831B-B0F985083CD8", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E51DCE34-419F-4645-899F-A02B352BDCA9", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F683539A-0D2B-4FE8-823C-01439E74CF3C", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9E27FD9-3F54-48A2-AA2E-EE797D264757", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5E0C31-BF05-4B92-ACA1-84071764E077", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BEE89-7D49-44C1-B608-940C453AC6A8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A499E19-B92C-4B89-84C5-8C66B42077E9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13E4D0A9-CF7D-41B0-B024-7D6726481280", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25CCA953-04A4-4698-9985-FB97DA3EB536", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5427628C-6F24-4615-BD65-263EC4001E4A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14FE1816-DFCE-442B-9AF1-132F7E909445", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76ED00CB-FAEC-401F-BCE6-7505FC79052D", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F7E9590-2921-4539-A88A-9031256141B8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "095CA571-847E-47F2-AD91-DFD2B1DE99FF", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A0BC87-4F31-487E-8142-8B55F67D2261", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71E8010-E3AE-4847-B20D-D4A94FE2E982", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C647A92B-882A-432A-9CC3-7BFDCFF20F07", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62A5CA50-BFAB-4470-98CB-1478DD281960", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B3B6C95-72E5-4364-930B-75DE7011C9D1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83DD388C-713A-4790-8C28-F33DA972B559", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F1B97E1-0559-44E0-B2D9-A03354700E9A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3AB732A-0FAD-46FB-994C-38A951F6F186", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A826E63-E26F-4932-9BD3-03CC801BD9E0", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCD54CF8-FE6F-4003-B9AF-D246928D4F22", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B8BC8D8-B48F-4378-8146-3B74EDE84238", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03191635-46A1-48F5-BA2A-63A338B6ECC2", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51E7C98D-017B-4692-B3F0-1FAC416F23ED", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39854CE5-EDBC-4B85-8CEC-5403BD7CD87F", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9AC77DD-429D-481A-A113-95D26F8CC537", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9C88FCC-891E-40A2-B038-3D913EDB9ED0", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAD836DD-4A8B-43CC-8B2B-31ECD7297714", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5B8D399-2ACC-4D39-B3D0-AF8CF9F1318E", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCF3664E-44B5-4FF6-AD64-97F1CF387E88", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A941CDD6-443D-4E9A-8D6F-EF2FAF09804D", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CCE4C50-17A5-4601-B673-45A67F36580A", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3765BA20-BE1E-49FB-BDFB-4880F5AFC564", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0F89354-0DF7-41DA-AAB0-8E1C7B3CE4A6", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "912F08B6-ED19-4302-AC99-293373CF217B", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FECF09F-6B7B-461A-9657-6327D68ACA9D", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C392C9F-A86C-485C-BF76-CF1E088041AE", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35A303BC-4BB5-446A-9D29-0AEFF0E8EF16", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3EB55FE-81B4-445D-80B3-FA75F977B741", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F7E918-47C3-4772-A048-6E8EA363D6BD", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89E1C09E-A174-4279-BA21-15571BB90A7D", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E14FC6-B6BB-42A5-8805-AF6065557EEE", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CEDE31C-0AD0-4103-A4B1-10F898F61017", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD7D2FFF-E1B8-4B46-996B-94365ECA78A9", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F03231CC-4F68-4602-9F1F-C0BA96C74AA8", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1530CEE-B546-4FE5-93A2-2AEFDCD0F1F3", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC954B29-33C0-4167-8B24-62F78C6B1AE5", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5F753-93BE-4568-8487-39F65F90A8E3", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33A763A2-B6FD-4544-B051-60A43C716BEE", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23BD0E26-B0B8-4613-8DD8-988AA6F33C36", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4276F58E-86C9-422D-A318-D3C809B53963", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A01E67D-A30F-46FA-B7ED-8ABF713694FA", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB2E339F-8B74-4FC2-BF6C-40DBB4E67AA8", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "434D661B-CC93-45AF-81DD-56D1224742DC", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CAE0DC7-E2B7-41BF-ACE6-0C6A0D256269", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FBF8C2-C17C-4688-AF07-CBCF22A86879", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "578B531F-3884-4F0A-AE99-9F5F3D3267A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A630AE54-9E40-4ABB-81DC-35D423785C44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "E772D4F6-B0AD-490F-BAF0-DADD3C8F5295", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EB03625-1A44-46CF-BEE4-B9753A2067AD", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DDE971D-6762-4D3F-B574-6839D195BB6B", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B018068-116B-4662-AB36-849F934F1AE7", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83E392A7-AEC8-4F8C-8761-1247CB1A0B23", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8985C782-787C-4B7E-8C0F-033654D84764", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4012629D-3D3F-48ED-88A5-9F2CB44914F9", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD8CE65-F4DB-4D0B-8A49-6161E201F791", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65DE69E3-AE8A-42F9-897D-0950E7D074D0", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE7618FD-A6A5-4DA6-93AE-253C8162F97F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98A4202-BDB2-4ED4-97AD-9048F3B8B08E", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F94DE3D-D26D-4B40-BF1B-E8269BEEA817", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27B3BE05-DBBC-471B-9052-D6FEAC051033", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27705130-C969-416F-94DF-4ACF94AEBE6F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4366EF8-3B28-4433-8265-D2760120B2FD", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service." }, { "lang": "es", "value": "Una validaci\u00f3n de direcci\u00f3n DRAM insuficiente en System Management Unit (SMU) puede permitir que un atacante lea/escriba desde/hacia una direcci\u00f3n DRAM no v\u00e1lida, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2021-46774", "lastModified": "2024-11-21T06:34:41.667", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.3, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:10.407", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient bounds checking in ASP may allow an
attacker to issue a system call from a compromised ABL which may cause
arbitrary memory values to be initialized to zero, potentially leading to a
loss of integrity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | ryzen_5_2400g_firmware | - | |
amd | ryzen_5_2400g | - | |
amd | ryzen_5_2400ge_firmware | - | |
amd | ryzen_5_2400ge | - | |
amd | ryzen_3_2200g_firmware | - | |
amd | ryzen_3_2200g | - | |
amd | ryzen_3_2200ge_firmware | - | |
amd | ryzen_3_2200ge | - | |
amd | ryzen_3_pro_2100ge_firmware | - | |
amd | ryzen_3_pro_2100ge | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700e_firmware | - | |
amd | ryzen_7_2700e | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600e_firmware | - | |
amd | ryzen_5_2600e | - | |
amd | ryzen_5_2500x_firmware | - | |
amd | ryzen_5_2500x | - | |
amd | ryzen_5_1600_af_firmware | - | |
amd | ryzen_5_1600_af | - | |
amd | ryzen_3_2300x_firmware | - | |
amd | ryzen_3_2300x | - | |
amd | ryzen_3_1200_af_firmware | - | |
amd | ryzen_3_1200_af | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_3900xt_firmware | - | |
amd | ryzen_9_3900xt | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_9_5950x_firmware | - | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5900x_firmware | - | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5900_firmware | - | |
amd | ryzen_9_5900 | - | |
amd | ryzen_7_5800x3d_firmware | - | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5800x_firmware | - | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | - | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5700x_firmware | - | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5600_firmware | - | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5500_firmware | - | |
amd | ryzen_5_5500 | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3250c_firmware | * | |
amd | ryzen_3_3250c | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | amd_3015e_firmware | * | |
amd | amd_3015e | - | |
amd | amd_3015ce_firmware | * | |
amd | amd_3015ce | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3700c_firmware | - | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3500c_firmware | - | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3450u_firmware | - | |
amd | ryzen_5_3450u | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_7_5700u_firmware | * | |
amd | ryzen_7_5700u | - | |
amd | ryzen_5_5500u_firmware | * | |
amd | ryzen_5_5500u | - | |
amd | ryzen_3_5300u_firmware | * | |
amd | ryzen_3_5300u | - | |
amd | ryzen_9_5980hx_firmware | * | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_9_5980hs_firmware | * | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5900hx_firmware | * | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900hs_firmware | * | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_7_5800h_firmware | * | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | * | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5825u_firmware | * | |
amd | ryzen_7_5825u | - | |
amd | ryzen_7_5800u_firmware | * | |
amd | ryzen_7_5800u | - | |
amd | ryzen_5_5600h_firmware | * | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | * | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5625u_firmware | * | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5600u_firmware | * | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5560u_firmware | * | |
amd | ryzen_5_5560u | - | |
amd | ryzen_3_5425u_firmware | * | |
amd | ryzen_3_5425u | - | |
amd | ryzen_3_5400u_firmware | * | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5125c_firmware | * | |
amd | ryzen_3_5125c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33C33F27-AEBC-4DD4-8262-FE025253AE97", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E39BD43-7D5D-4210-9C7F-864F683145DA", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6288EE79-3403-44A8-9235-69BA199A6030", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "051172C8-F9BA-411F-A493-7A7733C112C8", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AEA61A0-B5F7-4686-8512-EC0384D3834B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70A5C00A-1E67-42D8-8308-2B3BB4C890F1", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8EE809F-B0F8-45BF-B09B-300B2BF19D80", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ED4A553-FAD0-4586-9028-BC31DE44ABE6", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "705F826C-F5DA-4803-9104-45B1F3E3CC86", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E0076C0-C3E2-4E85-9D48-CAA83AFA7E0B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E14DB62-5BDB-4C06-B55E-E579BCEF1449", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C924FDA-8806-4CB7-97D4-E014E56E5463", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C48B708-BEB1-41AC-8B2E-9DA04C214CBB", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "518A109A-1776-40F0-A8DF-B7C971EFB633", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FF41C57-7BEF-4A89-8A75-6F8247885792", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3021490-D6A4-423F-B87A-9995CD6BDEA5", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F89D442C-0E87-4C0E-A2ED-194C5C42D4A5", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B11AEA3-9ED8-4E0F-A7CF-856B06A82187", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A11965EE-3867-4846-B714-79F1D2681AAA", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4E099CD-49DA-44B6-8DA7-C39502321D2B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDC3E24-8F3C-4A6C-849B-52C8240EAE27", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BE9015F-CE32-41E7-88CD-2057AACA3D98", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C88C305-88AA-4B54-ADA2-A13202157163", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2869B6A9-98A2-4742-AA0C-615F612BEB98", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289EC897-401C-4C91-8C1F-7CB5E034FE4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "310788CD-F880-42FC-A781-4C69B4C1A408", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_2100ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "09A40AA0-98B5-4D18-9864-96F206151608", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_2100ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFFACE1-D51F-4720-AABB-583804B571D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "024837F0-DCBD-44C8-8BBD-EA7B6220A953", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6336DEEE-CE36-4D25-8257-74D90A1F83C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D943C97E-8951-4C9E-A0B2-F1BE3AD76810", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3F62F7-30D3-4D03-9730-ACC6A666644A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E4D3D51-BF56-4120-B6A3-1C9504AA93B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A363D92A-F5F0-4DE5-B157-149592C21B95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_1600_af_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54E3BD26-E1FC-4891-A3E9-41EC6DBE8EF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_1600_af:-:*:*:*:*:*:*:*", "matchCriteriaId": "984D8CAD-DFCA-4D7C-974D-22947EE1709B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B748C83-DCED-4B35-834D-ADD21E743407", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8726C76-151E-4B6F-A61C-5D3C593F2A55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_1200_af_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B40BD74-F5D4-46E1-A624-ACA57B508856", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_1200_af:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1D689F-B1D5-4C62-8B10-85E04ADFEFF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "777D94BA-613B-49E9-B1B3-2A9E0FC35908", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27FEB479-99B7-4C8F-90D4-ED09E28C9A38", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E70F-034A-494A-A6CF-8DC42BF4ED72", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9EB15FF-5FDB-487D-866D-C13DC2F6D852", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6434CDE-4118-41AA-9FEE-A7C87EF103DA", "versionEndExcluding": "pollockpi-ft5_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5D7C860-B481-4F57-B7DA-E829684986DC", "versionEndExcluding": "pollockpi-ft5_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9521C15-B311-4353-94F8-8050253CC496", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D348700-98B1-4F67-9504-769B27D46477", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDA16B8F-FAD8-4E1D-8C55-2310241EA2E4", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8326B51-F7AB-4DD0-962D-335F58094000", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BE37945-25E3-436A-A93E-6E12B42864D5", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A179485C-14D1-43DC-ACD7-176518DD3193", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F4FB900-D693-450A-8347-906F71593033", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A69B205-805D-4350-B2FE-0B5682DF8703", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BF27F9F-E0AB-4B6C-89B3-4DE0EC7CABA1", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A72C89D-E075-4457-AED5-938F82198C03", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C85E1C48-4626-4570-9501-D41F9E827EA1", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B9A22F4-41A5-475D-B7E0-47627E807020", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "733C0C68-617A-4622-B2F4-3027DC773533", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF9597B9-E267-470A-9ED5-C16A0F0F1FAB", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4B92549-A410-4179-8512-2FFE7E3ADE36", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A1FB69-FAAE-422C-BBCB-CB8DDE9F12F8", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "374EE676-85FE-4A57-ADDD-7A66FDCA15AD", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B06DE32-805C-4B4B-A8A7-125658A2DB94", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DD2803A-BF17-46C8-81FA-79C8E9A4D875", "versionEndExcluding": "cezannepi-fp6_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in ASP may allow an\nattacker to issue a system call from a compromised ABL which may cause\narbitrary memory values to be initialized to zero, potentially leading to a\nloss of integrity.\n\n\n\n\n" } ], "id": "CVE-2021-26354", "lastModified": "2024-11-21T05:56:11.643", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:10.670", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | athlon_3050ge_firmware | - | |
amd | athlon_3050ge | - | |
amd | athlon_3150g_firmware | - | |
amd | athlon_3150g | - | |
amd | athlon_3150ge_firmware | - | |
amd | athlon_3150ge | - | |
amd | athlon_gold_3150c_firmware | - | |
amd | athlon_gold_3150c | - | |
amd | athlon_gold_3150ge_firmware | - | |
amd | athlon_gold_3150ge | - | |
amd | athlon_gold_3150u_firmware | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_gold_pro_3150g_firmware | - | |
amd | athlon_gold_pro_3150g | - | |
amd | athlon_gold_pro_3150ge_firmware | - | |
amd | athlon_gold_pro_3150ge | - | |
amd | athlon_pro_3045b_firmware | - | |
amd | athlon_pro_3045b | - | |
amd | athlon_pro_3145b_firmware | - | |
amd | athlon_pro_3145b | - | |
amd | athlon_silver_3050c_firmware | - | |
amd | athlon_silver_3050c | - | |
amd | athlon_silver_3050e_firmware | - | |
amd | athlon_silver_3050e | - | |
amd | athlon_silver_3050ge_firmware | - | |
amd | athlon_silver_3050ge | - | |
amd | athlon_silver_3050u_firmware | - | |
amd | athlon_silver_3050u | - | |
amd | athlon_silver_pro_3125ge_firmware | - | |
amd | athlon_silver_pro_3125ge | - | |
amd | ryzen_3_2200g_firmware | - | |
amd | ryzen_3_2200g | - | |
amd | ryzen_3_2200ge_firmware | - | |
amd | ryzen_3_2200ge | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_3_pro_2300u_firmware | - | |
amd | ryzen_3_pro_2300u | - | |
amd | ryzen_5_2400g_firmware | - | |
amd | ryzen_5_2400g | - | |
amd | ryzen_5_2400ge_firmware | - | |
amd | ryzen_5_2400ge | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2700x_firmware | - | |
amd | ryzen_5_2700x | - | |
amd | ryzen_5_5500_firmware | - | |
amd | ryzen_5_5500 | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600_firmware | - | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_5_pro_2500u_firmware | - | |
amd | ryzen_5_pro_2500u | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_7_5700x_firmware | - | |
amd | ryzen_7_5700x | - | |
amd | ryzen_7_5800_firmware | - | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800x_firmware | - | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800x3d_firmware | - | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_7_pro_2700u_firmware | - | |
amd | ryzen_7_pro_2700u | - | |
amd | ryzen_9_5900_firmware | - | |
amd | ryzen_9_5900 | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900x_firmware | - | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5950x_firmware | - | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_pro_2200g_firmware | - | |
amd | ryzen_pro_2200g | - | |
amd | ryzen_pro_2200ge_firmware | - | |
amd | ryzen_pro_2200ge | - | |
amd | ryzen_pro_2400g_firmware | - | |
amd | ryzen_pro_2400g | - | |
amd | ryzen_pro_2400ge_firmware | - | |
amd | ryzen_pro_2400ge | - | |
amd | ryzen_pro_5350g_firmware | - | |
amd | ryzen_pro_5350g | - | |
amd | ryzen_pro_5350ge_firmware | - | |
amd | ryzen_pro_5350ge | - | |
amd | ryzen_pro_5650g_firmware | - | |
amd | ryzen_pro_5650g | - | |
amd | ryzen_pro_5650ge_firmware | - | |
amd | ryzen_pro_5650ge | - | |
amd | ryzen_pro_5750g_firmware | - | |
amd | ryzen_pro_5750g | - | |
amd | ryzen_pro_5750ge_firmware | - | |
amd | ryzen_pro_5750ge | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_pro_3795wx_firmware | - | |
amd | ryzen_threadripper_pro_3795wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "310788CD-F880-42FC-A781-4C69B4C1A408", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289EC897-401C-4C91-8C1F-7CB5E034FE4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78C904F4-D677-4361-90EE-30DB92FDDBB2", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DA2FE37-4400-41D0-9138-4EF1AF3A66C9", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67D610AF-DAA0-4BCD-8B01-DC6E2F4761A5", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B688CE0B-EC52-4C5F-8CC3-EA86D679965E", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E227BAA6-11AE-4533-9CF0-235E569E0316", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "549E498C-88A5-467D-9716-AE87921C7462", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6141A38A-17E2-410A-A7C5-A0D7240433F5", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "025F63C8-BA36-4751-A000-7AF8B52F41ED", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E12CC7D-BAAA-473B-A456-AD36BCE94307", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88A03CF5-7429-43D1-8CFE-BF7FE1F84255", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC0B9339-8771-43C7-8D08-DEB4C96EA431", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBB785FB-DF21-4661-B41E-218E4E967A48", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AC4E3E4-081F-45DB-BB3E-1F68AC9B9C5F", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A25124B5-CFE8-48D2-86F8-A1F82B5E5F82", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "937ACA2B-07F7-4355-B4D9-2F186E53C908", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "116C6783-FCA1-4D62-BE97-6361DB882350", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BB7501B-DBFE-47FD-B478-7F0CCABA0426", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3348B1F1-9796-4C6B-B0EB-A518CB299BB7", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88A2D152-E9BD-406D-BEBB-FE817A01B346", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD805B8D-FC88-4880-98DD-0E698D6B94D9", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA086D9C-492D-453A-B726-2F943FC1FCDE", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5083E97-2CCC-44A1-AC0A-F9377C4F9113", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "127CF045-94F8-4574-90C8-12889D586EE8", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45ADDC62-A8FB-4774-9457-03F5A41CED8C", "versionEndExcluding": "milanpi-sp3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9832717E-8322-4548-B6C7-DE662D2B05AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "50F48D3D-C024-45F8-A299-322FB62EF6F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD0332AB-3568-4AF7-9738-3CF2923C6DDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_pro_3125ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D7122B9-4664-492C-8440-CE0C0AADAD4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_pro_3125ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "368AD9F8-E7E3-4316-9671-7305FDD3D285", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB457B72-6551-4096-8C63-76F4C645A640", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "76469335-9B54-4442-B68A-BF9602D901FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62878C38-D2E3-452E-98FF-2ED2B6C256B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A469BBB9-B81F-4EEC-94E2-C72F3EC10834", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "819B8D07-E376-48F1-B235-EB3A663AE4C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8101920D-5C6C-4C9C-93CC-25811E6B7F51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C492258-B753-40AF-BAB5-23B5C74BDFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "777D94BA-613B-49E9-B1B3-2A9E0FC35908", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_2200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5FE8C0-CA04-4ED8-9C8D-19B0FD644FD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_2200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B13C87A-F510-49D3-BD7A-40919CC7559B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_2200ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C53FBD16-9759-482E-8F6B-35ABFD716890", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_2200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E085A2-40C0-4214-B564-70BBB1679E21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_2400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D4E51B1-2082-4FC6-82D3-9016411C4CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_2400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEB4D77-7E68-46A4-A1B1-95FE991480DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_2400ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D82727-1BD8-4BE9-9B2B-22844F7EA382", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_2400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0A39F78-8FFE-4D6A-B1C8-666AE50B2C0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5350g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A150494-C143-44BA-8AA8-348D145C1EE0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5350g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE04DA51-EAE2-4D3F-9480-03DBCCD44E4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5350ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49D44CE-0494-405A-8DC7-92B982A64943", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5350ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E0677A0-E13B-4A45-A280-D835E74D191F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5650g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2DFE4DB-D2B8-4885-BB20-05214218E986", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5650g:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3C69416-4F96-44EB-B117-F3C99CE75A69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5650ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBFC849E-949F-4F0F-8FF0-4B1B3112E857", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5650ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "54637AC1-FE05-4AB5-A358-15A2E36F7472", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5750g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF7AFD1-3FB3-4FF2-A8D2-AA1426C260A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5750g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5E5A7D-C42D-41E8-8FFD-D27F91BFA516", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_pro_5750ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81942F9B-9D81-4F6A-B155-0ABB302E9DAA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_pro_5750ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED62FB0-4ED8-472C-9267-2F90B0970401", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "382DA0A9-0ADF-4ECC-AF71-CE021DC8B359", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution." }, { "lang": "es", "value": "No validar el b\u00fafer de comunicaci\u00f3n y el servicio de comunicaci\u00f3n en el BIOS puede permitir que un atacante altere el b\u00fafer, lo que resultar\u00e1 en una posible ejecuci\u00f3n de c\u00f3digo arbitrario SMM (Modo de administraci\u00f3n del sistema)." } ], "id": "CVE-2021-26316", "lastModified": "2024-11-21T05:56:04.830", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:10.243", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F43FE6B-1CE0-4C93-B457-385D60D0BC7E", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EAFCA2B5-1192-4E6A-B348-44ECFC4C4465", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CED4A938-7B21-4DBE-945E-04FD76712CDD", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35BC64A9-A82B-4D1A-A070-541F429632FD", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2909C50-60B7-45A4-A597-B9B13A3136C6", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5F5AAD-06AB-4AE2-ADDF-C704278B1E63", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B13FA57-6D07-4461-B40C-227977EFB67F", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45D2D3-EACD-40A7-A2E4-3E4918C1AAFE", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9BBB5C7-942A-4B1D-9219-7D158D6B65E3", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EA98910-C8B0-4449-A3AD-5C2356C917A8", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A92937F-8BB5-4D63-A589-58BF847F06CA", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB76635-870C-4304-B435-FFCD671FA882", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C0B8817-B424-4F8C-B6A0-8305C6317A65", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "661AC564-7A60-4E10-ADC3-964A04FBA896", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B7EB27B-1963-4057-9088-CBC6FBCD91F6", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B8ED95C-4703-4C83-B787-096FB2730CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69C1BF26-EE53-4D48-A4CB-FB04E3DE6697", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2499FB92-B422-4E92-960B-FB67B4C8108F", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52B04F08-3447-4686-A965-65F8C7C64696", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F45D168-7370-454E-AA01-66A5F418AAFA", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B612010-419B-4F5C-8B00-C5BCE6B20EE3", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5F85EA-6F0F-44C2-AC26-A2ABF03AEEA6", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "964257EB-311C-4323-AE2C-4BD97FB21798", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "816CE49A-4C18-4834-883B-2F19644C831D", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.\n\n" }, { "lang": "es", "value": "Una validaci\u00f3n insuficiente de la asignaci\u00f3n de direcciones a IO en ASP (AMD Secure Processor) puede provocar una p\u00e9rdida de integridad de la memoria en el invitado SNP." } ], "id": "CVE-2021-26396", "lastModified": "2024-11-21T05:56:17.673", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:11.437", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-10 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBBDB4C7-ACE7-4E2C-AEB7-43A43D6EDA02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E2E06DC-6338-4D73-A7F4-C004CBAC7D02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E32897E-6D86-4C74-ABB7-05844A1E7CA2", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84179B6A-5F03-4F90-A8B5-730BBBD09CDA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability." }, { "lang": "es", "value": "Una comprobaci\u00f3n inapropiada de la direcci\u00f3n de destino en SVC_LOAD_FW_IMAGE_BY_INSTANCE y SVC_LOAD_BINARY_BY_ATTRIB en una UApp o ABL maliciosa puede permitir a un atacante sobrescribir la memoria arbitraria del administrador de arranque con el contenido de la ROM SPI, resultando en una p\u00e9rdida de integridad y disponibilidad" } ], "id": "CVE-2021-26370", "lastModified": "2024-11-21T05:56:13.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-10T19:15:08.813", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 07:41
Severity ?
Summary
TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.\n" }, { "lang": "es", "value": "TOCTOU(time-of-check to time-of-use) en el ASP puede permitir que un atacante f\u00edsico escriba m\u00e1s all\u00e1 de los l\u00edmites del b\u00fafer, lo que podr\u00eda provocar una p\u00e9rdida de integridad o denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20523", "lastModified": "2024-11-21T07:41:04.690", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:13.697", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient bound checks in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3300 | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - | |
amd | ryzen_5_5600g_firmware | * | |
amd | ryzen_5_5600g | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_3990x_firmware | * | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_3970x_firmware | * | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3960x_firmware | * | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_1950x_firmware | * | |
amd | ryzen_threadripper_1950x | - | |
amd | ryzen_threadripper_1920x_firmware | * | |
amd | ryzen_threadripper_1920x | - | |
amd | ryzen_threadripper_1900x_firmware | * | |
amd | ryzen_threadripper_1900x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | * | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | * | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | * | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | * | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | * | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0094538-161A-4877-9247-EA6DD83C9E54", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5841138E-BDAC-4F59-9BC8-9313A49DBECB", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAD73E1A-C4E6-4ECA-907C-99F84DBC7765", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FB232-0930-4F05-A4EC-D06DBED8E54A", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21B5752-F187-4BA9-94E8-C6525C7824A2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5EA931-ED74-4086-B9A9-9F1A9A359590", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E603AC01-F362-4B2E-9A08-DF2C24A49DDD", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F384C3-11D5-42EB-BF44-A6707358E063", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0A9A96-25CF-47AC-9AF3-96725B3863E4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E3EC-4358-4A82-807B-BBA7F03D5884", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA8E2F-2E73-47AD-B671-A952B9A4BFD6", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62B278C-BF08-4CC2-A843-1888AEF37638", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88713545-D2E4-47CC-8F5F-EAEE0CF53BF2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E4971-594B-4D1E-AFD5-D6B8A8B8F8A8", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "576BF517-1021-48AA-A065-305A50F9645D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B6DBC4-F298-45E1-90FF-A87AEA06810E", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08067DB-AD49-4B3D-BCBB-A4C9A7D9E7F4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B1F0A4-655A-44B9-87C0-B8A8F95B2BE0", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFDB2131-CDC3-463D-958F-0BF8D0FF5EA2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED75D47-160E-4E80-ADC6-4F84748231D5", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45F46F-A3C0-4FA4-BCB6-DD1A8DC0E190", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F45285B-E6D7-404F-9A04-D102F720AD0F", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84521477-8F0E-47C0-A605-62F168FBAC5B", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DDE5209-41F7-4C8B-AB02-CED82D78FC2D", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6930FCB0-CFC6-4A46-B373-DA6F805F82D6", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AF1AF4-3DE9-49A8-8CA9-B27F6A1C8E38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C69B1D1-DE50-4D70-821E-FDE2049C9107", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70F3D9FE-3025-4CE9-834B-755E79A20C38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A93567B-2DA9-44B2-AB09-E7A6706588F5", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5621CF89-55BD-41F0-8A31-211D42157DE2", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "499FAFEA-A965-47A2-B1DB-B262B189C91F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A70A1A9A-D8A2-4A2B-8058-FE92E1FEAB07", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51592960-E74B-4414-A4F8-209D3D29D49F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC7064C1-67AF-4A2F-A284-846700D45614", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBE28F-9DF5-4D9C-BCC2-0D2ACB9D6B8F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6B2EB39-833A-40E7-9C0D-797D1878C925", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5012CEC2-A60C-433F-ACDE-0FF589E9EE50", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE56DEA5-F95E-465F-A93F-047D8765ACD7", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DF3D087-A373-435E-9085-B4D436259FEA", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27705130-C969-416F-94DF-4ACF94AEBE6F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27B3BE05-DBBC-471B-9052-D6FEAC051033", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F94DE3D-D26D-4B40-BF1B-E8269BEEA817", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07A724-54FB-40D1-8CD4-3D8636EF3E09", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0840EC2-3616-4E41-B806-BAB03FBC8EE5", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14B2D769-233B-42EB-BE17-F1A857B48863", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43A08D27-BC7C-464B-9250-578E80AB718F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC4DDD43-4F29-45B2-B56F-5731F9495E6C", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "82854E42-76EC-4428-9975-B5FBC8DC6FF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D248B1FF-E981-4F0A-BDD7-22B64159F050", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B92717AF-0F69-4A7D-BC06-B0E287AA8008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9400C6E0-11E8-4FD4-A559-6254FC7509CC", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "304C61BE-2438-49EE-A581-4A4EEC2923E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F6FEDE-E686-4FCC-AA4B-9E28060506C4", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F63D4BA1-0706-4137-8492-5A5AC76D6F45", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE382518-267B-4411-8A6F-6AE41DDF49D2", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F85495-9937-40DC-AD18-2285CE8F40BA", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65339D06-D1ED-49EB-A172-6071F3510E09", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69A0A6DA-EFF8-4DC8-BB52-FC35A5260C24", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "153A5BA3-D730-45C6-9660-002E6512BCA1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5269FF7-5220-4707-9642-138D59438AC1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E004F6-3488-48EB-A2B0-ABBE32729139", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F7E6D13-6343-4A2B-AF6F-044B9E93C656", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9297E-63CD-4956-8C3F-417EF8AB27DF", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA0C644-DFE5-432E-8078-45BEC5681519", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A2A1A42-FA9E-4CA3-A666-7EF61D8ED794", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B02CD770-8BD6-4798-8D0B-175F5765765B", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "022C4CD1-F9F5-46F8-A502-93103C771784", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78B69DE-A3CF-45E1-AB93-C73066A619D0", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "178F2AF6-0F65-4F56-B429-A93D31DFF4EB", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4F754E-EB1A-409D-A84C-F8E8D1C54037", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E89A3B6B-EA14-4DF8-9B2F-97E74715D8F3", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEA674FE-CC7E-4D7F-9AE1-4A9A3C695224", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FAE5380-5C41-4ECC-96DF-EDCEE06AA36F", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC0C3FD4-2D4B-43F7-BD9C-39B9B71444CC", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5DCC668-E44F-4004-A500-B53D37A96DFD", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AC44D47-0B13-4607-BE44-F351092E33FF", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DAA9292-6C8D-44DA-8B67-6E26E0619BFC", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99656971-4F6C-48F4-89A3-52FFF15D934C", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F55EEAA-2E20-4DBB-860F-010A757B9B3E", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE217D96-C33E-470B-9BC9-36AA6C257BEA", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB01C6CC-2F9A-487C-A587-62622DA75AAF", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C08A1B2-1DF1-474B-BB5E-3085A03C9BE6", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "262E6ECB-AAA9-4DFF-A7A2-C4457087A49F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51CC1E13-BED2-4CE5-9BDF-D177B788E5A1", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B745B7F-DDD9-4DAF-8511-76F2C4F7FA20", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB99535-B654-4F63-A30A-F51FF934694B", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0989D19D-9721-47AF-B4F1-3DAFE98FE52A", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABEC5CE9-E81B-4D7C-A565-09D7B03ABC5A", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F319382-49F1-4472-9018-7067033C1A23", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33A6688A-CDC4-4005-9EC4-9EB5FA155C81", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF72CC78-4AEA-415F-82E5-B4BCE683A679", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDAD11-FB62-4F46-92C4-8EA4200218C4", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9766178-B8A2-40F2-AAFC-9999A1F672F1", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7D66CE6-6D34-4247-9A54-2723E9D458AD", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F0E769-09E3-4D99-81E3-4419794478C8", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BC71F5-5048-43A6-A87A-F87B446243F3", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "886EE0BF-C13C-43E2-B2C7-F7CE2B0E8472", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38845C5E-1761-4722-8368-B9439A0DAB14", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "657F1F0E-DDC7-43E7-95AB-70515CB78B7F", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bound checks in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service." }, { "lang": "es", "value": "Unas comprobaciones insuficientes de los l\u00edmites en la Unidad de Administraci\u00f3n del Sistema (SMU) pueden resultar en un acceso a un espacio de direcciones no v\u00e1lido que podr\u00eda resultar en una denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26378", "lastModified": "2024-11-21T05:56:15.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.710", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-05 16:15
Modified
2024-11-26 19:10
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_embedded_7313_firmware | * | |
amd | epyc_embedded_7313 | - | |
amd | epyc_embedded_7313p_firmware | * | |
amd | epyc_embedded_7313p | - | |
amd | epyc_embedded_7413_firmware | * | |
amd | epyc_embedded_7413 | - | |
amd | epyc_embedded_7443_firmware | * | |
amd | epyc_embedded_7443 | - | |
amd | epyc_embedded_7443p_firmware | * | |
amd | epyc_embedded_7443p | - | |
amd | epyc_embedded_7543_firmware | * | |
amd | epyc_embedded_7543 | - | |
amd | epyc_embedded_7543p_firmware | * | |
amd | epyc_embedded_7543p | - | |
amd | epyc_embedded_7643_firmware | * | |
amd | epyc_embedded_7643 | - | |
amd | epyc_embedded_7713_firmware | * | |
amd | epyc_embedded_7713 | - | |
amd | epyc_embedded_7713p_firmware | * | |
amd | epyc_embedded_7713p | - | |
amd | epyc_embedded_9124_firmware | * | |
amd | epyc_embedded_9124 | - | |
amd | epyc_embedded_9254_firmware | * | |
amd | epyc_embedded_9254 | - | |
amd | epyc_embedded_9354_firmware | * | |
amd | epyc_embedded_9354 | - | |
amd | epyc_embedded_9354p_firmware | * | |
amd | epyc_embedded_9354p | - | |
amd | epyc_embedded_9454_firmware | * | |
amd | epyc_embedded_9454 | - | |
amd | epyc_embedded_9454p_firmware | * | |
amd | epyc_embedded_9454p | - | |
amd | epyc_embedded_9534_firmware | * | |
amd | epyc_embedded_9534 | - | |
amd | epyc_embedded_9554_firmware | * | |
amd | epyc_embedded_9554 | - | |
amd | epyc_embedded_9554p_firmware | * | |
amd | epyc_embedded_9554p | - | |
amd | epyc_embedded_9654_firmware | * | |
amd | epyc_embedded_9654 | - | |
amd | epyc_embedded_9654p_firmware | * | |
amd | epyc_embedded_9654p | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B590923-B6F9-48A2-9BA8-833E22DE2E43", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1BED240-E334-4A8F-9070-D57D54B0ED2A", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84E4A21E-DC60-4ABB-94AD-BDC785717A96", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C1D50EA-07CA-43E0-90A2-6AFE444A5381", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDEAA93E-431A-4476-B431-5983296CCAAD", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED357082-5FDA-4E76-9903-ACE49D241195", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68733A3D-95A9-45A7-B2D4-AD32439DAB08", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "218E19EA-5493-475D-A51E-771BB281D5C2", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85514025-4FC5-4C5B-B6A6-7AC020E192F6", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5710382-A1D0-4E21-AC47-6F14CBE28329", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E47E9840-6143-4355-BFB0-B402FDF16617", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "739AF0E3-62A6-43D0-8ECD-CF7720624613", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC0E511C-CC66-43BE-A907-027828C75403", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5687A37A-3E72-4972-8F1A-A8266DE6A4A3", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C462E4FF-2285-46E1-927B-C8FFB018BF35", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44C45AEA-6436-4012-9A0D-C591A64444A9", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FDB30FD-24BF-4597-97B5-7A3732673DD1", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27A4A53B-F26C-44DF-BABB-C17357A7B549", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F405F5CD-1255-4FD9-902C-45EF0D5C657A", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D65F2DB9-51C0-40CA-B5C9-A85CF43A593D", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2432608F-0E9E-49D5-9A22-2A2A6E89489F", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9403D7F-0349-4CC8-B566-5054E4A96D83", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F512316F-131F-4EAD-A7FA-CFE172AD4FA5", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DF39DE-83FC-4DD2-812A-F2D50AA85ADF", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DC68072-5AEA-4768-9CDB-57303996CA17", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F396A75-7B5E-4544-92B9-7D4EFCD375B9", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FED2F309-48ED-4556-B562-3F01D7FB4141", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B79FF23A-6660-4513-A633-535B7543C8C9", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6FFB29-9DFD-44FE-8AB5-32D8F765164F", "versionEndExcluding": "milanpi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "482B19D4-3695-45A2-9CC7-1C0962414117", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8ACBF4D-E173-477F-8E7C-33DA3C034AF0", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "486F652A-8DDA-4C01-B2DB-A4F981F56016", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5C40AD4-5F07-4F57-89DE-A0658464E4A1", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2602C520-8244-4BAA-A483-BC31A5305942", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5088B73-27FC-4AA8-AB57-21EC0E0E7425", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD662D4-8D44-42FE-971C-C501574F6744", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3AD7201-E73D-48FE-87F1-B62715700A70", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAEB0D25-E423-45EF-9E52-57DA7E594429", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F291B-0CE4-4D1D-8A5F-7DF66703C3B8", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E1BBA30-F9D1-4AD9-BAF7-F4D40D356C15", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43DCB063-0676-4615-93FC-64D98ACAAD57", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "492476F9-F8E1-47AB-AAF7-67AADA160678", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A89F3343-7DAC-4662-987E-7629610D3C32", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "714CC372-0E0D-4075-94CD-4723BE694D2D", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB2C6A30-90B5-4E74-A4CA-C69FCB4E1E99", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07058C5-3EDC-4615-B447-2438C534B0E0", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E71A9FF8-E8A4-40C4-8DB1-D28AE4136988", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "489653B2-F305-46B6-A4D6-DFE5DCC855C8", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47A571CB-8C43-4AFB-8115-29FDED7C5EEA", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FF3AE7A-A653-444F-9CAF-DEF8C3F25F36", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E48F9-DEF9-43D4-8643-C1CC4D2EB3D1", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E40AC063-BC83-49B5-81E9-56835D0B72D1", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A154914-D1C7-4549-815D-F1F693EE2B8F", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F0A749-9F6F-4D92-81A6-48C30F59A0EB", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A0D8BC-00E2-48EA-8F2D-C23968326032", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67A78FCF-5F78-41C5-B5D4-32815B76288E", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D51EFBB-2509-47C2-BA48-0FE151B993D0", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DF0D18-EC29-4E7F-8970-9D0355D0EDD5", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A172EB43-4526-4A3E-881D-0B6CC72EEA34", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "429B298B-C825-43F0-86CF-30385D4C56CD", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4179752-A4AC-45DA-8A40-89217197D323", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EFA7374-ED9E-4B25-B600-C34F02AFFCF9", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCF05F1E-CF13-47BF-B7D7-2FD13E2A4E46", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AC9DE15-B2E8-4D9E-BC6D-1007C083D0B7", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADE721FF-4323-4C32-91D6-AC085779E411", "versionEndExcluding": "genoapi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F46B6E3-779A-48D3-9D66-9CC19B1C5060", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCA13D-409D-4E0B-9CB1-72C6F255C145", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "849D773E-AB8F-4044-B791-C886662D8BBF", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "375FC62D-D5B4-4698-A9E8-0AF00FEBBDE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C34A942-5EA7-4CEA-A7CA-C0ADBCC65046", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A4B2FBA-2F9E-44CF-A75A-9BCB30964153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30A546D8-3E31-4D4C-BAAC-607EAC46A4CC", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "A273285D-0615-479C-BE60-D2A73532B39A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D56DA98D-95C5-49E5-9174-DAE1ACEF706F", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92BF19E2-C264-48C3-BB38-A23C7DD67BB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8379370-5081-4FB3-890C-2BF2D602095A", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "93995EDA-88C5-41AE-8A56-08728027F2AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF60A69F-21ED-441C-823C-291026E00715", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F04B63D-AF86-466A-B74D-B1C9B2682DCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "552AAF13-377F-4A95-A580-7D906C6CB6A2", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A737AAD-AA75-41F7-B6A6-1B17D984CED5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFE3AC64-538A-4E18-85CF-063F984D735E", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "81287880-A2F0-4260-AA49-489DC2475118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C559424-D75D-440E-8F92-C1AD1B66421B", "versionEndExcluding": "embmilanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B6488C-8707-40B8-A867-87DDDE1B5625", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7525E902-27DA-4A53-A018-53AF96AA73DB", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C8820F4-879C-4B9A-B10C-756DC6F35317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68E124D1-686C-416C-B9DD-B6380C355D92", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB7E7CEC-B263-4020-90E6-C0B77D8036D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E78BCF22-DC43-4A07-971B-CA6A76B23EEF", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CE47EE2-06B8-434F-BEC4-D2EB5B79AFB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7F6F068-1F61-4EBB-A465-381D4EA696EF", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "26C81497-519E-46A2-9F64-E80C82920E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04591375-2E1D-4DBC-8C9B-2E4D4435F8ED", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFBD9E1E-437B-44E7-B148-88513DA7D50A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57BE0E04-FC43-4437-B35F-F94DC8CC9EA6", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A68F57A9-15AB-459C-8ACC-0BE565D230FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36D36B6C-DC77-4E12-AF09-180ACB86551A", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F6DCA27-D098-40B7-9778-B284044CA34B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE6BAF58-5538-43A9-A5A9-9C1CD420F6E2", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "9737ACC0-18DB-4061-A259-D32C16BDA238", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0B68719-100F-402A-B409-DDE9811B2359", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1C35D8-0C2A-4A63-9D1B-0983E0FDB7E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CD6C041-14A7-459B-A3C9-1A6AB55F6006", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C72561-B0CE-4E51-AC5F-CD7EFDBCC5EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BAFE92-C577-4558-AE15-F3E6524701A4", "versionEndExcluding": "embgenoapi-sp5_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F27175DE-83A5-42DB-8F8A-886B1D886277", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest\u0027s UMC seed potentially allowing reading of memory from a decommissioned guest." }, { "lang": "es", "value": "Una restricci\u00f3n inadecuada de las operaciones de escritura en el firmware SNP podr\u00eda permitir que un hipervisor malicioso sobrescriba la semilla UMC de un invitado, lo que podr\u00eda permitir la lectura de la memoria de un invitado fuera de servicio." } ], "id": "CVE-2023-31355", "lastModified": "2024-11-26T19:10:21.797", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-05T16:15:34.510", "references": [ { "source": "psirt@amd.com", "tags": [ "Broken Link" ], "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
A bug in AMD CPU’s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge_firmware | * | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_5_5700g_firmware | * | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | * | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_3_5300g_firmware | * | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge_firmware | * | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_7_4700g_firmware | * | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge_firmware | * | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_5_4600g_firmware | * | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge_firmware | * | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_3_4300g_firmware | * | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge_firmware | * | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_pro_2300u_firmware | - | |
amd | ryzen_3_pro_2300u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_pro_2500u_firmware | - | |
amd | ryzen_5_pro_2500u | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_pro_2700u_firmware | - | |
amd | ryzen_7_pro_2700u | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_pro_3300u_firmware | - | |
amd | ryzen_3_pro_3300u | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_pro_3500u_firmware | - | |
amd | ryzen_5_pro_3500u | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_pro_3700u_firmware | - | |
amd | ryzen_7_pro_3700u | - | |
amd | ryzen_9_5980hx_firmware | * | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_9_5980hs_firmware | * | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_7_5825u_firmware | * | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_5900hx_firmware | * | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900hs_firmware | * | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_7_5825c_firmware | * | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5800h_firmware | * | |
amd | ryzen_7_5800h | - | |
amd | ryzen_5_5625u_firmware | * | |
amd | ryzen_5_5625u | - | |
amd | ryzen_7_5800hs_firmware | * | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_5_5625c_firmware | * | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5600h_firmware | * | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | * | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | * | |
amd | ryzen_7_5800u | - | |
amd | ryzen_5_5600u_firmware | * | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5560u_firmware | * | |
amd | ryzen_5_5560u | - | |
amd | ryzen_3_5425u_firmware | * | |
amd | ryzen_3_5425u | - | |
amd | ryzen_3_5425c_firmware | * | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5400u_firmware | * | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5125c_firmware | * | |
amd | ryzen_3_5125c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD14E00-D597-4099-B4DF-58EE8EEE0B2E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C66D2D-BFCB-430C-8A18-FC3C21D2BD40", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31595722-F102-447D-9BAE-9C36567342DD", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC7064C1-67AF-4A2F-A284-846700D45614", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80081A6A-9B1F-4995-B7ED-FF297CB98264", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3EC1442-017E-4BFD-9E37-14EB3721F513", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CADB4E0B-0913-4483-B67D-88A86D67BD5D", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "462E0C21-B8D7-40CD-812F-3DACC77F13BF", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D53236B-5DD1-486A-93C1-52AD9B0C4B3F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43AF5DD9-C03A-4EC1-8FB8-E8CFE7EDFF06", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8830F787-4AE9-4FED-BE35-F3A42D7059CB", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A407FF85-7CD1-4785-9B9A-DB50A307D252", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A079228-DE77-4BF4-BAF4-1B73138DC4D9", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84E4ADAC-E985-4D85-AB05-E066AB2E65B2", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D7D7FD5-2BC5-48AA-BF89-3160F21904E6", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "235C41F9-A9E7-44FD-95EC-481B6A33B471", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB457B72-6551-4096-8C63-76F4C645A640", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "76469335-9B54-4442-B68A-BF9602D901FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A469BBB9-B81F-4EEC-94E2-C72F3EC10834", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "819B8D07-E376-48F1-B235-EB3A663AE4C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8101920D-5C6C-4C9C-93CC-25811E6B7F51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C492258-B753-40AF-BAB5-23B5C74BDFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CDF8F22-1E99-4E44-9F66-18C72EC07A51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9A64949-542A-4AC4-8848-0CE4FC932292", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82AD101D-A20C-4443-84FE-C9221F6AFB93", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C720E2-E4E1-4824-A80D-35D5171D0AD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFCD485-4013-48A4-8D88-F5D53BAC9065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7A0B963-A2A0-49DB-82C2-B05D098562F4", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE316FE6-05BD-4DE2-A30C-7A71B04A5FD2", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5688203E-FAAC-4167-897B-FD8D79A2EDE0", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EEDB57B-0B0C-4B5B-9B02-9CF2BD4B5B40", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25E95F3-4774-4E6B-A6FC-2EFE0AE49957", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66566327-4D62-4F8C-AE20-B4468A8497EF", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3096E651-5CA8-4C51-A8B5-3D93BB752D5D", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4ACA001-9C67-491B-BEF8-6279E72C5C38", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "980E2FF7-B6A9-4216-AA29-1E6316D8429E", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F370B191-00E7-436C-A476-70A9D6711516", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4C16C23-408A-47E8-A630-F9D86AB6C2BF", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C250D377-B7D9-4413-AF56-90B740C34D61", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DFB9FF5-F834-4E85-A07B-1BDA16F98536", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71ED20D3-AFD8-40A6-9670-1356ABEEF25B", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3432D0C8-AACA-404E-9478-ADAB8905FF4C", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBD04B72-0E5B-48D5-B32B-2F35CA777FF8", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA7565CC-AC9C-47A8-8A10-C21B7919C5D8", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EED33517-ECAC-4007-AFA1-A97D6467E09C", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D876164-DF3D-44B9-B74C-F6DE5779DFD8", "versionEndExcluding": "cezannepi-fp6_1.0.0.9a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A bug in AMD CPU\u2019s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers." }, { "lang": "es", "value": "Un bug en la l\u00f3gica del n\u00facleo de la CPU de AMD puede permitir a un atacante, usando un c\u00f3digo espec\u00edfico de una m\u00e1quina virtual no privilegiada, desencadenar un cuelgue del n\u00facleo de la CPU resultando en una potencial denegaci\u00f3n de servicio. AMD cree que el c\u00f3digo espec\u00edfico incluye una secuencia de instrucciones x86 espec\u00edfica que no ser\u00eda generada por los compiladores" } ], "id": "CVE-2021-26339", "lastModified": "2024-11-21T05:56:08.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.253", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-10 20:15
Modified
2024-11-21 06:34
Severity ?
Summary
Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | athlon_3050ge_firmware | - | |
amd | athlon_3050ge | - | |
amd | athlon_3150g_firmware | - | |
amd | athlon_3150g | - | |
amd | athlon_3150ge_firmware | - | |
amd | athlon_3150ge | - | |
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - | |
amd | epyc_7002_firmware | - | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | - | |
amd | epyc_7003 | - | |
amd | epyc_7232p_firmware | - | |
amd | epyc_7232p | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7282_firmware | - | |
amd | epyc_7282 | - | |
amd | epyc_72f3_firmware | - | |
amd | epyc_72f3 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7313_firmware | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | - | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | - | |
amd | epyc_7343 | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_7373x_firmware | - | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | - | |
amd | epyc_73f3 | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7413_firmware | - | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | - | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | - | |
amd | epyc_7443p | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7453_firmware | - | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | - | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | - | |
amd | epyc_74f3 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7513_firmware | - | |
amd | epyc_7513 | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_7543_firmware | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | - | |
amd | epyc_7543p | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7552_firmware | - | |
amd | epyc_7552 | - | |
amd | epyc_7573x_firmware | - | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | - | |
amd | epyc_75f3 | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7643_firmware | - | |
amd | epyc_7643 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7663_firmware | - | |
amd | epyc_7663 | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | - | |
amd | epyc_7702p | - | |
amd | epyc_7713_firmware | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7763_firmware | - | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | - | |
amd | epyc_7773x | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | - | |
amd | epyc_7h12 | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3200u_firmware | - | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_3_3450u_firmware | - | |
amd | ryzen_3_3450u | - | |
amd | ryzen_3_3500c_firmware | - | |
amd | ryzen_3_3500c | - | |
amd | ryzen_3_3500u_firmware | - | |
amd | ryzen_3_3500u | - | |
amd | ryzen_3_3550h_firmware | - | |
amd | ryzen_3_3550h | - | |
amd | ryzen_3_3580u_firmware | - | |
amd | ryzen_3_3580u | - | |
amd | ryzen_3_3700c_firmware | - | |
amd | ryzen_3_3700c | - | |
amd | ryzen_3_3700u_firmware | - | |
amd | ryzen_3_3700u | - | |
amd | ryzen_3_3750h_firmware | - | |
amd | ryzen_3_3750h | - | |
amd | ryzen_3_3780u_firmware | - | |
amd | ryzen_3_3780u | - | |
amd | ryzen_3_4300g_firmware | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge_firmware | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u_firmware | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2700x_firmware | - | |
amd | ryzen_5_2700x | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_4500u_firmware | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g_firmware | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge_firmware | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h_firmware | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600u_firmware | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_4700g_firmware | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge_firmware | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u_firmware | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h_firmware | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800u_firmware | - | |
amd | ryzen_7_4800u | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_7_5700x_firmware | - | |
amd | ryzen_7_5700x | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800x_firmware | - | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800x3d_firmware | - | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_4900h_firmware | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs_firmware | - | |
amd | ryzen_9_4900hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900x_firmware | - | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5950x_firmware | - | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3795wx_firmware | - | |
amd | ryzen_threadripper_pro_3795wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B48649-1E70-49CC-8E1A-5262B58A43B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02B85FAD-49E4-4DE4-BF8B-88F3C9772779", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3450u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62D1862B-8C77-4FBF-AA6D-EA3308311118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F7888EB-C587-44BF-95AC-05BE7776B5F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3500c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57A170DB-7E2C-4709-B1BC-E5C367BFB8A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B3D9C3E-F342-4932-8287-844E1963D572", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6245B6C-1BAD-4877-9921-16E32466708A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C84A1505-E6CB-431C-B44D-1E26045F30B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "813B1750-DC92-46A5-BF2B-041DBA196968", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "695A2D6B-A46C-475F-809F-B2715A41A936", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4518EEA9-2C4D-4615-A0F5-CF40C80285E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C2CD9B5-7469-4B8A-8653-4C71B00D0D2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3700c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC59D0E5-A610-47D9-9820-6D5DA71C4FC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF7FCAE2-1695-405A-AF62-9C9324BBCE09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D27255DA-3451-492D-BC8C-F0ABD9746250", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "658FF986-FD92-487B-A7FA-43E1F96B0FEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21782BC7-E2F5-4377-B80A-56591F3D7C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9397E5A5-0694-4016-AEBC-41D7902F9A03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87C31FA9-3DED-4794-8BB9-DCAD9F9FA9A3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6D51558-9F26-43D3-8BCB-4CD9A3DD7004", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "738B7B07-8F15-4DCD-A361-70C1FF9CB4EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62878C38-D2E3-452E-98FF-2ED2B6C256B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6F176F-78BA-4E92-8C3E-0B7C7018F265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E839C5C6-5544-4976-9AE7-55AADA09A48E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68244A90-6F59-4960-BB91-F2B8A745E2BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE6D732-6F55-4130-B95A-01ACC6EAB85F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC61EAFD-15EA-427B-8419-E6EB2BCD78CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EF33521-012B-45BC-A860-7A5ADAB74488", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BBC2B42-DEBE-4696-928A-353F48FA9546", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_4900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79DC351B-8B09-4BB3-B8E0-D8B3F5D83122", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "382DA0A9-0ADF-4ECC-AF71-CE021DC8B359", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed \u201cZen 1\u201d, \u201cZen 2\u201d and \u201cZen 3\u201d that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information." }, { "lang": "es", "value": "La contenci\u00f3n del planificador de la unidad de ejecuci\u00f3n puede conllevar a una vulnerabilidad de canal lateral encontrada en las microarquitecturas de CPU de AMD con nombre en c\u00f3digo \"Zen 1\", \"Zen 2\" y \"Zen 3\" que usan multihilo simult\u00e1neo (SMT). Al medir el nivel de contenci\u00f3n en las colas del programador, un atacante puede filtrar potencialmente informaci\u00f3n confidencial" } ], "id": "CVE-2021-46778", "lastModified": "2024-11-21T06:34:42.120", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-10T20:15:24.717", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient bound checks in the System Management Unit (SMU) may result in a system voltage malfunction that could result in denial of resources and/or possibly denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | ryzen_7_2700x_firmware | * | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2700x_firmware | * | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2700_firmware | * | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700_firmware | * | |
amd | ryzen_7_2700 | - | |
amd | ryzen_5_2600x_firmware | * | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2600x_firmware | * | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2700_firmware | * | |
amd | ryzen_5_2700 | - | |
amd | ryzen_5_2700_firmware | * | |
amd | ryzen_5_2700 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3100_firmware | * | |
amd | ryzen_3_3300 | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3300x_firmware | * | |
amd | ryzen_3_3300x | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - | |
amd | ryzen_5_5600g_firmware | * | |
amd | ryzen_5_5600g | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_3990x_firmware | * | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_3970x_firmware | * | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3960x_firmware | * | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_1950x_firmware | * | |
amd | ryzen_threadripper_1950x | - | |
amd | ryzen_threadripper_1920x_firmware | * | |
amd | ryzen_threadripper_1920x | - | |
amd | ryzen_threadripper_1900x_firmware | * | |
amd | ryzen_threadripper_1900x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | * | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | * | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | * | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | * | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | * | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | * | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | * | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | * | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | * | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | * | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | * | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | * | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | * | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_2200u_firmware | * | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | * | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | * | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | * | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | * | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | * | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0094538-161A-4877-9247-EA6DD83C9E54", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5841138E-BDAC-4F59-9BC8-9313A49DBECB", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAD73E1A-C4E6-4ECA-907C-99F84DBC7765", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FB232-0930-4F05-A4EC-D06DBED8E54A", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21B5752-F187-4BA9-94E8-C6525C7824A2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5EA931-ED74-4086-B9A9-9F1A9A359590", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E603AC01-F362-4B2E-9A08-DF2C24A49DDD", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F384C3-11D5-42EB-BF44-A6707358E063", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0A9A96-25CF-47AC-9AF3-96725B3863E4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E3EC-4358-4A82-807B-BBA7F03D5884", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA8E2F-2E73-47AD-B671-A952B9A4BFD6", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62B278C-BF08-4CC2-A843-1888AEF37638", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88713545-D2E4-47CC-8F5F-EAEE0CF53BF2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E4971-594B-4D1E-AFD5-D6B8A8B8F8A8", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "576BF517-1021-48AA-A065-305A50F9645D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B6DBC4-F298-45E1-90FF-A87AEA06810E", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08067DB-AD49-4B3D-BCBB-A4C9A7D9E7F4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B1F0A4-655A-44B9-87C0-B8A8F95B2BE0", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFDB2131-CDC3-463D-958F-0BF8D0FF5EA2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED75D47-160E-4E80-ADC6-4F84748231D5", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45F46F-A3C0-4FA4-BCB6-DD1A8DC0E190", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6D58B4E-67BF-4DC3-B1F0-B58D0F2AB798", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C125D0D-B785-41FC-BE13-9B3036B11985", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F300A76F-3C66-4C2D-B0EF-63FEFF139E4E", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F228F00-05BA-4859-ABFC-2E5384BC4958", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC48B37F-CF5D-47B4-AC55-ACC004C2A4A5", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91C2B320-1F92-4210-8ED6-B665F0AF64FC", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D11575-CFDD-4CCD-B86E-457EF881EE77", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67555209-8F6F-4106-A1BF-52CE1559538A", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F45285B-E6D7-404F-9A04-D102F720AD0F", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84521477-8F0E-47C0-A605-62F168FBAC5B", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DDE5209-41F7-4C8B-AB02-CED82D78FC2D", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6930FCB0-CFC6-4A46-B373-DA6F805F82D6", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AF1AF4-3DE9-49A8-8CA9-B27F6A1C8E38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C69B1D1-DE50-4D70-821E-FDE2049C9107", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70F3D9FE-3025-4CE9-834B-755E79A20C38", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A93567B-2DA9-44B2-AB09-E7A6706588F5", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5621CF89-55BD-41F0-8A31-211D42157DE2", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "499FAFEA-A965-47A2-B1DB-B262B189C91F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A70A1A9A-D8A2-4A2B-8058-FE92E1FEAB07", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51592960-E74B-4414-A4F8-209D3D29D49F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC7064C1-67AF-4A2F-A284-846700D45614", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBE28F-9DF5-4D9C-BCC2-0D2ACB9D6B8F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6B2EB39-833A-40E7-9C0D-797D1878C925", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5012CEC2-A60C-433F-ACDE-0FF589E9EE50", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE56DEA5-F95E-465F-A93F-047D8765ACD7", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DF3D087-A373-435E-9085-B4D436259FEA", "versionEndExcluding": "summitpi-sp3r2_1.1.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27705130-C969-416F-94DF-4ACF94AEBE6F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27B3BE05-DBBC-471B-9052-D6FEAC051033", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F94DE3D-D26D-4B40-BF1B-E8269BEEA817", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07A724-54FB-40D1-8CD4-3D8636EF3E09", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0840EC2-3616-4E41-B806-BAB03FBC8EE5", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14B2D769-233B-42EB-BE17-F1A857B48863", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43A08D27-BC7C-464B-9250-578E80AB718F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC4DDD43-4F29-45B2-B56F-5731F9495E6C", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "82854E42-76EC-4428-9975-B5FBC8DC6FF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D248B1FF-E981-4F0A-BDD7-22B64159F050", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B92717AF-0F69-4A7D-BC06-B0E287AA8008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9400C6E0-11E8-4FD4-A559-6254FC7509CC", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "304C61BE-2438-49EE-A581-4A4EEC2923E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F6FEDE-E686-4FCC-AA4B-9E28060506C4", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F63D4BA1-0706-4137-8492-5A5AC76D6F45", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE382518-267B-4411-8A6F-6AE41DDF49D2", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F85495-9937-40DC-AD18-2285CE8F40BA", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D09402A0-0BCF-45C7-BC80-0894D204D854", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "476549F9-B827-4587-B67F-1D1B12396031", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37DCA506-48B5-4963-AA93-4A9174C5767F", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "734E34E4-8090-4939-9CBC-841556834AFA", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D49AB580-A422-40A2-AC14-876CAE31D6E5", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65339D06-D1ED-49EB-A172-6071F3510E09", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69A0A6DA-EFF8-4DC8-BB52-FC35A5260C24", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "153A5BA3-D730-45C6-9660-002E6512BCA1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5269FF7-5220-4707-9642-138D59438AC1", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E004F6-3488-48EB-A2B0-ABBE32729139", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F7E6D13-6343-4A2B-AF6F-044B9E93C656", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9297E-63CD-4956-8C3F-417EF8AB27DF", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA0C644-DFE5-432E-8078-45BEC5681519", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A2A1A42-FA9E-4CA3-A666-7EF61D8ED794", "versionEndExcluding": "castlepeakwspi-swrx8_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B02CD770-8BD6-4798-8D0B-175F5765765B", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "022C4CD1-F9F5-46F8-A502-93103C771784", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78B69DE-A3CF-45E1-AB93-C73066A619D0", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "178F2AF6-0F65-4F56-B429-A93D31DFF4EB", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4F754E-EB1A-409D-A84C-F8E8D1C54037", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E89A3B6B-EA14-4DF8-9B2F-97E74715D8F3", "versionEndExcluding": "raven-fp5-am4_1.1.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEA674FE-CC7E-4D7F-9AE1-4A9A3C695224", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FAE5380-5C41-4ECC-96DF-EDCEE06AA36F", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC0C3FD4-2D4B-43F7-BD9C-39B9B71444CC", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5DCC668-E44F-4004-A500-B53D37A96DFD", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AC44D47-0B13-4607-BE44-F351092E33FF", "versionEndExcluding": "pinnaclepi-am4_1.0.0.c_\\(rv1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DAA9292-6C8D-44DA-8B67-6E26E0619BFC", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99656971-4F6C-48F4-89A3-52FFF15D934C", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F55EEAA-2E20-4DBB-860F-010A757B9B3E", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE217D96-C33E-470B-9BC9-36AA6C257BEA", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB01C6CC-2F9A-487C-A587-62622DA75AAF", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C08A1B2-1DF1-474B-BB5E-3085A03C9BE6", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "262E6ECB-AAA9-4DFF-A7A2-C4457087A49F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51CC1E13-BED2-4CE5-9BDF-D177B788E5A1", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B745B7F-DDD9-4DAF-8511-76F2C4F7FA20", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB99535-B654-4F63-A30A-F51FF934694B", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0989D19D-9721-47AF-B4F1-3DAFE98FE52A", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D0D05F-B73B-48D7-8341-EF9C1B9B413F", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABEC5CE9-E81B-4D7C-A565-09D7B03ABC5A", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F319382-49F1-4472-9018-7067033C1A23", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33A6688A-CDC4-4005-9EC4-9EB5FA155C81", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF72CC78-4AEA-415F-82E5-B4BCE683A679", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDAD11-FB62-4F46-92C4-8EA4200218C4", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9766178-B8A2-40F2-AAFC-9999A1F672F1", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7D66CE6-6D34-4247-9A54-2723E9D458AD", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F0E769-09E3-4D99-81E3-4419794478C8", "versionEndExcluding": "comboam4pi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BC71F5-5048-43A6-A87A-F87B446243F3", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "886EE0BF-C13C-43E2-B2C7-F7CE2B0E8472", "versionEndExcluding": "comboam4v2_pi_1.2.0.6c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38845C5E-1761-4722-8368-B9439A0DAB14", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "657F1F0E-DDC7-43E7-95AB-70515CB78B7F", "versionEndExcluding": "renoirpi-fp6_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bound checks in the System Management Unit (SMU) may result in a system voltage malfunction that could result in denial of resources and/or possibly denial of service." }, { "lang": "es", "value": "Unas comprobaciones de l\u00edmites insuficientes en la Unidad de Administraci\u00f3n del Sistema (SMU) pueden resultar en un mal funcionamiento de la tensi\u00f3n del sistema que podr\u00eda resultar en una denegaci\u00f3n de recursos y/o posiblemente a la denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26373", "lastModified": "2024-11-21T05:56:14.543", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.587", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources." }, { "lang": "es", "value": "AMD System Management Unit (SMU) puede experimentar un desbordamiento en la regi\u00f3n heap de la memoria que puede resultar en una p\u00e9rdida de recursos" } ], "id": "CVE-2021-26330", "lastModified": "2024-11-21T05:56:07.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:08.083", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP." }, { "lang": "es", "value": "Una comprobaci\u00f3n insuficiente del comando ID en el Firmware SEV puede permitir a un atacante local autenticado llevar a cabo una denegaci\u00f3n de servicio de la PSP" } ], "id": "CVE-2021-26321", "lastModified": "2024-11-21T05:56:05.627", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.807", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
3.3 (Low) - CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L
5.7 (Medium) - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
5.7 (Medium) - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
Summary
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | athlon_pro_300ge_firmware | - | |
amd | athlon_pro_300ge | - | |
amd | athlon_gold_pro_3150ge_firmware | - | |
amd | athlon_gold_pro_3150ge | - | |
amd | athlon_gold_3150g_firmware | - | |
amd | athlon_gold_3150g | - | |
amd | athlon_gold_pro_3150g_firmware | - | |
amd | athlon_gold_pro_3150g | - | |
amd | ryzen_threadripper_2990wx_firmware | * | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | * | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | * | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | * | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_7_3780u_firmware | * | |
amd | ryzen_7_3780u | - | |
amd | ryzen_7_3750h_firmware | * | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3700c_firmware | * | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3700u_firmware | * | |
amd | ryzen_7_3700u | - | |
amd | ryzen_5_3580u_firmware | * | |
amd | ryzen_5_3580u | - | |
amd | ryzen_5_3550h_firmware | * | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3500c_firmware | * | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3500u_firmware | * | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3450u_firmware | * | |
amd | ryzen_5_3450u | - | |
amd | ryzen_3_3350u_firmware | * | |
amd | ryzen_3_3350u | - | |
amd | ryzen_3_3300u_firmware | * | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3250c_firmware | * | |
amd | ryzen_3_3250c | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | amd_3015e_firmware | * | |
amd | amd_3015e | - | |
amd | amd_3015ce_firmware | * | |
amd | amd_3015ce | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BD7B00D-ECD9-419E-B927-7AD293360BB3", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1053118D-84FB-4126-8558-F731AF578D51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2567B7A7-23AF-4A5E-B5B4-50A15EBF58FA", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10630C1F-3EAE-47EE-AD1C-6C35052B1C51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "214D44A0-2B4F-4C3B-BC77-3388F60BEE21", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91DC33A9-7EE5-443F-A195-5739E25880D8", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E196A8EC-8E17-4394-BBB9-AAC4B773686A", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA6066FB-CE27-447A-B9E3-ECFBB59DF4CC", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D9898-5A45-4F76-89F9-A0E0F9B68195", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6554840-DD72-4CB7-B72B-40F0EB4AAB5D", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EB8E56A-20CD-4722-91F8-A4BC9E629F84", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17C9FDD3-74A4-4848-B6CE-7861658C3A30", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B748EBB3-37A9-4F2A-A4A4-AAEEF56BABC0", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "264D28A9-A104-4333-9094-8251FBF00880", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02967552-68C0-4111-B05D-BC17EFEF37DD", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "310788CD-F880-42FC-A781-4C69B4C1A408", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5214C3-79CB-4F7D-81F3-9A681E7FC72D", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28F97D09-23CE-44F0-9850-D9E334BA41B8", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D60980D2-DD11-4750-B18E-DA1EF0ECF0B2", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3A9541F-A050-4ABF-B939-A27248AF12C8", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2ABC7C1-F572-44AD-8950-504BB9DBB496", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4B35F82-5F63-40D9-8064-BAC4CB9162B0", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EAA85BB-83B6-407D-A0D6-4D415F7A96C1", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "894717BC-B96B-46B8-8024-360EFF740ACE", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C7EDAB-8446-4CE7-A3EC-30B5689E2990", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9F54B31-77BA-4CC7-9BD5-71B7B94CE266", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65A360F9-B93C-4F2F-87DD-22665A78C0E0", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1FBDFDF-60D4-4C21-BBFF-F7E7149DD91B", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B91F480-B20D-41FC-8DC3-671216AA8B52", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79EFC4F5-6ADF-4B1D-8D5D-155330690E2C", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A903AEB1-3177-40E1-8664-69084FFACFF3", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4778C2A-F8AD-4BBD-A6FE-01D8A23BF471", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0EC455E-2A91-4B26-91D6-6F6D97CB5AD4", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20CB89E-28E6-49D3-AF22-A316358E44C0", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B797D87-4DB8-48FC-BEAD-3F0D60228410", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94F9B5D9-4667-4E94-81B0-C625FBBF3E40", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C372C35-032C-4273-A18D-6E6F6DCD7E83", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9851652C-3E34-4E08-AD6D-A15165093575", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D122678A-2637-43CD-898E-6B6F1632FF9F", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BF9D4E0-8BD0-41F6-88D9-FDD04E0E1A3E", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07F600BA-8999-416C-B9A3-0AC63FBD45D4", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEE20426-A6A5-4CFB-AEB9-D32E223F9DDB", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8C801D-46B1-4C2B-9E33-9E32C7ED6D3E", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6852EDE-ABEF-40C7-A693-A78EECB7E694", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "088728C3-3A0B-43E3-9E7E-23B9FE3BCD6B", "versionEndExcluding": "milanpi_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52DFA8C8-AD16-45B1-934F-AEE78C51DDAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD375C2E-B976-4DAE-BF89-EFED1482DB28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B8FAEA2-68B5-49A1-AF75-F87A5B464B9D", "versionEndExcluding": "summitpi-sp3r2_1.1.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2E524CC-0AC0-42B3-B77A-B65651D99B65", "versionEndExcluding": "summitpi-sp3r2_1.1.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9D3C4D3-E1A4-481D-9562-9ECB09ADCB16", "versionEndExcluding": "summitpi-sp3r2_1.1.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "613C2809-9D90-4C2A-89F6-015BC2C0AC2F", "versionEndExcluding": "summitpi-sp3r2_1.1.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF809F01-E6B3-4975-AC8B-EE2FDD199B14", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3770F180-FB7C-410F-B49D-D30AA05326BC", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15FE9FAE-DEC6-42FA-8622-3D5B0C845928", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D7DEDAC-51F3-4B72-8958-72CFDB8572A0", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "799912F4-2A5D-41F6-B645-5972B966617B", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD8FA542-D8A5-4C7F-BF80-E79CE90D7D76", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F979144-C85F-40E3-811E-A455CCE40762", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6F0F843-A668-4BA3-9111-491BD115E0DA", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B393655-B1EA-4855-A1DB-C850A66A0784", "versionEndExcluding": "pollockpi-ft5_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BE994A7-B65C-473C-AF1F-DC6B82A00750", "versionEndExcluding": "pollockpi-ft5_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service." }, { "lang": "es", "value": "TOCTOU en el ASP Bootloader puede permitir que un atacante con acceso f\u00edsico altere los registros ROM SPI despu\u00e9s de la verificaci\u00f3n del contenido de la memoria, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad o una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20521", "lastModified": "2024-11-21T07:41:04.330", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 0.3, "impactScore": 2.7, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:15.580", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
6.1 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_3900xt_firmware | - | |
amd | ryzen_9_3900xt | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5900_firmware | * | |
amd | ryzen_9_5900 | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | * | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_3960x_firmware | * | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | * | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | * | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | * | |
amd | ryzen_threadripper_pro_3995wx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "310788CD-F880-42FC-A781-4C69B4C1A408", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "910DFF12-DF71-444C-89A0-10CFE6A1BAA4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36F046AD-A8BC-4BE1-812F-99E096779C77", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32FA4160-368C-46AC-A7DD-623CB8CF1F01", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C1AD7A8-7E0F-4EDD-B93F-D4800D54D776", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "948D4C27-EBB2-4578-BE09-2F237B9B8D59", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80BEF1BA-4533-40CA-8DC6-FCB6D9A291C4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BB5D70A-1627-4878-8F12-FB439C2BB2F0", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3923056A-10A5-4879-97E6-42CF1CE0D8EA", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7DB4572-5B80-4285-BA0A-0D8BC3D56B2B", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CD24B2D-B294-4430-A306-9759653BF3DF", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A06E97F-061E-4469-A6B8-E3BBB169ACA9", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C74A112C-799B-4473-A704-50D75A050B77", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5D317CB-7F79-423C-8EA8-4B883ACA0E9F", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E403A52-1DFA-443E-B1CF-781CE63444F5", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2D4B954-EE3A-4B45-8BD6-6FAB58F9CB1C", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0982896B-51FB-41AB-AE36-25A654DBABB5", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05AF03B3-57EA-4A27-8BFC-170008F63266", "versionEndExcluding": "comboam4v2_pi_1.2.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5356BD-E589-4B26-8197-5069037C6A0A", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D820634B-5BD2-41A8-890A-70DAAD1D3593", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25FBE13F-CD91-4161-918C-260041E1D1D4", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5535C20-7053-4830-A0F2-6B8179A3FE2C", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service." }, { "lang": "es", "value": "Una validaci\u00f3n de direcci\u00f3n DRAM insuficiente en System Management Unit (SMU) puede permitir que un atacante lea/escriba desde/hacia una direcci\u00f3n DRAM no v\u00e1lida, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20533", "lastModified": "2024-11-21T07:41:06.163", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4.7, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:15.687", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-10-02 17:35
Severity ?
7.5 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
6.4 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
6.4 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow
an attacker with ring0 privileges and access to the
BIOS menu or UEFI shell to modify the communications buffer potentially
resulting in arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52229468-9A95-4B2A-B242-88A49198BB69", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75CC4E62-C004-4DB5-B045-8CA6F6375310", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B72D0513-A081-4871-B4C4-8E3D4F1C7F20", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E2074A2-64F9-4504-BB6C-E5ABD0B9127F", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF399472-A184-479C-85B1-53EF5839A1DA", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8525DD1-74DE-40A8-80DF-5CF8C6F0C6EC", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B814AA68-5BD4-496B-AAC1-5C38808EDAAB", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D8AAF48-ED77-48A0-B79E-BFFAF0EF6242", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4336899-8E52-4ED2-BDE0-332AC882BFDF", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "010984BE-83AF-43E4-A223-99F3A8109E78", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "871188D9-6824-4E32-966D-498289249197", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEBA6BC7-7200-487F-BAB7-1418DC4D31A8", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "869AB16C-9789-4224-B5FD-A0B8F592E3D3", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AB7BEB3-7963-46F0-893F-1AC572ECA3F7", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5834EEE-2556-4E2B-BCD7-FC00ADF202D7", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B2721D3-FB40-4226-A19D-25E08723CA00", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4080FDB7-2CCD-40A5-8911-7F6FA914711C", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "368E596E-DC61-45B8-AD56-7F6F407C1696", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "151FF36E-D9B4-4AAE-BD92-29F9B80A323C", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21871F5-1554-4114-A48E-4CB4EE49719F", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D3E4278-4687-4ABB-B3DF-034CD3219DEA", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC4882DB-052E-42B5-B7C4-8069208A2B6F", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30D3F0ED-EF34-4019-A236-F82466C80D1C", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B445C34-694D-479F-AE24-C33C12EFE7AD", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE3CDA1-FCB5-4EEC-B432-B157B4821EA3", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EED4A04F-989A-4C2B-9D8A-BD55F35F25CF", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C366C81F-0BA0-4BB0-85CD-683B909070A6", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADD566C1-9D5D-4290-A59C-5EC4858B7EEB", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DBED30F-F061-4D68-8DCA-36A0799B6B8D", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14DE8C60-FFCA-4C1A-8E56-CA7D587FA6BD", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "640BBEA7-6FF0-48BE-9293-91B3938A944D", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFC537E2-7ED8-4D06-982A-D82A8077A847", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFC90C96-F53B-4231-86D5-487E386D8753", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12860839-6A4E-42CC-8E6D-498718E285CB", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7F4DF58-DED1-4B73-8A79-8B726BDCF038", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B7A0640-A14D-401A-97AC-BA053CD6EFD1", "versionEndExcluding": "genoapi_1.0.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BB5D70A-1627-4878-8F12-FB439C2BB2F0", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80BEF1BA-4533-40CA-8DC6-FCB6D9A291C4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "948D4C27-EBB2-4578-BE09-2F237B9B8D59", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C1AD7A8-7E0F-4EDD-B93F-D4800D54D776", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32FA4160-368C-46AC-A7DD-623CB8CF1F01", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36F046AD-A8BC-4BE1-812F-99E096779C77", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "910DFF12-DF71-444C-89A0-10CFE6A1BAA4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9E27FD9-3F54-48A2-AA2E-EE797D264757", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F683539A-0D2B-4FE8-823C-01439E74CF3C", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E51DCE34-419F-4645-899F-A02B352BDCA9", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40F03482-025B-4323-831B-B0F985083CD8", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6FC45BE-C55D-4FB4-A10E-89A80477251C", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E7E49B-F739-4B9F-94AA-64041A3E38F8", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4613AA4-BE67-46B5-875C-A5D5CDEADB62", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "956D2603-DB21-4349-BA0A-3DDD3AD8177A", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0D7C415-6952-4DCC-9EAE-50BD5DD8A226", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A30368D7-2E1D-41D5-9E72-FB2D156C1AAF", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42707648-1703-4FA0-8D64-2149DA2C7C49", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "938BE7DE-6094-4E7B-BC42-88EC0E037C8A", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4E7658B-5AE0-451A-8EAA-0713FA20C2C9", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C812730D-D41C-4606-81E3-AB0A0389354D", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D6DC9C5-2804-4320-8FA4-76A8F4665C73", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA520E42-E231-456B-AC4A-CBF7B42D1F4D", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877949F7-C06F-4804-97BB-4147F348F7A0", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7C790F3-E6D1-4E00-9E48-C4FA4DB2A6B6", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8964660C-AB5C-4932-942E-B2C6F223B097", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBA9BBB-0FF7-4D15-8AD3-BF591D136B5F", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09606942-FF1B-46A1-890D-65BDA7624704", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C40C74D-A6F9-4428-89E4-2201DD9E9919", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99144DDA-F3EA-45E2-B470-ACD1652194F1", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "555BC41D-3E8E-49FE-BDF3-0D496B8A9147", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30A454D-0B71-4651-AFEB-E915BCB8AC9F", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "724E131E-E678-4AD7-B521-5E68882AF4BD", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07526B36-A301-49B4-A1B4-86D182D3BFD4", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C28F9044-4D6D-421D-8F8E-9A35DE6DA79E", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "149DCFDB-8062-4376-A7F7-645A8D40AC84", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFACA3C3-7481-45DF-9870-7761CB858B2D", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F606E5D6-0113-4908-900D-E94F87E6481A", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDCBAB98-1683-47C3-8DDB-BF39F6286B34", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A0DC6B5-3851-40B2-B959-524A6116A6DC", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70A4946C-DF6C-4CD8-9842-E5027FFAA078", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1855549F-70B0-4670-BF61-C0DD02525C45", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C459B1FE-D8ED-4483-8780-9134C3246B5E", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E90EDBC7-C8C6-4DF1-BF23-C883611DD4FC", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99C92284-DD9E-4B5D-81D7-67990905C2EE", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1661DEF6-006B-4C14-953A-5322141B4CF0", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5871DB40-AF57-4031-990E-E99902CAF8FC", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications buffer\u00a0potentially\nresulting in arbitrary code execution." }, { "lang": "es", "value": "Un TOCTOU (Time-Of-Check-Time-Of-Use) en SMM puede permitir que un atacante con privilegios ring0 y acceso al men\u00fa BIOS o al shell UEFI modifique el b\u00fafer de comunicaciones, lo que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2023-20578", "lastModified": "2024-10-02T17:35:44.117", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6.0, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:19.510", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-13 12:15
Modified
2024-11-21 05:00
Severity ?
Summary
The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p | - | |
amd | epyc_7251 | - | |
amd | epyc_7252 | - | |
amd | epyc_7261 | - | |
amd | epyc_7262 | - | |
amd | epyc_7272 | - | |
amd | epyc_7281 | - | |
amd | epyc_7282 | - | |
amd | epyc_72f3 | - | |
amd | epyc_7301 | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p | - | |
amd | epyc_7343 | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p | - | |
amd | epyc_7352 | - | |
amd | epyc_7371 | - | |
amd | epyc_73f3 | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p | - | |
amd | epyc_7413 | - | |
amd | epyc_7443 | - | |
amd | epyc_7443p | - | |
amd | epyc_7451 | - | |
amd | epyc_7452 | - | |
amd | epyc_7453 | - | |
amd | epyc_74f3 | - | |
amd | epyc_7501 | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p | - | |
amd | epyc_7513 | - | |
amd | epyc_7532 | - | |
amd | epyc_7542 | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p | - | |
amd | epyc_7552 | - | |
amd | epyc_75f3 | - | |
amd | epyc_7601 | - | |
amd | epyc_7642 | - | |
amd | epyc_7643 | - | |
amd | epyc_7662 | - | |
amd | epyc_7663 | - | |
amd | epyc_7702 | - | |
amd | epyc_7702p | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p | - | |
amd | epyc_7742 | - | |
amd | epyc_7763 | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12 | - | |
amd | epyc_embedded_3101 | - | |
amd | epyc_embedded_3151 | - | |
amd | epyc_embedded_3201 | - | |
amd | epyc_embedded_3251 | - | |
amd | epyc_embedded_3255 | - | |
amd | epyc_embedded_3351 | - | |
amd | epyc_embedded_3451 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*", "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*", "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*", "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor." }, { "lang": "es", "value": "La falta de protecci\u00f3n de tablas de p\u00e1ginas anidadas en la funcionalidad SEV/SEV-ES de AMD, podr\u00eda potencialmente conllevar a una ejecuci\u00f3n de c\u00f3digo arbitraria dentro de la M\u00e1quina Virtual invitada si un administrador malicioso tiene acceso para comprometer el hypervisor del servidor" } ], "id": "CVE-2020-12967", "lastModified": "2024-11-21T05:00:36.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-13T12:15:07.443", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-10 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBBDB4C7-ACE7-4E2C-AEB7-43A43D6EDA02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E2E06DC-6338-4D73-A7F4-C004CBAC7D02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E32897E-6D86-4C74-ABB7-05844A1E7CA2", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84179B6A-5F03-4F90-A8B5-730BBBD09CDA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs." }, { "lang": "es", "value": "Un error en el TMR de SEV-ES podr\u00eda conllevar a una potencial p\u00e9rdida de integridad de la memoria para las VMs activas en SNP" } ], "id": "CVE-2021-26324", "lastModified": "2024-11-21T05:56:06.107", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-10T19:15:07.857", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-10 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBBDB4C7-ACE7-4E2C-AEB7-43A43D6EDA02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E2E06DC-6338-4D73-A7F4-C004CBAC7D02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E32897E-6D86-4C74-ABB7-05844A1E7CA2", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84179B6A-5F03-4F90-A8B5-730BBBD09CDA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability." }, { "lang": "es", "value": "Un fallo en la verificaci\u00f3n de SEV-ES TMR no est\u00e1 en el espacio MMIO, SEV-ES FW podr\u00eda resultar en una potencial p\u00e9rdida de integridad o disponibilidad" } ], "id": "CVE-2021-26332", "lastModified": "2024-11-21T05:56:07.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-10T19:15:08.220", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 06:34
Severity ?
Summary
Insufficient syscall input validation in the ASP
Bootloader may allow a privileged attacker to execute arbitrary DMA copies,
which can lead to code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.9 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.9 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.9 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.9 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.9 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.9 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.9 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.e | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.e | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.e | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.e | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.e | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.e | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.e | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.e | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.e | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.e | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.e | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.e | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.e | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.e | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.e | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.e | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.e | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.e | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.e | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.e | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.e | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.e | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.e | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.e | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.e | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient syscall input validation in the ASP\nBootloader may allow a privileged attacker to execute arbitrary DMA copies,\nwhich can lead to code execution. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-46769", "lastModified": "2024-11-21T06:34:41.030", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:11.200", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-10 22:15
Modified
2024-11-21 05:56
Severity ?
Summary
A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - | |
amd | epyc_7232p_firmware | - | |
amd | epyc_7232p | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_74f3_firmware | - | |
amd | epyc_74f3 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7513_firmware | - | |
amd | epyc_7513 | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_7543_firmware | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | - | |
amd | epyc_7543p | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7552_firmware | - | |
amd | epyc_7552 | - | |
amd | epyc_75f3_firmware | - | |
amd | epyc_75f3 | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7643_firmware | - | |
amd | epyc_7643 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7663_firmware | - | |
amd | epyc_7663 | - | |
amd | epyc_7702p_firmware | - | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7713_firmware | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7763_firmware | - | |
amd | epyc_7763 | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7282_firmware | - | |
amd | epyc_7282 | - | |
amd | epyc_72f3_firmware | - | |
amd | epyc_72f3 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7313_firmware | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | - | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | - | |
amd | epyc_7343 | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_73f3_firmware | - | |
amd | epyc_73f3 | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7413_firmware | - | |
amd | epyc_7413 | - | |
amd | epyc_7443p_firmware | - | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | - | |
amd | epyc_7443 | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7453_firmware | - | |
amd | epyc_7453 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | - | |
amd | epyc_7h12 | - | |
amd | epyc_embedded_3101_firmware | - | |
amd | epyc_embedded_3101 | - | |
amd | epyc_embedded_3151_firmware | - | |
amd | epyc_embedded_3151 | - | |
amd | epyc_embedded_3201_firmware | - | |
amd | epyc_embedded_3201 | - | |
amd | epyc_embedded_3251_firmware | - | |
amd | epyc_embedded_3251 | - | |
amd | epyc_embedded_3255_firmware | - | |
amd | epyc_embedded_3255 | - | |
amd | epyc_embedded_3351_firmware | - | |
amd | epyc_embedded_3351 | - | |
amd | epyc_embedded_3451_firmware | - | |
amd | epyc_embedded_3451 | - | |
amd | epyc_embedded_7601_firmware | - | |
amd | epyc_embedded_7601 | - | |
amd | epyc_embedded_7551_firmware | - | |
amd | epyc_embedded_7551 | - | |
amd | epyc_embedded_7501_firmware | - | |
amd | epyc_embedded_7501 | - | |
amd | epyc_embedded_7451_firmware | - | |
amd | epyc_embedded_7451 | - | |
amd | epyc_embedded_7401_firmware | - | |
amd | epyc_embedded_7401 | - | |
amd | epyc_embedded_7371_firmware | - | |
amd | epyc_embedded_7371 | - | |
amd | epyc_embedded_7351_firmware | - | |
amd | epyc_embedded_7351 | - | |
amd | epyc_embedded_7301_firmware | - | |
amd | epyc_embedded_7301 | - | |
amd | epyc_embedded_7281_firmware | - | |
amd | epyc_embedded_7281 | - | |
amd | epyc_embedded_7261_firmware | - | |
amd | epyc_embedded_7261 | - | |
amd | epyc_embedded_7251_firmware | - | |
amd | epyc_embedded_7251 | - | |
amd | epyc_embedded_755p_firmware | - | |
amd | epyc_embedded_755p | - | |
amd | epyc_embedded_740p_firmware | - | |
amd | epyc_embedded_740p | - | |
amd | epyc_embedded_735p_firmware | - | |
amd | epyc_embedded_735p | - | |
amd | epyc_embedded_7h12_firmware | - | |
amd | epyc_embedded_7h12 | - | |
amd | epyc_embedded_7742_firmware | - | |
amd | epyc_embedded_7742 | - | |
amd | epyc_embedded_7702_firmware | - | |
amd | epyc_embedded_7702 | - | |
amd | epyc_embedded_7662_firmware | - | |
amd | epyc_embedded_7662 | - | |
amd | epyc_embedded_7642_firmware | - | |
amd | epyc_embedded_7642 | - | |
amd | epyc_embedded_7552_firmware | - | |
amd | epyc_embedded_7552 | - | |
amd | epyc_embedded_7542_firmware | - | |
amd | epyc_embedded_7542 | - | |
amd | epyc_embedded_7532_firmware | - | |
amd | epyc_embedded_7532 | - | |
amd | epyc_embedded_7502_firmware | - | |
amd | epyc_embedded_7502 | - | |
amd | epyc_embedded_7452_firmware | - | |
amd | epyc_embedded_7452 | - | |
amd | epyc_embedded_7f72_firmware | - | |
amd | epyc_embedded_7f72 | - | |
amd | epyc_embedded_7402_firmware | - | |
amd | epyc_embedded_7402 | - | |
amd | epyc_embedded_7352_firmware | - | |
amd | epyc_embedded_7352 | - | |
amd | epyc_embedded_7f52_firmware | - | |
amd | epyc_embedded_7f52 | - | |
amd | epyc_embedded_7302_firmware | - | |
amd | epyc_embedded_7302 | - | |
amd | epyc_embedded_7282_firmware | - | |
amd | epyc_embedded_7282 | - | |
amd | epyc_embedded_7272_firmware | - | |
amd | epyc_embedded_7272 | - | |
amd | epyc_embedded_7f32_firmware | - | |
amd | epyc_embedded_7f32 | - | |
amd | epyc_embedded_7262_firmware | - | |
amd | epyc_embedded_7262 | - | |
amd | epyc_embedded_7252_firmware | - | |
amd | epyc_embedded_7252 | - | |
amd | epyc_embedded_7702p_firmware | - | |
amd | epyc_embedded_7702p | - | |
amd | epyc_embedded_7502p_firmware | - | |
amd | epyc_embedded_7502p | - | |
amd | epyc_embedded_7402p_firmware | - | |
amd | epyc_embedded_7402p | - | |
amd | epyc_embedded_7302p_firmware | - | |
amd | epyc_embedded_7302p | - | |
amd | epyc_embedded_7232p_firmware | - | |
amd | epyc_embedded_7232p | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "907ABA86-2313-4D2F-832A-5F48E928553F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*", "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*", "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68041D51-331A-4716-AF30-3B37C07F851C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*", "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A518D997-F2ED-4489-AB69-871799C80DA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF9B650-F6D9-463E-8107-33C540A6E093", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "896B4BEE-C14D-4C07-8757-32753F97B00A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81333440-CC8B-4261-B9CC-ECA0A71BA7BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC4AB744-D25D-4957-A59C-88D2DC58C80C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "52F05DED-9EF9-4EA3-AD5A-82A7910A707B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "450B1070-7EB3-4CA9-BAE0-A5F1BC8D496F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "D334BA0B-BB66-4358-BA90-FE23517545EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "05CD71FC-AB6D-47E9-9218-C91A234B9C24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE8E000-C771-4DB1-94CE-074F5B93D37D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E4DC937-0674-42F7-A1D1-F7E863B53A91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D080645-4D40-4ED2-B232-924C9C54594C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "070BCADE-6B21-4A23-98EB-8066FFFAE669", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB985DC-B05A-4443-89EA-426D7E49EE64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD0DC74-61B3-41FC-989E-ED9C35DEE2F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED8BA8B1-07F1-49D8-8E42-A5DDA10C65CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA09BAA0-05FB-4B9F-AAAE-043D2E0D5AD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C806BA9-5B49-4791-8106-98AD2B6CE9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1963446-5D43-410C-9092-0AEC9B4A0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "157807C6-68D3-4C38-92E0-8711B2E27E6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8207292-897B-4CF3-ADF1-7315BF1685DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B38FFE-9F43-4256-9ADC-B26C6AE8EAA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17975952-3089-41A0-8749-02C38C1AAAC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD5DA99-B62A-4D07-B772-23F74F7E6A9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBA5C26B-5987-4DFB-B170-28AB69FDAF4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EE075-60D9-4040-B92C-F9AC4CA2E45A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_755p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28ED6E82-E504-4B2F-9461-08CA7EAABDBD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_755p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E7620BA-725F-4FAE-A8F8-E86B68DAB70F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_740p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E11EAA0-926A-462D-B9C9-9FDC004570DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_740p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51B59724-FCCB-4FDA-93CA-8B34E05B605D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_735p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCEBE07C-D070-4F55-8068-F3C7C3D8463C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_735p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D5358B3-A3A5-4DCD-A637-A7FCF9E9294D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4524C883-B83C-4725-B7B7-D2EAA5A8CA68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1295268-EEF3-4729-AB5A-92FB1A54DDCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6E2984-0D6C-4AF1-B804-318C9B0E25BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5520E3-2CE4-4603-9B88-C87B0E8BFFC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADF2869-5A22-41B8-BA4A-983D458924AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "E79AEAF0-BD56-4B32-B751-8BF0B77EB35F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0499FC7A-B25F-4108-A226-7CFA88147025", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E519255-1852-4E8B-8CB0-923C84A042AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBDD2A07-6611-4E66-9C50-02690CEE7CC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "405516F0-0CFD-463C-9CD7-BD3DA8C1FAFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C467DCF-8532-48BC-A6FC-BE4630C1E591", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "2899555F-1866-4C31-AC42-C53F4FA34205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14EC642-6373-4FF3-B9F1-659DBBC9057F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "4451C723-AB17-4808-981A-DA8DA9F00F4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2A57A1A-5801-4B5D-8B5A-3805A3453A70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "03CB40D5-9553-45EE-8E2C-AD0FE2856D74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8947D6DD-A667-4ED6-9376-599D753B6233", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAEF5FCC-916A-4157-862D-F535187BB51D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A14CDA-3C70-4E7A-B443-DA80054F3772", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB6267A-94F9-4048-B7B8-A49DE90A92DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B2C9C9-A3D9-4466-B2A4-C8C7327920A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB940A6-42F3-4655-BFE9-F8781501D791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "534FC224-188B-42FB-9E77-F88C1068CD14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6EA803F-13EC-4D52-8AA6-F841DC734445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD74D15-0FCD-47DC-B98B-C17358C9C396", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BBCDA30-F49D-4692-A995-5F4D2B7EC9D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8623221-FED4-4F28-B179-A0F1D5E177FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "049EEAD5-8CDA-46C3-B904-4DF6304ECC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0132EA29-B3C2-40EE-9742-54803CF2076A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB4C7513-0B72-4737-9636-C796BFBAE8A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF95FF8-2E24-4F11-95A1-413D71BA28A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FDAD440-8EF5-4484-A558-EBC5B38E51A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79011066-90A2-4A2E-9267-B8F318C0F32E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "869DD653-40EB-4DBC-97FA-F3FD45F91147", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE40EA-AD62-4053-9EB8-1A79D80ABB76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E050ADA0-554E-4565-8F9E-12E7428821C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "393DAE4B-39F4-4E43-B422-0620013426BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3450FF5-4741-443B-8D63-90C6D8B798A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF23E7EB-C4BB-42F5-AE8E-6E9F6D2265A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A18E7E3-F614-4A73-A270-042D887D49DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929C8058-491D-400F-88E9-3639269AAC41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E15528-03C0-457B-8720-7C9AC94A4413", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EB0E55-3622-4022-A987-31D0423F0D4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "500FC809-D29D-4A8D-8DBC-943788FDE017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4931C9D0-F5A0-4EE3-843A-A5529351DBFF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1ACE7E0-F73E-4700-A64D-A65AF8A8D585", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73B2E-4D67-45E3-B2AE-BD50261CD128", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "693C9380-D732-4ED2-98AD-B326C6D51715", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "124C4B7F-BC05-4B65-89D4-935760AD87AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "852C88A6-5381-4D0A-B81A-D567078A6AFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM)." }, { "lang": "es", "value": "Un Hypervisor malicioso en conjunci\u00f3n con un proceso de atacante no privilegiado dentro de una m\u00e1quina virtual invitada SEV/SEV-ES puede producir un fallo en el vaciado de la Memoria Intermedia de Traducci\u00f3n (TLB), resultando en un comportamiento no esperado dentro de la m\u00e1quina virtual (VM)" } ], "id": "CVE-2021-26340", "lastModified": "2024-11-21T05:56:08.917", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-10T22:15:08.323", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:00
Severity ?
Summary
Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution." }, { "lang": "es", "value": "Una validaci\u00f3n insuficiente de la longitud de la imagen de la BIOS por parte de ASP Firmware podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario" } ], "id": "CVE-2020-12944", "lastModified": "2024-11-21T05:00:34.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.317", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-10 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBBDB4C7-ACE7-4E2C-AEB7-43A43D6EDA02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E2E06DC-6338-4D73-A7F4-C004CBAC7D02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E32897E-6D86-4C74-ABB7-05844A1E7CA2", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84179B6A-5F03-4F90-A8B5-730BBBD09CDA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.\n\n" }, { "lang": "es", "value": "Debido a un error manejado inapropiadamente, es posible dejar la UApp DRTM en un estado parcialmente inicializado, lo que puede resultar en escrituras de memoria no verificadas cuando la UApp maneja comandos de buz\u00f3n posteriores" } ], "id": "CVE-2021-26353", "lastModified": "2024-11-21T05:56:11.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-10T19:15:08.657", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 07:41
Severity ?
Summary
An attacker with a compromised ASP could
possibly send malformed commands to an ASP on another CPU, resulting in an out
of bounds write, potentially leading to a loss a loss of integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.5 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.5 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.5 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.5 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.5 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.5 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.5 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.5 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.5 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.5 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.5 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.5 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.5 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.5 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.5 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.5 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.5 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.5 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.5 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.5 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.5 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.5 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.5 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.c | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.c | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.c | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.c | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.c | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.c | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.c | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.c | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.c | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.c | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.c | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.c | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.c | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.c | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.c | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.c | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.c | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.c | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.c | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.c | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.c | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.c | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.c | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.c | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.c | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9420AA3C-1389-4EC6-8723-71CD968164AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8A3DA4E8-BEC3-433F-8B12-27B66D454431", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "651FB077-E9EF-47A2-BDA8-289FF8438024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EB28D336-462E-4D27-BA14-6EDAC33931DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "43997A61-1AC6-450F-B166-990841C6F5EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B0955CB1-B3CF-4B7A-AB74-99FC274332C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "085B7E03-F5FB-4150-85E9-BBFBB0DCEE3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF484B3C-7524-4348-9CB2-D99F22CF6886", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "50898ED8-B85C-4D83-A644-724BB191FF40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1E34454-36D9-4D32-8169-15285A40BD75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "03B28F55-D809-4646-8BB8-516CD4749834", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFCEA8-B8E5-401B-BA03-9A65FD380A29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F01BA258-C253-4219-8E1D-1C7530AD0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8D7A4FEB-54D6-4C62-B454-832FE97063DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "4EE9DFEE-0DBA-45E4-BA36-5110B6056B1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F54E341F-1813-462D-BC0A-E995C746FC6F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "6F6DB6F7-5129-4143-9D0F-60DCF9112FA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC0BE1-5C1E-47C4-8E2D-873682C15CD0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "727A3552-D7B2-4C2A-BCCD-0ED2CE45BDF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7A10ED7C-9F22-4A5F-B4F8-9E24F2778D65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "627C5574-97A4-4E72-8A79-C3E41E9209EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "733D1FEF-9AC5-4C77-9EBA-D091DB9F53CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8B69D-AD1E-4326-9669-885425E685FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "C4A6B00B-91D3-4B34-B38D-A309425BDE2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "F196D616-3DF2-4011-9F6F-56435DEADD54", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "61E4E1B2-79D4-46AA-9416-7EF99719A241", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "B512E47D-0612-4E38-8E3E-EFD70CB94019", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "50C3A24D-2D3E-43B4-ACE9-2BB19DE0EA2F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "927E5109-C731-42B3-A157-CF7CD3C7C6F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "9D6031E3-44AF-4187-B767-6977147F96B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "1E0A90A2-0E13-4305-9778-CDF2497D106E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "93467C08-CB3A-42EF-8D1B-34C1D570475F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "F24A7894-7CBB-4396-8830-F996EF755A97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "DAFCEE76-B989-4954-AA78-7CDCCF5B4ED7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "B5F50B23-FC9F-44A6-BEB0-E6D96A625F8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "CCDBD0E4-1813-4656-919E-21EDA0AC61B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "3FD713C8-2873-4FB6-822E-6F74DCFA2B70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "7304B43A-5C73-4612-A924-F136D5492A03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "6F396B01-D909-43C8-A4DD-D91ED34DFEFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "64A1E399-C2E3-437A-B31D-3CE781BC9888", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "636A932F-0794-4D5E-B86C-2FD959B0E9C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "6A406D45-1050-473F-B033-1F35738BA2E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "30763954-1B38-4834-B641-FE2B03C12F3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "345CD142-6953-4149-B426-8918ED3356AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "29AD9C1D-9A5B-409F-B044-A47E70B98549", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "0E853A7D-DB76-4909-A215-BCA06C795740", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "DEF53419-06D3-4EE4-8464-661FA82BA919", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.c:*:*:*:*:*:*:*", "matchCriteriaId": "CBAB5099-1E7C-4C63-8C50-DE233197B9EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker with a compromised ASP could\npossibly send malformed commands to an ASP on another CPU, resulting in an out\nof bounds write, potentially leading to a loss a loss of integrity.\n\n\n\n\n\n\n\n" } ], "id": "CVE-2023-20524", "lastModified": "2024-11-21T07:41:04.847", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:11.550", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
A TOCTOU in ASP bootloader may allow an attacker
to tamper with the SPI ROM following data read to memory potentially resulting
in S3 data corruption and information disclosure.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_3950xt_firmware | - | |
amd | ryzen_9_3950xt | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_3700xt_firmware | - | |
amd | ryzen_7_3700xt | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5900_firmware | * | |
amd | ryzen_9_5900 | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | * | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BD7B00D-ECD9-419E-B927-7AD293360BB3", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1053118D-84FB-4126-8558-F731AF578D51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2567B7A7-23AF-4A5E-B5B4-50A15EBF58FA", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10630C1F-3EAE-47EE-AD1C-6C35052B1C51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "214D44A0-2B4F-4C3B-BC77-3388F60BEE21", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91DC33A9-7EE5-443F-A195-5739E25880D8", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E196A8EC-8E17-4394-BBB9-AAC4B773686A", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA6066FB-CE27-447A-B9E3-ECFBB59DF4CC", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D9898-5A45-4F76-89F9-A0E0F9B68195", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6554840-DD72-4CB7-B72B-40F0EB4AAB5D", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EB8E56A-20CD-4722-91F8-A4BC9E629F84", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17C9FDD3-74A4-4848-B6CE-7861658C3A30", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B748EBB3-37A9-4F2A-A4A4-AAEEF56BABC0", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "264D28A9-A104-4333-9094-8251FBF00880", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02967552-68C0-4111-B05D-BC17EFEF37DD", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289EC897-401C-4C91-8C1F-7CB5E034FE4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33C33F27-AEBC-4DD4-8262-FE025253AE97", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E39BD43-7D5D-4210-9C7F-864F683145DA", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6288EE79-3403-44A8-9235-69BA199A6030", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "051172C8-F9BA-411F-A493-7A7733C112C8", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AEA61A0-B5F7-4686-8512-EC0384D3834B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70A5C00A-1E67-42D8-8308-2B3BB4C890F1", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8EE809F-B0F8-45BF-B09B-300B2BF19D80", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ED4A553-FAD0-4586-9028-BC31DE44ABE6", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "705F826C-F5DA-4803-9104-45B1F3E3CC86", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E0076C0-C3E2-4E85-9D48-CAA83AFA7E0B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E14DB62-5BDB-4C06-B55E-E579BCEF1449", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C924FDA-8806-4CB7-97D4-E014E56E5463", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C48B708-BEB1-41AC-8B2E-9DA04C214CBB", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FF41C57-7BEF-4A89-8A75-6F8247885792", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3021490-D6A4-423F-B87A-9995CD6BDEA5", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "518A109A-1776-40F0-A8DF-B7C971EFB633", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F89D442C-0E87-4C0E-A2ED-194C5C42D4A5", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A11965EE-3867-4846-B714-79F1D2681AAA", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BE9015F-CE32-41E7-88CD-2057AACA3D98", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDC3E24-8F3C-4A6C-849B-52C8240EAE27", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4E099CD-49DA-44B6-8DA7-C39502321D2B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C88C305-88AA-4B54-ADA2-A13202157163", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FBF8C2-C17C-4688-AF07-CBCF22A86879", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "578B531F-3884-4F0A-AE99-9F5F3D3267A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A630AE54-9E40-4ABB-81DC-35D423785C44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "E772D4F6-B0AD-490F-BAF0-DADD3C8F5295", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EB03625-1A44-46CF-BEE4-B9753A2067AD", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DDE971D-6762-4D3F-B574-6839D195BB6B", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B018068-116B-4662-AB36-849F934F1AE7", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83E392A7-AEC8-4F8C-8761-1247CB1A0B23", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8985C782-787C-4B7E-8C0F-033654D84764", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4012629D-3D3F-48ED-88A5-9F2CB44914F9", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD8CE65-F4DB-4D0B-8A49-6161E201F791", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65DE69E3-AE8A-42F9-897D-0950E7D074D0", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE7618FD-A6A5-4DA6-93AE-253C8162F97F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98A4202-BDB2-4ED4-97AD-9048F3B8B08E", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A TOCTOU in ASP bootloader may allow an attacker\nto tamper with the SPI ROM following data read to memory potentially resulting\nin S3 data corruption and information disclosure.\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-26356", "lastModified": "2024-11-21T05:56:12.070", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:10.737", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:31
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Summary
Improper re-initialization of IOMMU during the DRTM event
may permit an untrusted platform configuration to persist, allowing an attacker
to read or modify hypervisor memory, potentially resulting in loss of
confidentiality, integrity, and availability.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CAE0DC7-E2B7-41BF-ACE6-0C6A0D256269", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "434D661B-CC93-45AF-81DD-56D1224742DC", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB2E339F-8B74-4FC2-BF6C-40DBB4E67AA8", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A01E67D-A30F-46FA-B7ED-8ABF713694FA", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4276F58E-86C9-422D-A318-D3C809B53963", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23BD0E26-B0B8-4613-8DD8-988AA6F33C36", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33A763A2-B6FD-4544-B051-60A43C716BEE", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5F753-93BE-4568-8487-39F65F90A8E3", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC954B29-33C0-4167-8B24-62F78C6B1AE5", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1530CEE-B546-4FE5-93A2-2AEFDCD0F1F3", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F03231CC-4F68-4602-9F1F-C0BA96C74AA8", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD7D2FFF-E1B8-4B46-996B-94365ECA78A9", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CEDE31C-0AD0-4103-A4B1-10F898F61017", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E14FC6-B6BB-42A5-8805-AF6065557EEE", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89E1C09E-A174-4279-BA21-15571BB90A7D", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F7E918-47C3-4772-A048-6E8EA363D6BD", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3EB55FE-81B4-445D-80B3-FA75F977B741", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35A303BC-4BB5-446A-9D29-0AEFF0E8EF16", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C392C9F-A86C-485C-BF76-CF1E088041AE", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FECF09F-6B7B-461A-9657-6327D68ACA9D", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "912F08B6-ED19-4302-AC99-293373CF217B", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0F89354-0DF7-41DA-AAB0-8E1C7B3CE4A6", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3765BA20-BE1E-49FB-BDFB-4880F5AFC564", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CCE4C50-17A5-4601-B673-45A67F36580A", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A941CDD6-443D-4E9A-8D6F-EF2FAF09804D", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCF3664E-44B5-4FF6-AD64-97F1CF387E88", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5B8D399-2ACC-4D39-B3D0-AF8CF9F1318E", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAD836DD-4A8B-43CC-8B2B-31ECD7297714", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9C88FCC-891E-40A2-B038-3D913EDB9ED0", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9AC77DD-429D-481A-A113-95D26F8CC537", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39854CE5-EDBC-4B85-8CEC-5403BD7CD87F", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51E7C98D-017B-4692-B3F0-1FAC416F23ED", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03191635-46A1-48F5-BA2A-63A338B6ECC2", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B8BC8D8-B48F-4378-8146-3B74EDE84238", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCD54CF8-FE6F-4003-B9AF-D246928D4F22", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A826E63-E26F-4932-9BD3-03CC801BD9E0", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3AB732A-0FAD-46FB-994C-38A951F6F186", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F1B97E1-0559-44E0-B2D9-A03354700E9A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83DD388C-713A-4790-8C28-F33DA972B559", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B3B6C95-72E5-4364-930B-75DE7011C9D1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62A5CA50-BFAB-4470-98CB-1478DD281960", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C647A92B-882A-432A-9CC3-7BFDCFF20F07", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71E8010-E3AE-4847-B20D-D4A94FE2E982", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A0BC87-4F31-487E-8142-8B55F67D2261", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "095CA571-847E-47F2-AD91-DFD2B1DE99FF", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F7E9590-2921-4539-A88A-9031256141B8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76ED00CB-FAEC-401F-BCE6-7505FC79052D", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14FE1816-DFCE-442B-9AF1-132F7E909445", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5427628C-6F24-4615-BD65-263EC4001E4A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25CCA953-04A4-4698-9985-FB97DA3EB536", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13E4D0A9-CF7D-41B0-B024-7D6726481280", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A499E19-B92C-4B89-84C5-8C66B42077E9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BEE89-7D49-44C1-B608-940C453AC6A8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5E0C31-BF05-4B92-ACA1-84071764E077", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability." }, { "lang": "es", "value": "Una reinicializaci\u00f3n incorrecta de IOMMU durante el evento DRTM puede permitir que persista una configuraci\u00f3n de plataforma que no es de confianza, lo que permite a un atacante leer o modificar la memoria del hipervisor, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad, integridad y disponibilidad." } ], "id": "CVE-2023-20591", "lastModified": "2024-12-12T20:31:17.747", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.7, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:19.920", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
A compromised or malicious ABL or UApp could
send a SHA256 system call to the bootloader, which may result in exposure of
ASP memory to userspace, potentially leading to information disclosure.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | ryzen_5_2400g_firmware | - | |
amd | ryzen_5_2400g | - | |
amd | ryzen_5_2400ge_firmware | - | |
amd | ryzen_5_2400ge | - | |
amd | ryzen_3_2200g_firmware | - | |
amd | ryzen_3_2200g | - | |
amd | ryzen_3_2200ge_firmware | - | |
amd | ryzen_3_2200ge | - | |
amd | ryzen_3_pro_2100ge_firmware | - | |
amd | ryzen_3_pro_2100ge | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_3900xt_firmware | - | |
amd | ryzen_9_3900xt | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_9_5950x_firmware | - | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5900x_firmware | - | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5900_firmware | - | |
amd | ryzen_9_5900 | - | |
amd | ryzen_7_5800x3d_firmware | - | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5800x_firmware | - | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | - | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5700x_firmware | - | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5600_firmware | - | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5500_firmware | - | |
amd | ryzen_5_5500 | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_3_3250u_firmware | * | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3250c_firmware | * | |
amd | ryzen_3_3250c | - | |
amd | ryzen_3_3200u_firmware | * | |
amd | ryzen_3_3200u | - | |
amd | amd_3015ce_firmware | * | |
amd | amd_3015ce | - | |
amd | amd_3015e_firmware | * | |
amd | amd_3015e | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3700c_firmware | - | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3500c_firmware | - | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3450u_firmware | - | |
amd | ryzen_5_3450u | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33C33F27-AEBC-4DD4-8262-FE025253AE97", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E39BD43-7D5D-4210-9C7F-864F683145DA", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6288EE79-3403-44A8-9235-69BA199A6030", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "051172C8-F9BA-411F-A493-7A7733C112C8", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AEA61A0-B5F7-4686-8512-EC0384D3834B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70A5C00A-1E67-42D8-8308-2B3BB4C890F1", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8EE809F-B0F8-45BF-B09B-300B2BF19D80", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ED4A553-FAD0-4586-9028-BC31DE44ABE6", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "705F826C-F5DA-4803-9104-45B1F3E3CC86", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E0076C0-C3E2-4E85-9D48-CAA83AFA7E0B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E14DB62-5BDB-4C06-B55E-E579BCEF1449", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C924FDA-8806-4CB7-97D4-E014E56E5463", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C48B708-BEB1-41AC-8B2E-9DA04C214CBB", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "518A109A-1776-40F0-A8DF-B7C971EFB633", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FF41C57-7BEF-4A89-8A75-6F8247885792", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3021490-D6A4-423F-B87A-9995CD6BDEA5", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F89D442C-0E87-4C0E-A2ED-194C5C42D4A5", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B11AEA3-9ED8-4E0F-A7CF-856B06A82187", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A11965EE-3867-4846-B714-79F1D2681AAA", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4E099CD-49DA-44B6-8DA7-C39502321D2B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDC3E24-8F3C-4A6C-849B-52C8240EAE27", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BE9015F-CE32-41E7-88CD-2057AACA3D98", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C88C305-88AA-4B54-ADA2-A13202157163", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2869B6A9-98A2-4742-AA0C-615F612BEB98", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289EC897-401C-4C91-8C1F-7CB5E034FE4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "310788CD-F880-42FC-A781-4C69B4C1A408", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BD7B00D-ECD9-419E-B927-7AD293360BB3", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1053118D-84FB-4126-8558-F731AF578D51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2567B7A7-23AF-4A5E-B5B4-50A15EBF58FA", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10630C1F-3EAE-47EE-AD1C-6C35052B1C51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "214D44A0-2B4F-4C3B-BC77-3388F60BEE21", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91DC33A9-7EE5-443F-A195-5739E25880D8", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E196A8EC-8E17-4394-BBB9-AAC4B773686A", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA6066FB-CE27-447A-B9E3-ECFBB59DF4CC", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D9898-5A45-4F76-89F9-A0E0F9B68195", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6554840-DD72-4CB7-B72B-40F0EB4AAB5D", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EB8E56A-20CD-4722-91F8-A4BC9E629F84", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17C9FDD3-74A4-4848-B6CE-7861658C3A30", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B748EBB3-37A9-4F2A-A4A4-AAEEF56BABC0", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "264D28A9-A104-4333-9094-8251FBF00880", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02967552-68C0-4111-B05D-BC17EFEF37DD", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_2100ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "09A40AA0-98B5-4D18-9864-96F206151608", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_2100ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFFACE1-D51F-4720-AABB-583804B571D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "777D94BA-613B-49E9-B1B3-2A9E0FC35908", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27FEB479-99B7-4C8F-90D4-ED09E28C9A38", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E70F-034A-494A-A6CF-8DC42BF4ED72", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9EB15FF-5FDB-487D-866D-C13DC2F6D852", "versionEndExcluding": "picassopi-fp5_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5D7C860-B481-4F57-B7DA-E829684986DC", "versionEndExcluding": "pollockpi-ft5_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6434CDE-4118-41AA-9FEE-A7C87EF103DA", "versionEndExcluding": "pollockpi-ft5_1.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A compromised or malicious ABL or UApp could\nsend a SHA256 system call to the bootloader, which may result in exposure of\nASP memory to userspace, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-26371", "lastModified": "2024-11-21T05:56:14.083", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:10.820", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 07:41
Severity ?
Summary
Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91C9AE4E-0C28-474A-850D-7115C3F56AC6", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6F948E-7F04-4BEB-B48D-33B9ED59EC0C", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F152D9FD-7B70-46D2-8825-5FF4CB0F2627", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0910A249-8141-48FA-98B9-F1F5BDEA67C8", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFEC038D-2551-4051-9EDC-3E01E1F98AEF", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2488831-BD92-472F-A0B6-FB8937CB20D7", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ED70EE9-4386-4C54-BB01-8E0CA096A1C6", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A454B5-01B1-4E7D-B7F9-3FED3EFEBBC6", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9BCA278-AE9F-4115-B7CA-A4B7F127CC47", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAE1661F-E8EE-4AE4-BDAD-E345D7404320", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B60B6FB-713B-4F08-BAC6-3DF429AD77A5", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F2F7D10-DCF5-4039-81B5-877C88E77DF3", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFD42CCE-961E-4687-89AD-12AA55632C90", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F22DD0A-67B2-4AA9-B063-3C4D08B343EB", "versionEndExcluding": "naplespi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.\n" }, { "lang": "es", "value": "Una validaci\u00f3n inadecuada de la entrada del sistema en el cargador de arranque ASP puede permitir que un atacante privilegiado lea la memoria fuera de los l\u00edmites, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20527", "lastModified": "2024-11-21T07:41:05.310", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:13.797", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2024-11-21 07:41
Severity ?
Summary
Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada insuficiente en la SMU puede permitir que un atacante bloquee recursos incorrectamente, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20532", "lastModified": "2024-11-21T07:41:06.020", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-11T08:15:14.147", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
Summary
Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7232p_firmware | - | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | - | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | - | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | - | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | - | |
amd | epyc_7h12 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB947EC3-B3CF-4E35-86C1-DDD831D4518D", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3A4256B-4211-4A15-B33C-743A4898CB76", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB9F211-8998-44FF-91FE-723BA6315B85", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1063F18B-600E-46FB-B6DA-95C8D4C32ACD", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DCADA15-DE56-4993-977D-5BE701476D46", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5D9E427-F642-4EA3-9213-616D4FC5BFCE", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DC71137-5861-4413-AE37-FBA5EA15CD84", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF7D4F3A-CE7A-4C84-B872-E1206912AD62", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFEA67F1-83B8-461D-8066-91BBD3FD9E24", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B86A8C8F-BEFC-439B-A712-E931CC229708", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6651DED0-FD67-406B-845A-553ABBBCCB02", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "025B7A4B-0CF9-401E-AF18-3581CD04BDB5", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F64D3037-AC84-411D-AF23-2B6E49C26896", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBC1FE8-F91B-407A-B4DC-C3EE38676828", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00B84AD1-3F32-46B5-88D1-50CE43844977", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10654574-BACF-41D7-8B2D-73E2E0CBFBFB", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC29525-306B-4E29-A846-8439487042D6", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C45FD0CE-4B69-4C95-9EA1-575736A55045", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC6AF23-8DE0-4402-B707-F9DC3E83B906", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6EEB19-3507-439B-912F-C19D3E8D9A96", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C2B77A7-357B-4F13-83B9-BB45EB2C1F4A", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEDA7A65-34F0-454C-9040-A7024DB82D6C", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32A17247-5FFB-4293-805F-37A2FDE25141", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A71852A5-4EBF-4127-B36D-53B113F3CFA3", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "El comportamiento inadecuado o inesperado de la instrucci\u00f3n INVD en algunas CPU AMD puede permitir que un atacante con un hipervisor malicioso afecte el comportamiento de reescritura de la l\u00ednea de cach\u00e9 de la CPU, lo que provocar\u00e1 una posible p\u00e9rdida de la integridad de la memoria de la m\u00e1quina virtual invitada (VM)." } ], "id": "CVE-2023-20592", "lastModified": "2024-11-21T07:41:11.020", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:16.030", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used." }, { "lang": "es", "value": "Cuando AMD Platform Security Processor (PSP) carga la rom de arranque, autentica y posteriormente descifra un FW cifrado, debido a una insuficiente verificaci\u00f3n de la integridad de la imagen descifrada, es posible ejecutar c\u00f3digo arbitrario en la PSP cuando son usadas im\u00e1genes de firmware cifradas" } ], "id": "CVE-2021-26315", "lastModified": "2024-11-21T05:56:04.683", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.703", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:00
Severity ?
Summary
Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations." }, { "lang": "es", "value": "Una condici\u00f3n de carrera en el firmware de ASP podr\u00eda permitir que un c\u00f3digo x86 con menos privilegios realizara operaciones ASP SMM (System Management Mode)" } ], "id": "CVE-2020-12951", "lastModified": "2024-11-21T05:00:34.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.423", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0094538-161A-4877-9247-EA6DD83C9E54", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5841138E-BDAC-4F59-9BC8-9313A49DBECB", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAD73E1A-C4E6-4ECA-907C-99F84DBC7765", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FB232-0930-4F05-A4EC-D06DBED8E54A", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21B5752-F187-4BA9-94E8-C6525C7824A2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5EA931-ED74-4086-B9A9-9F1A9A359590", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E603AC01-F362-4B2E-9A08-DF2C24A49DDD", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F384C3-11D5-42EB-BF44-A6707358E063", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0A9A96-25CF-47AC-9AF3-96725B3863E4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E3EC-4358-4A82-807B-BBA7F03D5884", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FA8E2F-2E73-47AD-B671-A952B9A4BFD6", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62B278C-BF08-4CC2-A843-1888AEF37638", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88713545-D2E4-47CC-8F5F-EAEE0CF53BF2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E4971-594B-4D1E-AFD5-D6B8A8B8F8A8", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "576BF517-1021-48AA-A065-305A50F9645D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B6DBC4-F298-45E1-90FF-A87AEA06810E", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08067DB-AD49-4B3D-BCBB-A4C9A7D9E7F4", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B1F0A4-655A-44B9-87C0-B8A8F95B2BE0", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFDB2131-CDC3-463D-958F-0BF8D0FF5EA2", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED75D47-160E-4E80-ADC6-4F84748231D5", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45F46F-A3C0-4FA4-BCB6-DD1A8DC0E190", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58BC1BF-AE51-4C78-8376-FF72F20A001D", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F3348B-8B30-4AB8-877B-F4B309EFEA1C", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1577AC6-A05C-489D-8E2A-5F2F46E60F94", "versionEndExcluding": "romepi-sp3_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20F6AA60-E573-4034-BDCF-5C558DFB4BF5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F1D942-1D5B-4C27-AE38-DF68F37A08E5", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95329A7D-ED5A-40AE-AF5E-B053236DBF77", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DB1651-2E51-434E-810F-83428B648E7A", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "954923A7-7AAD-474E-919A-B17F11B01DA0", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B25C6225-69FF-4772-84F7-F560AAE3617E", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "717EA494-B9B9-4092-811C-C51C6ECB4322", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F117E00-F3D5-4884-8A17-59D23837EC65", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C499DD69-BE4B-4E43-B19C-C17E79947C51", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "789DECC1-7334-4252-8801-EE1269687F87", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA967C73-8108-4F41-BFFD-81946C02EB24", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F110B6-28BA-4A4C-8CF7-CB5BFD46D74F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB3E11E-F0DB-4A4E-BEED-7C24EEBF6271", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1C80207-0203-44EB-B8E4-DBDD53786CEB", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84545E6A-E759-479C-93B7-65B172789853", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D96D652C-BAC8-4975-BA8C-D4C0F707668F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E3DEC2-7F6B-4520-8A02-C12948E1C65F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2786E500-3840-428E-8B2B-A7FBB636F41F", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E726E-ABB6-4A99-9834-CF16BA125598", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35815993-4C33-4039-8CB4-C60A955980AE", "versionEndExcluding": "milanpi-sp3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service." }, { "lang": "es", "value": "Una comprobaci\u00f3n de l\u00edmites insuficiente en un registro del buz\u00f3n de la SMU podr\u00eda permitir a un atacante leer potencialmente fuera del rango de direcciones de la SRAM, lo que podr\u00eda resultar en un manejo de excepciones conllevando a una potencial denegaci\u00f3n de servicio" } ], "id": "CVE-2021-26364", "lastModified": "2024-11-21T05:56:12.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.510", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }