Vulnerabilites related to amd - epyc_9554p_firmware
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:31
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Summary
Improper re-initialization of IOMMU during the DRTM event
may permit an untrusted platform configuration to persist, allowing an attacker
to read or modify hypervisor memory, potentially resulting in loss of
confidentiality, integrity, and availability.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3CAE0DC7-E2B7-41BF-ACE6-0C6A0D256269", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "434D661B-CC93-45AF-81DD-56D1224742DC", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB2E339F-8B74-4FC2-BF6C-40DBB4E67AA8", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A01E67D-A30F-46FA-B7ED-8ABF713694FA", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4276F58E-86C9-422D-A318-D3C809B53963", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23BD0E26-B0B8-4613-8DD8-988AA6F33C36", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33A763A2-B6FD-4544-B051-60A43C716BEE", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A5F753-93BE-4568-8487-39F65F90A8E3", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BC954B29-33C0-4167-8B24-62F78C6B1AE5", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1530CEE-B546-4FE5-93A2-2AEFDCD0F1F3", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F03231CC-4F68-4602-9F1F-C0BA96C74AA8", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD7D2FFF-E1B8-4B46-996B-94365ECA78A9", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1CEDE31C-0AD0-4103-A4B1-10F898F61017", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42E14FC6-B6BB-42A5-8805-AF6065557EEE", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "89E1C09E-A174-4279-BA21-15571BB90A7D", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79F7E918-47C3-4772-A048-6E8EA363D6BD", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E3EB55FE-81B4-445D-80B3-FA75F977B741", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35A303BC-4BB5-446A-9D29-0AEFF0E8EF16", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C392C9F-A86C-485C-BF76-CF1E088041AE", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FECF09F-6B7B-461A-9657-6327D68ACA9D", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "912F08B6-ED19-4302-AC99-293373CF217B", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F0F89354-0DF7-41DA-AAB0-8E1C7B3CE4A6", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3765BA20-BE1E-49FB-BDFB-4880F5AFC564", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CCE4C50-17A5-4601-B673-45A67F36580A", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A941CDD6-443D-4E9A-8D6F-EF2FAF09804D", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCF3664E-44B5-4FF6-AD64-97F1CF387E88", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F5B8D399-2ACC-4D39-B3D0-AF8CF9F1318E", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BAD836DD-4A8B-43CC-8B2B-31ECD7297714", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9C88FCC-891E-40A2-B038-3D913EDB9ED0", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E9AC77DD-429D-481A-A113-95D26F8CC537", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39854CE5-EDBC-4B85-8CEC-5403BD7CD87F", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51E7C98D-017B-4692-B3F0-1FAC416F23ED", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03191635-46A1-48F5-BA2A-63A338B6ECC2", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B8BC8D8-B48F-4378-8146-3B74EDE84238", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CCD54CF8-FE6F-4003-B9AF-D246928D4F22", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A826E63-E26F-4932-9BD3-03CC801BD9E0", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3AB732A-0FAD-46FB-994C-38A951F6F186", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F1B97E1-0559-44E0-B2D9-A03354700E9A", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83DD388C-713A-4790-8C28-F33DA972B559", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B3B6C95-72E5-4364-930B-75DE7011C9D1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "62A5CA50-BFAB-4470-98CB-1478DD281960", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C647A92B-882A-432A-9CC3-7BFDCFF20F07", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D71E8010-E3AE-4847-B20D-D4A94FE2E982", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0A0BC87-4F31-487E-8142-8B55F67D2261", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "095CA571-847E-47F2-AD91-DFD2B1DE99FF", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0F7E9590-2921-4539-A88A-9031256141B8", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76ED00CB-FAEC-401F-BCE6-7505FC79052D", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "14FE1816-DFCE-442B-9AF1-132F7E909445", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5427628C-6F24-4615-BD65-263EC4001E4A", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "25CCA953-04A4-4698-9985-FB97DA3EB536", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13E4D0A9-CF7D-41B0-B024-7D6726481280", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A499E19-B92C-4B89-84C5-8C66B42077E9", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3BEE89-7D49-44C1-B608-940C453AC6A8", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C5E0C31-BF05-4B92-ACA1-84071764E077", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability.", }, { lang: "es", value: "Una reinicialización incorrecta de IOMMU durante el evento DRTM puede permitir que persista una configuración de plataforma que no es de confianza, lo que permite a un atacante leer o modificar la memoria del hipervisor, lo que podría provocar una pérdida de confidencialidad, integridad y disponibilidad.", }, ], id: "CVE-2023-20591", lastModified: "2024-12-12T20:31:17.747", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.7, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-13T17:15:19.920", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-665", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:29
Severity ?
5.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
Summary
IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C98F5728-3653-4F17-804A-B658C1195033", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D4046AE4-F5D5-4B82-9E58-5970575E9908", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "030095CD-24D9-4033-A0C5-74C55083726D", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF4299D7-608D-4628-A8FE-DC0DBC09670F", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7138757-214C-44E2-9873-9F00EAAFFBA7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8E7978A2-777E-45D1-8036-7A4A72750AD8", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A25A14B0-641D-4EAE-93C8-2ED73698BA70", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08631494-65FE-4052-A572-AAA959DDC4A7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52910ADE-A9DE-477A-95DE-F8842BDF8BCC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B4E7D4A0-5D38-4505-A272-03AAFA3C3904", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51A9A1EA-F6E1-496D-B406-24602D845392", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CFA9B863-5296-44E8-90FE-F07115B32D4A", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4CAD221F-4A56-439B-A25C-E280792ACA60", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCDF1C52-B820-4F82-9E24-F460180D06F7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38B20E51-60E2-4309-A6F2-3F3F1F22B325", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D3F61F4E-9324-4CC9-B030-33A4B1F1982C", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "865C7A18-D151-4DEA-9279-6EE21CA02EBC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2552E1CD-3D25-4A86-B435-8A2A4223AE35", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1A672DC-A7F4-4115-907C-89570F552582", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45F37CB5-08DB-4E7A-80B8-789FB445E8F7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13F55ED1-AA9B-476E-AE54-630E8B28911A", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDD8CF52-1EF0-4718-8FE3-C83103BB2459", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "608CCBAB-A934-4989-82BE-25042F0E5A57", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CAEA2412-28EC-4589-9B3F-78F451EF2048", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7493D0B-1DB4-436E-A297-8F931C2EFBCC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BDCABE02-1723-4859-B863-805A7C37014B", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CECE4403-4C94-4CF0-983C-76720122738E", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3AB732A-0FAD-46FB-994C-38A951F6F186", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F1B97E1-0559-44E0-B2D9-A03354700E9A", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83DD388C-713A-4790-8C28-F33DA972B559", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B3B6C95-72E5-4364-930B-75DE7011C9D1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "62A5CA50-BFAB-4470-98CB-1478DD281960", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C647A92B-882A-432A-9CC3-7BFDCFF20F07", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D71E8010-E3AE-4847-B20D-D4A94FE2E982", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0A0BC87-4F31-487E-8142-8B55F67D2261", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "095CA571-847E-47F2-AD91-DFD2B1DE99FF", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0F7E9590-2921-4539-A88A-9031256141B8", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76ED00CB-FAEC-401F-BCE6-7505FC79052D", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "14FE1816-DFCE-442B-9AF1-132F7E909445", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5427628C-6F24-4615-BD65-263EC4001E4A", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "25CCA953-04A4-4698-9985-FB97DA3EB536", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13E4D0A9-CF7D-41B0-B024-7D6726481280", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A499E19-B92C-4B89-84C5-8C66B42077E9", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3BEE89-7D49-44C1-B608-940C453AC6A8", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C5E0C31-BF05-4B92-ACA1-84071764E077", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised Hypervisor to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity.", }, { lang: "es", value: "IOMMU maneja incorrectamente ciertos rangos de direcciones especiales con entradas de tabla de dispositivos (DTE) no válidas, lo que puede permitir que un atacante con privilegios y un hipervisor comprometido induzca fallas de DTE para eludir las comprobaciones de RMP en SEV-SNP, lo que podría provocar una pérdida de integridad del huésped.", }, ], id: "CVE-2023-20584", lastModified: "2024-12-12T20:29:14.730", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 4, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-13T17:15:19.713", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:34
Severity ?
2.5 (Low) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "108F1054-C8C4-4540-9B8F-7510A8C00DE3", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2AFDDF77-6A68-41A9-855A-D3B436450D93", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BC0BDD69-8BC1-46D7-9655-CF913F0DA6F9", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A36DB7E2-8A18-4320-8E1B-77CD4D115608", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "473699C8-A35C-4F67-85A5-AB70C3C3995D", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FA2FB4A9-C883-4341-880F-EDE30F5275B3", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0E5D8A84-122E-4A10-9FC3-F208B19BF5F8", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "537004D8-84C7-4369-A26B-D3DB83B30F5E", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27CFA9DB-772C-4375-9F7A-4B77E89325A6", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "111CF9AA-F533-48CB-9A8B-36B54A31338F", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9D89ED2E-81EE-4B7A-B669-24A3C558C8F0", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C68FBBCF-0B6C-4BE3-A558-0A0CD8CA5816", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7219B700-3CA5-4A01-994A-D398E45761C8", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D27B7AE-9F65-435A-8ADA-EFDE74AB1C32", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22F6220C-EEFD-4A88-95DC-86652BF4E868", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "73C1A76F-0CF7-4F75-8142-13CB61AEDC91", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05E04E6A-AB17-4EA8-A6DB-D99E31A0E478", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F9F21CD9-AD47-4158-B06A-7BF5BEFBEE7D", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "26E15633-2713-425B-B56B-0E7F406C9291", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28F264D8-503B-45EA-B302-72B60946FAF8", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB7B338B-9718-4773-A9CD-B325E157D3C2", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "17C71132-E668-4D85-806C-FC7D230E9AA7", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8D0CCB18-115B-497D-8788-8DDDD2ADEF40", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E97DA39-D9D9-42E7-9533-4411BF9CBA5F", versionEndExcluding: "genoapi_1.0.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D5535C20-7053-4830-A0F2-6B8179A3FE2C", versionEndExcluding: "chagallwspi-swrx8_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCDA0456-EB37-4F13-82C8-4531BD4375B2", versionEndExcluding: "chagallwspi-swrx8_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C1F318AA-C432-4328-A433-F7A293C31435", versionEndExcluding: "chagallwspi-swrx8_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "55FF86B7-DE2B-4509-9C2F-A18806CDA346", versionEndExcluding: "chagallwspi-swrx8_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.", }, { lang: "es", value: "La limpieza inadecuada de datos confidenciales en el ASP Bootloader puede exponer claves secretas a un atacante privilegiado que acceda a ASP SRAM, lo que podría provocar una pérdida de confidencialidad.", }, ], id: "CVE-2021-46766", lastModified: "2024-11-21T06:34:40.617", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 2.5, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 1.4, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:10.360", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-459", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 05:56
Severity ?
1.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "10DE39E7-BCB0-4F09-BB25-24175500D7A4", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", matchCriteriaId: "89FAAD8C-6DD1-408D-849B-0CE707321B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7A23447-6743-4C3C-8F21-4B2C13BB3A03", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", matchCriteriaId: "07B3C659-C31A-4F82-9587-9F8A943F637D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "25790CE9-54DC-4DDE-BB67-3BAA0B8DD9A8", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", matchCriteriaId: "87543FB4-658A-4300-9DC9-836AC1D4BCFB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2AC182FF-E9B3-4CA0-882D-D314CA659DB8", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", matchCriteriaId: "E25652AB-E243-4C40-BE12-AB53AF52CD61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79F548D1-8F12-47B8-BD01-96558C87D6E7", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", matchCriteriaId: "88F4A126-B4A6-480A-9DD7-7F68714DFB49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F10020FB-E050-44B7-BEA8-DDE8838CBE5F", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", matchCriteriaId: "72C86198-0BD4-42E1-974B-70A49F82C411", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D03802CA-8832-4A82-93E7-36ED73C724A6", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", matchCriteriaId: "8AC99346-DBF1-4060-8E6B-35D315944ADA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D0AF119-379D-4B7D-9D9C-ECA882402723", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", matchCriteriaId: "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B7F1C85-BEA5-4B60-A085-C9A8AD61B0E1", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E8DC6B7-B129-472D-8DC2-C0233B677DFD", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", matchCriteriaId: "7A6C7497-1B63-490F-B8EA-D9F3CB790952", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6ECCE34B-5BD7-44C4-B9C4-3E42977B2976", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", matchCriteriaId: "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4FBC28E-C7D7-486E-B7DB-79859292B25B", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDABE45-F529-453C-92DC-BF7747CEEC0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B90E852B-A939-4C58-B25E-866E707004D3", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", matchCriteriaId: "563708A3-7C51-4693-B02D-9A25A639FE42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2BD0878E-EEDA-4E0F-8186-A571D7651C6D", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", matchCriteriaId: "49BBC687-5C3C-4843-A028-B8BE29D1E302", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00089249-EC6A-4A5C-95E6-61654EF8B63B", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", matchCriteriaId: "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E79244B-D0E9-41C7-A7AF-5C02105B4391", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", matchCriteriaId: "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38B95A87-CFA3-4F61-A9A6-D59A4FFCBAD5", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", matchCriteriaId: "430C9955-0090-4166-8E90-D81C2AA7DE0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4A99739A-179C-4E6B-AA6B-D0BE4A62C20D", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", matchCriteriaId: "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE9FB7B5-1106-4762-A346-CEA40263F232", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07B17487-075F-47AE-8B1E-31621E8CE89F", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", matchCriteriaId: "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C32CD5CE-6216-4BB1-8C5A-773F19D40F41", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", matchCriteriaId: "26FC5683-F612-4586-8BA3-FB1F66D8868B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "035F2E73-01BF-460A-B781-82AEACCA1ABD", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", matchCriteriaId: "8F187412-26C2-4D8C-9199-D7CCF49D6520", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A2B6750-0689-4547-B97F-0B876CFC7B03", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", matchCriteriaId: "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB602241-CC7E-415C-900C-C5BEC39768CA", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", matchCriteriaId: "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "66D844AE-628B-433D-9D22-1D501992A231", versionEndExcluding: "romepi_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", matchCriteriaId: "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB0AE5AB-0490-453A-9D27-81DE5F08CE1C", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F21B87C3-72D1-4CEC-8D63-58E38C741AA1", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0218786D-D198-44BE-9CA2-FCD1B622BD9E", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EEAE9F6D-54F8-46B6-BB04-6EA9E46CE742", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91DAAC8F-AF6C-4146-BCFE-1DCE96D49644", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A9166CC-1C29-430F-B766-7408B3F47855", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2FEC040-4236-4E6D-85D5-BB52E5A81B5B", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33CAD962-9D64-430A-A1DC-15B05B4670F0", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DBE8BBCE-3D9F-4F8E-AEB8-1FCBA3FF0D87", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E88129DB-E22D-4AB3-8A0C-4F067711C767", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4FCBCFE9-D650-4149-871D-4F4597198C6C", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA9F63C2-A774-4B4C-BDD4-1F374AABCC81", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C0E4DD8-E76E-4938-9680-64C70A2FE378", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C61B330-4DD0-47E7-ACEC-0871EB497DF4", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B12BD5A2-3A94-4016-BDE1-F268AB8A142A", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AC49F14-804A-480A-BA66-373C00606F98", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F523DAE-2F55-4822-92A1-218AA886313B", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "204719EA-FF4B-4674-B270-1790035594A5", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB47A44F-26AF-42DC-B388-C2A84B95C8FE", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4680D11-F4E7-4F76-93AB-EF6183D024A2", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C9015CD-8EDF-4D8E-A582-D04DD2425887", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7FAFC36-0BCA-43CE-B22B-65C98C748315", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F6E8DC7-2E57-490D-B32D-E1F33BB36839", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "285125AF-8AA5-437E-AF78-F2625D9136A2", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E8D2D9C-20CD-48C4-AA06-365D78250058", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C1D9D9-875C-4841-9B32-48344DEA077D", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA3D1AF4-E79F-4B8B-ACD1-286A1CF354E1", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30013429-BC7F-4A52-A7AB-49FE91F6C5CE", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB3B006E-3930-4DD8-9E4E-1B520DB45535", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1006C8E0-57F5-41C2-8D93-57E0C5B334B8", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C62779A-AD1A-4163-B112-598E31D2B53C", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F67D569-24A8-4FD5-A446-FEC0FF1385C7", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B456C747-612C-4BF9-B412-41A383653A8C", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB4B5325-45DF-4C38-B1B0-119B921B2E73", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C1DCBA4-2BF7-4B9D-86C3-ECCDF73EB1E3", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB88585E-B79A-465A-B94A-B5AEA932EDE2", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F1C5AC7-5757-47AB-92C0-F26AA4DEC82C", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9FDBB6C9-ECBB-4499-909E-0032E2A8E4E0", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D17E0ABE-03A0-4DF3-9225-8C82E616AA4B", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22B828D9-81F0-4E41-9F2D-BEB335819B9A", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "587904B8-34E0-4D1D-A62B-2BE8B4BF76EF", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8895C80-61C1-4568-B16A-1CAC1C86CCA5", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6CA979BF-A827-48D0-9B6D-16870457E43B", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1DADBE68-A5A9-4A6F-81E9-48A124E521DA", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A93FE19A-582C-4094-862F-5092B1C0104F", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "73627617-3435-4277-BEC9-3C4146D212A6", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79EE59E9-84AC-441B-9437-CD764664B2B0", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E6F01A4-71D3-4F6F-91B7-965F4C760595", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB9564E5-0C30-4C4C-A8CE-740D39F00B0F", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "950FEFA7-3D82-493E-BB56-D9438CB78545", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "81C91375-9065-4259-A268-5CDB9F4FEDAD", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3DC85C0D-3B22-4DF8-91C1-E70366B6E9EB", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:.", matchCriteriaId: "1CCE3A33-1B05-40AF-B853-A58B035E675C", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "607853F9-9355-47CE-8B8B-532293661F32", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "634BFB98-7DF6-4CAA-B525-DDDF74A8487E", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DEFE393-61D0-4148-9947-9AA0FB14464E", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C993F09-67DA-450C-AEF3-A9A3705C472D", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EBA87365-25E7-4622-998F-F7C6E031FA8A", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32A70EA8-2473-42A4-A606-028F856A645A", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F6AC9673-7A2F-4F33-A4CC-CF0D5D48A61A", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "925C930E-0875-4401-AD79-CFC4C81D6600", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D44266D5-181A-420C-BEC5-3D9FC30BD8B8", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0C76B7B-B530-4465-BA5A-370339877BAE", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9FDB378F-D980-4CFD-8DE8-00C979E33848", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BA512C1-8FBC-4488-9A93-DA3A8C2E8C59", versionEndExcluding: "genoapi_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.", }, { lang: "es", value: "No validar el valor en APCB puede permitir que un atacante privilegiado altere el token APCB para forzar una lectura de memoria fuera de los límites, lo que podría provocar una denegación de servicio.", }, ], id: "CVE-2021-26345", lastModified: "2024-11-21T05:56:09.803", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 1.9, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 1.4, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:10.190", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:49
Severity ?
1.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB9C77FA-9807-4233-BE30-9275ADEF6930", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4960A6A2-CEAB-4970-A1B8-9ABA220ACBE6", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4ADE7FD0-2BE7-4928-A556-5831C7CEA16D", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E95DA74-848F-4036-9A79-35D29ECE3D09", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93A27BB9-F55D-43A4-A439-5D5773057B3B", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A46BF53F-F940-44A1-9E0B-068677C4AC90", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ECB7FCFC-A27A-4656-967A-517F591BB3C8", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90030672-613B-4252-922D-7F26D2FCA877", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8EFBA5F7-E9BE-4EDB-BD4E-D4316B0D945A", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F21FC32C-DDA2-4804-9EDA-C9BEB18C9AC6", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DAF542F-040B-4681-BCEA-E4F1F99ABD00", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C3710FCB-CAF1-4BFE-A984-0C46BA27F9BF", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8EC0604A-D5DA-4966-AF48-EBAB46F1BD61", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E087AEC-06E1-4A95-A644-7587331DEE55", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8ED6C058-3CE9-4E68-8FBF-19942D6678F6", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53BDC783-1492-4A3A-B75E-DA98B366D43D", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8937722-6B70-42F4-913F-55881066C571", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3857E72-56F0-426D-A9AD-60B5711CE5DB", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67C3F794-B9D2-4BDA-ABB4-397C8B074B30", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BDC6D4D7-F7DE-4B35-AE48-C20A86CB56B2", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB1C6B4C-0A4A-4F47-B22A-9B070C3834E7", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6521FCD8-ACD3-4EFC-881D-C82AFBB57100", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93096670-AB65-461B-AD8C-725B525AB2D0", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1A7CE606-63D1-488C-BCCE-37098C57BBB9", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE8D62F4-A1FE-4865-ACE3-22E621873085", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A95DADE-44C0-4A3B-8ED9-9F32CEFE28C4", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04468F0E-494D-43F5-898A-FBBF60CBDEF5", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "92561B70-9884-461C-B493-437BC64DE56A", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "229D581F-A875-4E50-9C70-4978F4213110", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A239F9E-D957-43B9-BE84-925E034C7D1B", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86181C40-CBE2-4AAC-A853-F36372372D41", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAF54712-9455-453E-82C6-A64209D2F1D8", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B7340146-AF63-444A-915D-DC78E509C8D8", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BF77B4F-61B5-4F13-9724-A085329D6827", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E35B55E0-0EBD-4232-B24D-D8D9B10540A5", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C00B3DBF-DF5C-4B22-B945-9B2A0E04946C", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB3B006E-3930-4DD8-9E4E-1B520DB45535", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30013429-BC7F-4A52-A7AB-49FE91F6C5CE", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA3D1AF4-E79F-4B8B-ACD1-286A1CF354E1", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C1D9D9-875C-4841-9B32-48344DEA077D", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E8D2D9C-20CD-48C4-AA06-365D78250058", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "285125AF-8AA5-437E-AF78-F2625D9136A2", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F6E8DC7-2E57-490D-B32D-E1F33BB36839", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7FAFC36-0BCA-43CE-B22B-65C98C748315", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C9015CD-8EDF-4D8E-A582-D04DD2425887", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4680D11-F4E7-4F76-93AB-EF6183D024A2", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB47A44F-26AF-42DC-B388-C2A84B95C8FE", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "204719EA-FF4B-4674-B270-1790035594A5", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F523DAE-2F55-4822-92A1-218AA886313B", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AC49F14-804A-480A-BA66-373C00606F98", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B12BD5A2-3A94-4016-BDE1-F268AB8A142A", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C61B330-4DD0-47E7-ACEC-0871EB497DF4", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C0E4DD8-E76E-4938-9680-64C70A2FE378", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA9F63C2-A774-4B4C-BDD4-1F374AABCC81", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4FCBCFE9-D650-4149-871D-4F4597198C6C", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E88129DB-E22D-4AB3-8A0C-4F067711C767", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DBE8BBCE-3D9F-4F8E-AEB8-1FCBA3FF0D87", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33CAD962-9D64-430A-A1DC-15B05B4670F0", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2FEC040-4236-4E6D-85D5-BB52E5A81B5B", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A9166CC-1C29-430F-B766-7408B3F47855", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91DAAC8F-AF6C-4146-BCFE-1DCE96D49644", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EEAE9F6D-54F8-46B6-BB04-6EA9E46CE742", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0218786D-D198-44BE-9CA2-FCD1B622BD9E", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F21B87C3-72D1-4CEC-8D63-58E38C741AA1", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB0AE5AB-0490-453A-9D27-81DE5F08CE1C", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.", }, { lang: "es", value: "Es posible que la configuración de SMM no sea inmutable, como se esperaba, cuando SNP está habilitado, lo que genera una posible pérdida limitada de la integridad de la memoria del huésped.", }, ], id: "CVE-2022-23830", lastModified: "2024-11-21T06:49:20.293", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 1.9, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 1.4, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:10.570", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-02-13 20:15
Modified
2024-11-21 08:01
Severity ?
Summary
Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DC71137-5861-4413-AE37-FBA5EA15CD84", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB947EC3-B3CF-4E35-86C1-DDD831D4518D", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FB9F211-8998-44FF-91FE-723BA6315B85", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3A4256B-4211-4A15-B33C-743A4898CB76", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4DCADA15-DE56-4993-977D-5BE701476D46", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1063F18B-600E-46FB-B6DA-95C8D4C32ACD", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FF7D4F3A-CE7A-4C84-B872-E1206912AD62", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5D9E427-F642-4EA3-9213-616D4FC5BFCE", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFEA67F1-83B8-461D-8066-91BBD3FD9E24", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B86A8C8F-BEFC-439B-A712-E931CC229708", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6651DED0-FD67-406B-845A-553ABBBCCB02", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "025B7A4B-0CF9-401E-AF18-3581CD04BDB5", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F64D3037-AC84-411D-AF23-2B6E49C26896", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FBC1FE8-F91B-407A-B4DC-C3EE38676828", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00B84AD1-3F32-46B5-88D1-50CE43844977", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "10654574-BACF-41D7-8B2D-73E2E0CBFBFB", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CCC29525-306B-4E29-A846-8439487042D6", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6EC6AF23-8DE0-4402-B707-F9DC3E83B906", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C45FD0CE-4B69-4C95-9EA1-575736A55045", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C2B77A7-357B-4F13-83B9-BB45EB2C1F4A", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E6EEB19-3507-439B-912F-C19D3E8D9A96", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AEDA7A65-34F0-454C-9040-A7024DB82D6C", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A71852A5-4EBF-4127-B36D-53B113F3CFA3", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32A17247-5FFB-4293-805F-37A2FDE25141", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D4046AE4-F5D5-4B82-9E58-5970575E9908", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C98F5728-3653-4F17-804A-B658C1195033", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "030095CD-24D9-4033-A0C5-74C55083726D", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7138757-214C-44E2-9873-9F00EAAFFBA7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF4299D7-608D-4628-A8FE-DC0DBC09670F", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A25A14B0-641D-4EAE-93C8-2ED73698BA70", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8E7978A2-777E-45D1-8036-7A4A72750AD8", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08631494-65FE-4052-A572-AAA959DDC4A7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B4E7D4A0-5D38-4505-A272-03AAFA3C3904", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52910ADE-A9DE-477A-95DE-F8842BDF8BCC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D3F61F4E-9324-4CC9-B030-33A4B1F1982C", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2552E1CD-3D25-4A86-B435-8A2A4223AE35", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1A672DC-A7F4-4115-907C-89570F552582", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45F37CB5-08DB-4E7A-80B8-789FB445E8F7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "865C7A18-D151-4DEA-9279-6EE21CA02EBC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCDF1C52-B820-4F82-9E24-F460180D06F7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDD8CF52-1EF0-4718-8FE3-C83103BB2459", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13F55ED1-AA9B-476E-AE54-630E8B28911A", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "608CCBAB-A934-4989-82BE-25042F0E5A57", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CAEA2412-28EC-4589-9B3F-78F451EF2048", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7493D0B-1DB4-436E-A297-8F931C2EFBCC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BDCABE02-1723-4859-B863-805A7C37014B", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CECE4403-4C94-4CF0-983C-76720122738E", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38B20E51-60E2-4309-A6F2-3F3F1F22B325", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", }, { lang: "es", value: "No inicializar la memoria en el firmware SEV puede permitir que un atacante privilegiado acceda a datos obsoletos de otros invitados.", }, ], id: "CVE-2023-31346", lastModified: "2024-11-21T08:01:46.650", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-02-13T20:15:52.737", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-05 16:15
Modified
2024-11-26 19:13
Severity ?
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B590923-B6F9-48A2-9BA8-833E22DE2E43", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C1BED240-E334-4A8F-9070-D57D54B0ED2A", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "84E4A21E-DC60-4ABB-94AD-BDC785717A96", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C1D50EA-07CA-43E0-90A2-6AFE444A5381", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEAA93E-431A-4476-B431-5983296CCAAD", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED357082-5FDA-4E76-9903-ACE49D241195", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68733A3D-95A9-45A7-B2D4-AD32439DAB08", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "218E19EA-5493-475D-A51E-771BB281D5C2", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "85514025-4FC5-4C5B-B6A6-7AC020E192F6", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5710382-A1D0-4E21-AC47-6F14CBE28329", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E47E9840-6143-4355-BFB0-B402FDF16617", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "739AF0E3-62A6-43D0-8ECD-CF7720624613", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC0E511C-CC66-43BE-A907-027828C75403", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5687A37A-3E72-4972-8F1A-A8266DE6A4A3", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C462E4FF-2285-46E1-927B-C8FFB018BF35", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44C45AEA-6436-4012-9A0D-C591A64444A9", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4FDB30FD-24BF-4597-97B5-7A3732673DD1", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27A4A53B-F26C-44DF-BABB-C17357A7B549", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F405F5CD-1255-4FD9-902C-45EF0D5C657A", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D65F2DB9-51C0-40CA-B5C9-A85CF43A593D", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2432608F-0E9E-49D5-9A22-2A2A6E89489F", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9403D7F-0349-4CC8-B566-5054E4A96D83", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F512316F-131F-4EAD-A7FA-CFE172AD4FA5", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9DF39DE-83FC-4DD2-812A-F2D50AA85ADF", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5DC68072-5AEA-4768-9CDB-57303996CA17", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8F396A75-7B5E-4544-92B9-7D4EFCD375B9", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FED2F309-48ED-4556-B562-3F01D7FB4141", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B79FF23A-6660-4513-A633-535B7543C8C9", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D6FFB29-9DFD-44FE-8AB5-32D8F765164F", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "482B19D4-3695-45A2-9CC7-1C0962414117", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A8ACBF4D-E173-477F-8E7C-33DA3C034AF0", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "486F652A-8DDA-4C01-B2DB-A4F981F56016", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C5C40AD4-5F07-4F57-89DE-A0658464E4A1", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2602C520-8244-4BAA-A483-BC31A5305942", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5088B73-27FC-4AA8-AB57-21EC0E0E7425", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD662D4-8D44-42FE-971C-C501574F6744", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3AD7201-E73D-48FE-87F1-B62715700A70", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BAEB0D25-E423-45EF-9E52-57DA7E594429", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "648F291B-0CE4-4D1D-8A5F-7DF66703C3B8", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E1BBA30-F9D1-4AD9-BAF7-F4D40D356C15", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43DCB063-0676-4615-93FC-64D98ACAAD57", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "492476F9-F8E1-47AB-AAF7-67AADA160678", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A89F3343-7DAC-4662-987E-7629610D3C32", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "714CC372-0E0D-4075-94CD-4723BE694D2D", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CB2C6A30-90B5-4E74-A4CA-C69FCB4E1E99", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B07058C5-3EDC-4615-B447-2438C534B0E0", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E71A9FF8-E8A4-40C4-8DB1-D28AE4136988", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "489653B2-F305-46B6-A4D6-DFE5DCC855C8", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "47A571CB-8C43-4AFB-8115-29FDED7C5EEA", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FF3AE7A-A653-444F-9CAF-DEF8C3F25F36", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD8E48F9-DEF9-43D4-8643-C1CC4D2EB3D1", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E40AC063-BC83-49B5-81E9-56835D0B72D1", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8A154914-D1C7-4549-815D-F1F693EE2B8F", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79F0A749-9F6F-4D92-81A6-48C30F59A0EB", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7A0D8BC-00E2-48EA-8F2D-C23968326032", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67A78FCF-5F78-41C5-B5D4-32815B76288E", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D51EFBB-2509-47C2-BA48-0FE151B993D0", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F9DF0D18-EC29-4E7F-8970-9D0355D0EDD5", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A172EB43-4526-4A3E-881D-0B6CC72EEA34", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "429B298B-C825-43F0-86CF-30385D4C56CD", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C4179752-A4AC-45DA-8A40-89217197D323", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4EFA7374-ED9E-4B25-B600-C34F02AFFCF9", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCF05F1E-CF13-47BF-B7D7-2FD13E2A4E46", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AC9DE15-B2E8-4D9E-BC6D-1007C083D0B7", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADE721FF-4323-4C32-91D6-AC085779E411", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F46B6E3-779A-48D3-9D66-9CC19B1C5060", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "E5FCA13D-409D-4E0B-9CB1-72C6F255C145", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "849D773E-AB8F-4044-B791-C886662D8BBF", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "375FC62D-D5B4-4698-A9E8-0AF00FEBBDE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C34A942-5EA7-4CEA-A7CA-C0ADBCC65046", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4B2FBA-2F9E-44CF-A75A-9BCB30964153", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30A546D8-3E31-4D4C-BAAC-607EAC46A4CC", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "A273285D-0615-479C-BE60-D2A73532B39A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D56DA98D-95C5-49E5-9174-DAE1ACEF706F", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "92BF19E2-C264-48C3-BB38-A23C7DD67BB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8379370-5081-4FB3-890C-2BF2D602095A", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "93995EDA-88C5-41AE-8A56-08728027F2AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DF60A69F-21ED-441C-823C-291026E00715", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "4F04B63D-AF86-466A-B74D-B1C9B2682DCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "552AAF13-377F-4A95-A580-7D906C6CB6A2", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "0A737AAD-AA75-41F7-B6A6-1B17D984CED5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFE3AC64-538A-4E18-85CF-063F984D735E", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "81287880-A2F0-4260-AA49-489DC2475118", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C559424-D75D-440E-8F92-C1AD1B66421B", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "07B6488C-8707-40B8-A867-87DDDE1B5625", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7525E902-27DA-4A53-A018-53AF96AA73DB", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8820F4-879C-4B9A-B10C-756DC6F35317", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68E124D1-686C-416C-B9DD-B6380C355D92", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "FB7E7CEC-B263-4020-90E6-C0B77D8036D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E78BCF22-DC43-4A07-971B-CA6A76B23EEF", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7CE47EE2-06B8-434F-BEC4-D2EB5B79AFB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7F6F068-1F61-4EBB-A465-381D4EA696EF", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "26C81497-519E-46A2-9F64-E80C82920E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04591375-2E1D-4DBC-8C9B-2E4D4435F8ED", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "CFBD9E1E-437B-44E7-B148-88513DA7D50A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57BE0E04-FC43-4437-B35F-F94DC8CC9EA6", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "A68F57A9-15AB-459C-8ACC-0BE565D230FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "36D36B6C-DC77-4E12-AF09-180ACB86551A", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "8F6DCA27-D098-40B7-9778-B284044CA34B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE6BAF58-5538-43A9-A5A9-9C1CD420F6E2", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "9737ACC0-18DB-4061-A259-D32C16BDA238", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0B68719-100F-402A-B409-DDE9811B2359", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "AE1C35D8-0C2A-4A63-9D1B-0983E0FDB7E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4CD6C041-14A7-459B-A3C9-1A6AB55F6006", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "30C72561-B0CE-4E51-AC5F-CD7EFDBCC5EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3BAFE92-C577-4558-AE15-F3E6524701A4", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "F27175DE-83A5-42DB-8F8A-886B1D886277", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.", }, { lang: "es", value: "Una restricción inadecuada de las operaciones de escritura en el firmware SNP podría permitir que un hipervisor malicioso sobrescriba potencialmente la memoria de un invitado o la semilla UMC, lo que provocaría una pérdida de confidencialidad e integridad.", }, ], id: "CVE-2024-21980", lastModified: "2024-11-26T19:13:55.167", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.9, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 5.8, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.9, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 5.8, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-05T16:15:35.377", references: [ { source: "psirt@amd.com", tags: [ "Broken Link", ], url: "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "psirt@amd.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-02-13 20:15
Modified
2024-11-21 08:01
Severity ?
Summary
Due to a code bug in
Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a
guest to observe an incorrect TSC when Secure TSC is enabled potentially
resulting in a loss of guest integrity.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DC71137-5861-4413-AE37-FBA5EA15CD84", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB947EC3-B3CF-4E35-86C1-DDD831D4518D", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FB9F211-8998-44FF-91FE-723BA6315B85", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4DCADA15-DE56-4993-977D-5BE701476D46", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1063F18B-600E-46FB-B6DA-95C8D4C32ACD", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FF7D4F3A-CE7A-4C84-B872-E1206912AD62", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5D9E427-F642-4EA3-9213-616D4FC5BFCE", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFEA67F1-83B8-461D-8066-91BBD3FD9E24", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B86A8C8F-BEFC-439B-A712-E931CC229708", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6651DED0-FD67-406B-845A-553ABBBCCB02", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "025B7A4B-0CF9-401E-AF18-3581CD04BDB5", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F64D3037-AC84-411D-AF23-2B6E49C26896", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FBC1FE8-F91B-407A-B4DC-C3EE38676828", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00B84AD1-3F32-46B5-88D1-50CE43844977", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "10654574-BACF-41D7-8B2D-73E2E0CBFBFB", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CCC29525-306B-4E29-A846-8439487042D6", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6EC6AF23-8DE0-4402-B707-F9DC3E83B906", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C45FD0CE-4B69-4C95-9EA1-575736A55045", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C2B77A7-357B-4F13-83B9-BB45EB2C1F4A", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E6EEB19-3507-439B-912F-C19D3E8D9A96", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AEDA7A65-34F0-454C-9040-A7024DB82D6C", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A71852A5-4EBF-4127-B36D-53B113F3CFA3", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32A17247-5FFB-4293-805F-37A2FDE25141", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D4046AE4-F5D5-4B82-9E58-5970575E9908", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C98F5728-3653-4F17-804A-B658C1195033", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "030095CD-24D9-4033-A0C5-74C55083726D", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7138757-214C-44E2-9873-9F00EAAFFBA7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF4299D7-608D-4628-A8FE-DC0DBC09670F", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A25A14B0-641D-4EAE-93C8-2ED73698BA70", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8E7978A2-777E-45D1-8036-7A4A72750AD8", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08631494-65FE-4052-A572-AAA959DDC4A7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B4E7D4A0-5D38-4505-A272-03AAFA3C3904", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52910ADE-A9DE-477A-95DE-F8842BDF8BCC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D3F61F4E-9324-4CC9-B030-33A4B1F1982C", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2552E1CD-3D25-4A86-B435-8A2A4223AE35", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1A672DC-A7F4-4115-907C-89570F552582", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45F37CB5-08DB-4E7A-80B8-789FB445E8F7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "865C7A18-D151-4DEA-9279-6EE21CA02EBC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCDF1C52-B820-4F82-9E24-F460180D06F7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDD8CF52-1EF0-4718-8FE3-C83103BB2459", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13F55ED1-AA9B-476E-AE54-630E8B28911A", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "608CCBAB-A934-4989-82BE-25042F0E5A57", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CAEA2412-28EC-4589-9B3F-78F451EF2048", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7493D0B-1DB4-436E-A297-8F931C2EFBCC", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BDCABE02-1723-4859-B863-805A7C37014B", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CECE4403-4C94-4CF0-983C-76720122738E", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38B20E51-60E2-4309-A6F2-3F3F1F22B325", versionEndExcluding: "genoapi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \n\n\n\n\n", }, { lang: "es", value: "Debido a un error de código en Secure_TSC, el firmware SEV puede permitir que un atacante con altos privilegios haga que un invitado observe un TSC incorrecto cuando Secure TSC está habilitado, lo que podría provocar una pérdida de integridad del invitado.", }, ], id: "CVE-2023-31347", lastModified: "2024-11-21T08:01:46.837", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-02-13T20:15:52.790", references: [ { source: "psirt@amd.com", tags: [ "Broken Link", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-05 16:15
Modified
2024-11-26 19:13
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Summary
Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B590923-B6F9-48A2-9BA8-833E22DE2E43", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C1BED240-E334-4A8F-9070-D57D54B0ED2A", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "84E4A21E-DC60-4ABB-94AD-BDC785717A96", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C1D50EA-07CA-43E0-90A2-6AFE444A5381", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEAA93E-431A-4476-B431-5983296CCAAD", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED357082-5FDA-4E76-9903-ACE49D241195", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68733A3D-95A9-45A7-B2D4-AD32439DAB08", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "218E19EA-5493-475D-A51E-771BB281D5C2", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "85514025-4FC5-4C5B-B6A6-7AC020E192F6", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5710382-A1D0-4E21-AC47-6F14CBE28329", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E47E9840-6143-4355-BFB0-B402FDF16617", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "739AF0E3-62A6-43D0-8ECD-CF7720624613", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC0E511C-CC66-43BE-A907-027828C75403", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5687A37A-3E72-4972-8F1A-A8266DE6A4A3", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C462E4FF-2285-46E1-927B-C8FFB018BF35", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44C45AEA-6436-4012-9A0D-C591A64444A9", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4FDB30FD-24BF-4597-97B5-7A3732673DD1", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27A4A53B-F26C-44DF-BABB-C17357A7B549", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F405F5CD-1255-4FD9-902C-45EF0D5C657A", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D65F2DB9-51C0-40CA-B5C9-A85CF43A593D", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2432608F-0E9E-49D5-9A22-2A2A6E89489F", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9403D7F-0349-4CC8-B566-5054E4A96D83", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F512316F-131F-4EAD-A7FA-CFE172AD4FA5", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9DF39DE-83FC-4DD2-812A-F2D50AA85ADF", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5DC68072-5AEA-4768-9CDB-57303996CA17", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8F396A75-7B5E-4544-92B9-7D4EFCD375B9", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FED2F309-48ED-4556-B562-3F01D7FB4141", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B79FF23A-6660-4513-A633-535B7543C8C9", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D6FFB29-9DFD-44FE-8AB5-32D8F765164F", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "482B19D4-3695-45A2-9CC7-1C0962414117", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A8ACBF4D-E173-477F-8E7C-33DA3C034AF0", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "486F652A-8DDA-4C01-B2DB-A4F981F56016", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C5C40AD4-5F07-4F57-89DE-A0658464E4A1", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2602C520-8244-4BAA-A483-BC31A5305942", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5088B73-27FC-4AA8-AB57-21EC0E0E7425", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD662D4-8D44-42FE-971C-C501574F6744", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3AD7201-E73D-48FE-87F1-B62715700A70", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BAEB0D25-E423-45EF-9E52-57DA7E594429", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "648F291B-0CE4-4D1D-8A5F-7DF66703C3B8", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E1BBA30-F9D1-4AD9-BAF7-F4D40D356C15", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43DCB063-0676-4615-93FC-64D98ACAAD57", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "492476F9-F8E1-47AB-AAF7-67AADA160678", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A89F3343-7DAC-4662-987E-7629610D3C32", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "714CC372-0E0D-4075-94CD-4723BE694D2D", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CB2C6A30-90B5-4E74-A4CA-C69FCB4E1E99", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B07058C5-3EDC-4615-B447-2438C534B0E0", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E71A9FF8-E8A4-40C4-8DB1-D28AE4136988", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "489653B2-F305-46B6-A4D6-DFE5DCC855C8", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "47A571CB-8C43-4AFB-8115-29FDED7C5EEA", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FF3AE7A-A653-444F-9CAF-DEF8C3F25F36", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD8E48F9-DEF9-43D4-8643-C1CC4D2EB3D1", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E40AC063-BC83-49B5-81E9-56835D0B72D1", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8A154914-D1C7-4549-815D-F1F693EE2B8F", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79F0A749-9F6F-4D92-81A6-48C30F59A0EB", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7A0D8BC-00E2-48EA-8F2D-C23968326032", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67A78FCF-5F78-41C5-B5D4-32815B76288E", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D51EFBB-2509-47C2-BA48-0FE151B993D0", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F9DF0D18-EC29-4E7F-8970-9D0355D0EDD5", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A172EB43-4526-4A3E-881D-0B6CC72EEA34", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "429B298B-C825-43F0-86CF-30385D4C56CD", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C4179752-A4AC-45DA-8A40-89217197D323", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4EFA7374-ED9E-4B25-B600-C34F02AFFCF9", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCF05F1E-CF13-47BF-B7D7-2FD13E2A4E46", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AC9DE15-B2E8-4D9E-BC6D-1007C083D0B7", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADE721FF-4323-4C32-91D6-AC085779E411", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F46B6E3-779A-48D3-9D66-9CC19B1C5060", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "E5FCA13D-409D-4E0B-9CB1-72C6F255C145", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "849D773E-AB8F-4044-B791-C886662D8BBF", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "375FC62D-D5B4-4698-A9E8-0AF00FEBBDE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C34A942-5EA7-4CEA-A7CA-C0ADBCC65046", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4B2FBA-2F9E-44CF-A75A-9BCB30964153", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30A546D8-3E31-4D4C-BAAC-607EAC46A4CC", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "A273285D-0615-479C-BE60-D2A73532B39A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D56DA98D-95C5-49E5-9174-DAE1ACEF706F", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "92BF19E2-C264-48C3-BB38-A23C7DD67BB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8379370-5081-4FB3-890C-2BF2D602095A", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "93995EDA-88C5-41AE-8A56-08728027F2AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DF60A69F-21ED-441C-823C-291026E00715", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "4F04B63D-AF86-466A-B74D-B1C9B2682DCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "552AAF13-377F-4A95-A580-7D906C6CB6A2", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "0A737AAD-AA75-41F7-B6A6-1B17D984CED5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFE3AC64-538A-4E18-85CF-063F984D735E", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "81287880-A2F0-4260-AA49-489DC2475118", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C559424-D75D-440E-8F92-C1AD1B66421B", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "07B6488C-8707-40B8-A867-87DDDE1B5625", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7525E902-27DA-4A53-A018-53AF96AA73DB", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8820F4-879C-4B9A-B10C-756DC6F35317", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68E124D1-686C-416C-B9DD-B6380C355D92", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "FB7E7CEC-B263-4020-90E6-C0B77D8036D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E78BCF22-DC43-4A07-971B-CA6A76B23EEF", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7CE47EE2-06B8-434F-BEC4-D2EB5B79AFB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7F6F068-1F61-4EBB-A465-381D4EA696EF", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "26C81497-519E-46A2-9F64-E80C82920E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04591375-2E1D-4DBC-8C9B-2E4D4435F8ED", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "CFBD9E1E-437B-44E7-B148-88513DA7D50A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57BE0E04-FC43-4437-B35F-F94DC8CC9EA6", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "A68F57A9-15AB-459C-8ACC-0BE565D230FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "36D36B6C-DC77-4E12-AF09-180ACB86551A", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "8F6DCA27-D098-40B7-9778-B284044CA34B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE6BAF58-5538-43A9-A5A9-9C1CD420F6E2", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "9737ACC0-18DB-4061-A259-D32C16BDA238", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0B68719-100F-402A-B409-DDE9811B2359", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "AE1C35D8-0C2A-4A63-9D1B-0983E0FDB7E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4CD6C041-14A7-459B-A3C9-1A6AB55F6006", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "30C72561-B0CE-4E51-AC5F-CD7EFDBCC5EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3BAFE92-C577-4558-AE15-F3E6524701A4", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "F27175DE-83A5-42DB-8F8A-886B1D886277", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.", }, { lang: "es", value: "Una validación de entrada incorrecta en SEV-SNP podría permitir que un hipervisor malicioso lea o sobrescriba la memoria del huésped, lo que podría provocar una fuga o corrupción de datos.", }, ], id: "CVE-2024-21978", lastModified: "2024-11-26T19:13:33.683", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.2, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.9, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 5.8, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-05T16:15:35.193", references: [ { source: "psirt@amd.com", tags: [ "Broken Link", ], url: "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@amd.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-10-02 17:35
Severity ?
7.5 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
6.4 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
6.4 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow
an attacker with ring0 privileges and access to the
BIOS menu or UEFI shell to modify the communications buffer potentially
resulting in arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52229468-9A95-4B2A-B242-88A49198BB69", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "75CC4E62-C004-4DB5-B045-8CA6F6375310", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B72D0513-A081-4871-B4C4-8E3D4F1C7F20", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E2074A2-64F9-4504-BB6C-E5ABD0B9127F", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF399472-A184-479C-85B1-53EF5839A1DA", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8525DD1-74DE-40A8-80DF-5CF8C6F0C6EC", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B814AA68-5BD4-496B-AAC1-5C38808EDAAB", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D8AAF48-ED77-48A0-B79E-BFFAF0EF6242", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D4336899-8E52-4ED2-BDE0-332AC882BFDF", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "010984BE-83AF-43E4-A223-99F3A8109E78", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "871188D9-6824-4E32-966D-498289249197", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AEBA6BC7-7200-487F-BAB7-1418DC4D31A8", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "869AB16C-9789-4224-B5FD-A0B8F592E3D3", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AB7BEB3-7963-46F0-893F-1AC572ECA3F7", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D5834EEE-2556-4E2B-BCD7-FC00ADF202D7", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B2721D3-FB40-4226-A19D-25E08723CA00", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4080FDB7-2CCD-40A5-8911-7F6FA914711C", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "368E596E-DC61-45B8-AD56-7F6F407C1696", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "151FF36E-D9B4-4AAE-BD92-29F9B80A323C", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A21871F5-1554-4114-A48E-4CB4EE49719F", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9D3E4278-4687-4ABB-B3DF-034CD3219DEA", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC4882DB-052E-42B5-B7C4-8069208A2B6F", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30D3F0ED-EF34-4019-A236-F82466C80D1C", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B445C34-694D-479F-AE24-C33C12EFE7AD", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5EE3CDA1-FCB5-4EEC-B432-B157B4821EA3", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EED4A04F-989A-4C2B-9D8A-BD55F35F25CF", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C366C81F-0BA0-4BB0-85CD-683B909070A6", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADD566C1-9D5D-4290-A59C-5EC4858B7EEB", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8DBED30F-F061-4D68-8DCA-36A0799B6B8D", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "14DE8C60-FFCA-4C1A-8E56-CA7D587FA6BD", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "640BBEA7-6FF0-48BE-9293-91B3938A944D", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFC537E2-7ED8-4D06-982A-D82A8077A847", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFC90C96-F53B-4231-86D5-487E386D8753", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "12860839-6A4E-42CC-8E6D-498718E285CB", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E7F4DF58-DED1-4B73-8A79-8B726BDCF038", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B7A0640-A14D-401A-97AC-BA053CD6EFD1", versionEndExcluding: "genoapi_1.0.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2BB5D70A-1627-4878-8F12-FB439C2BB2F0", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "80BEF1BA-4533-40CA-8DC6-FCB6D9A291C4", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "934DEED4-7118-435E-AF96-C34EC71D3AE5", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "948D4C27-EBB2-4578-BE09-2F237B9B8D59", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C1AD7A8-7E0F-4EDD-B93F-D4800D54D776", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9710AF52-5E45-44CE-88EB-821F538A1692", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2807BF4F-10B8-470A-8646-A8224E04DCCD", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F793F124-BC16-48C7-9FB6-4932EE153E31", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C092D5C7-369F-4EED-90FA-10091BB49861", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44F9FCF1-CA75-4688-BD62-487029054E35", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32FA4160-368C-46AC-A7DD-623CB8CF1F01", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "157CD272-1F01-4514-81A2-8B4E7E177C5C", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "258BFA6D-AFF2-4199-A59A-85643DB6A561", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45168C28-F506-4D42-92D1-FF1AE03044D9", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4D11A474-6C0F-4B95-85F6-138C98D1F32B", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "36F046AD-A8BC-4BE1-812F-99E096779C77", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00C17F69-0E8C-4272-8412-CE33F594E740", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "910DFF12-DF71-444C-89A0-10CFE6A1BAA4", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", versionEndExcluding: "milanpi_1.0.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9E27FD9-3F54-48A2-AA2E-EE797D264757", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", matchCriteriaId: "89FAAD8C-6DD1-408D-849B-0CE707321B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F683539A-0D2B-4FE8-823C-01439E74CF3C", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", matchCriteriaId: "07B3C659-C31A-4F82-9587-9F8A943F637D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E51DCE34-419F-4645-899F-A02B352BDCA9", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", matchCriteriaId: "87543FB4-658A-4300-9DC9-836AC1D4BCFB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40F03482-025B-4323-831B-B0F985083CD8", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", matchCriteriaId: "E25652AB-E243-4C40-BE12-AB53AF52CD61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D6FC45BE-C55D-4FB4-A10E-89A80477251C", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", matchCriteriaId: "88F4A126-B4A6-480A-9DD7-7F68714DFB49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9E7E49B-F739-4B9F-94AA-64041A3E38F8", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", matchCriteriaId: "72C86198-0BD4-42E1-974B-70A49F82C411", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4613AA4-BE67-46B5-875C-A5D5CDEADB62", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", matchCriteriaId: "8AC99346-DBF1-4060-8E6B-35D315944ADA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "956D2603-DB21-4349-BA0A-3DDD3AD8177A", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", matchCriteriaId: "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0D7C415-6952-4DCC-9EAE-50BD5DD8A226", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A30368D7-2E1D-41D5-9E72-FB2D156C1AAF", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", matchCriteriaId: "7A6C7497-1B63-490F-B8EA-D9F3CB790952", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42707648-1703-4FA0-8D64-2149DA2C7C49", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", matchCriteriaId: "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "938BE7DE-6094-4E7B-BC42-88EC0E037C8A", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDABE45-F529-453C-92DC-BF7747CEEC0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C4E7658B-5AE0-451A-8EAA-0713FA20C2C9", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", matchCriteriaId: "563708A3-7C51-4693-B02D-9A25A639FE42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C812730D-D41C-4606-81E3-AB0A0389354D", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", matchCriteriaId: "49BBC687-5C3C-4843-A028-B8BE29D1E302", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D6DC9C5-2804-4320-8FA4-76A8F4665C73", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", matchCriteriaId: "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA520E42-E231-456B-AC4A-CBF7B42D1F4D", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", matchCriteriaId: "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "877949F7-C06F-4804-97BB-4147F348F7A0", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", matchCriteriaId: "430C9955-0090-4166-8E90-D81C2AA7DE0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7C790F3-E6D1-4E00-9E48-C4FA4DB2A6B6", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", matchCriteriaId: "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8964660C-AB5C-4932-942E-B2C6F223B097", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FBA9BBB-0FF7-4D15-8AD3-BF591D136B5F", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", matchCriteriaId: "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "09606942-FF1B-46A1-890D-65BDA7624704", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", matchCriteriaId: "26FC5683-F612-4586-8BA3-FB1F66D8868B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C40C74D-A6F9-4428-89E4-2201DD9E9919", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", matchCriteriaId: "8F187412-26C2-4D8C-9199-D7CCF49D6520", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "99144DDA-F3EA-45E2-B470-ACD1652194F1", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", matchCriteriaId: "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "555BC41D-3E8E-49FE-BDF3-0D496B8A9147", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", matchCriteriaId: "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D30A454D-0B71-4651-AFEB-E915BCB8AC9F", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", matchCriteriaId: "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "724E131E-E678-4AD7-B521-5E68882AF4BD", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", matchCriteriaId: "168076CD-1E6D-4328-AB59-4C1A90735AC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07526B36-A301-49B4-A1B4-86D182D3BFD4", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", matchCriteriaId: "01BE5D42-1C62-4381-89E0-8F3264F696EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C28F9044-4D6D-421D-8F8E-9A35DE6DA79E", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAB403A-5A36-4DC3-A187-99127CF77BA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "149DCFDB-8062-4376-A7F7-645A8D40AC84", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", matchCriteriaId: "4E8BAB73-6F45-49AB-8F00-49A488006F3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DFACA3C3-7481-45DF-9870-7761CB858B2D", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", matchCriteriaId: "51C8CF00-8FC8-4206-9028-6F104699DE76", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F606E5D6-0113-4908-900D-E94F87E6481A", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EDCBAB98-1683-47C3-8DDB-BF39F6286B34", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", matchCriteriaId: "C05F1EF0-3576-4D47-8704-36E9FAB1D432", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A0DC6B5-3851-40B2-B959-524A6116A6DC", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", matchCriteriaId: "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "70A4946C-DF6C-4CD8-9842-E5027FFAA078", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB78361-9AAD-44BD-8B30-65715FEA4C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1855549F-70B0-4670-BF61-C0DD02525C45", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", matchCriteriaId: "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C459B1FE-D8ED-4483-8780-9134C3246B5E", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", matchCriteriaId: "F65FC5B9-0803-4D7F-8EF6-7B6681418596", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E90EDBC7-C8C6-4DF1-BF23-C883611DD4FC", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", matchCriteriaId: "805B4FEA-CFB2-429C-818B-9277B6D546C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "99C92284-DD9E-4B5D-81D7-67990905C2EE", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", matchCriteriaId: "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1661DEF6-006B-4C14-953A-5322141B4CF0", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", matchCriteriaId: "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5871DB40-AF57-4031-990E-E99902CAF8FC", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", matchCriteriaId: "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications buffer potentially\nresulting in arbitrary code execution.", }, { lang: "es", value: "Un TOCTOU (Time-Of-Check-Time-Of-Use) en SMM puede permitir que un atacante con privilegios ring0 y acceso al menú BIOS o al shell UEFI modifique el búfer de comunicaciones, lo que podría resultar en la ejecución de código arbitrario.", }, ], id: "CVE-2023-20578", lastModified: "2024-10-02T17:35:44.117", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 6, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-13T17:15:19.510", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-367", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
5.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C5E0C31-BF05-4B92-ACA1-84071764E077", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3BEE89-7D49-44C1-B608-940C453AC6A8", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A499E19-B92C-4B89-84C5-8C66B42077E9", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13E4D0A9-CF7D-41B0-B024-7D6726481280", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "25CCA953-04A4-4698-9985-FB97DA3EB536", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5427628C-6F24-4615-BD65-263EC4001E4A", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "14FE1816-DFCE-442B-9AF1-132F7E909445", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76ED00CB-FAEC-401F-BCE6-7505FC79052D", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0F7E9590-2921-4539-A88A-9031256141B8", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "095CA571-847E-47F2-AD91-DFD2B1DE99FF", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0A0BC87-4F31-487E-8142-8B55F67D2261", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D71E8010-E3AE-4847-B20D-D4A94FE2E982", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C647A92B-882A-432A-9CC3-7BFDCFF20F07", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "62A5CA50-BFAB-4470-98CB-1478DD281960", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B3B6C95-72E5-4364-930B-75DE7011C9D1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83DD388C-713A-4790-8C28-F33DA972B559", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F1B97E1-0559-44E0-B2D9-A03354700E9A", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3AB732A-0FAD-46FB-994C-38A951F6F186", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "14808E8C-AB59-4989-BE9D-B97FD7923F8D", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "74F50F36-25D0-4DA4-8CA0-886C0EAB5E2E", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "082C4EA1-81D7-44AE-A541-ABF671C2B090", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1A05E8AD-508C-4559-96E1-9DEF177AA2E7", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "88873335-352B-4E63-9549-B59CAEF64CF1", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0D84CF54-B439-473E-B9E4-85C90F51AACE", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F4238A3-881F-4228-9C89-502CD84E4D7D", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B307DC4A-6AA7-408F-9B08-638D7D15F0FC", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B79EBE3-3F66-4990-83E7-0C0D19DBBAE1", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "58E6A323-F04E-4D35-873B-1BF0AF1E90C4", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "877EF1AC-9148-4E54-BDC4-0D8BAD54C49A", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D09B6F98-9B13-4FD7-ACBD-3518C2171E9B", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A98DA452-BE77-4A37-9ED2-60B86F8D43FE", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2B1159B-716A-44B2-AE20-69C7B13DC022", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C53C00D-654C-40DA-B3AF-BBA4604187ED", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E790D2BD-E1C4-4B54-892B-B2E807F7470C", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A974C32E-F0AA-446E-85F7-5D97EBD8C3DC", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "19B9DE89-2BE2-45D4-B0D4-B98816405526", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A34AEDD4-F125-4C54-8702-2EF2A8FA56C5", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1D05F42B-72D8-4A76-8AC5-29FA79487FC1", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B490BF74-9BA2-42A9-97F9-8FBA15B61D47", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B3C52BB-0256-4997-AADC-2E86116FB2E8", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45097739-09B3-40A0-8CD3-F8336A140C25", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F8C2EBFF-1A24-412B-B45A-71BC6608F4BF", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EDC48B77-4822-4851-888A-D59AAD3B57EC", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34BD5E71-2566-4F18-9722-1E934FB37F8A", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01F8B254-7030-423C-BC00-03996DD50AB8", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA0B3B84-BF69-49AC-A77A-FB16156EAD74", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0281B9B7-F019-4205-B28A-637FC96C30F4", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78D2BB83-A307-4E49-B68F-782E325D30A4", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4AF050-3553-4775-BCF8-264514915DFA", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDF8362F-43EA-4D54-9AA9-C9E1775F58BC", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6499B2A8-7F9E-4AEA-B334-F686FC782033", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "276C4BFA-2476-4791-A597-44D63FED6675", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "849E8C64-C24B-413A-A70E-24B06CF41E8F", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "285BBB3D-2BA9-4ACB-AD14-20B1EF0C4447", versionEndExcluding: "genoapi_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.", }, { lang: "es", value: "Una validación de dirección incorrecta en ASP con SNP habilitado puede permitir que un atacante comprometa la integridad de la memoria del invitado.", }, ], id: "CVE-2023-20566", lastModified: "2024-11-21T07:41:08.080", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 4, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:15.837", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-05 16:15
Modified
2024-11-26 19:10
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B590923-B6F9-48A2-9BA8-833E22DE2E43", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C1BED240-E334-4A8F-9070-D57D54B0ED2A", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "84E4A21E-DC60-4ABB-94AD-BDC785717A96", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C1D50EA-07CA-43E0-90A2-6AFE444A5381", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEAA93E-431A-4476-B431-5983296CCAAD", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED357082-5FDA-4E76-9903-ACE49D241195", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68733A3D-95A9-45A7-B2D4-AD32439DAB08", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "218E19EA-5493-475D-A51E-771BB281D5C2", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "85514025-4FC5-4C5B-B6A6-7AC020E192F6", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5710382-A1D0-4E21-AC47-6F14CBE28329", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E47E9840-6143-4355-BFB0-B402FDF16617", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "739AF0E3-62A6-43D0-8ECD-CF7720624613", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC0E511C-CC66-43BE-A907-027828C75403", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5687A37A-3E72-4972-8F1A-A8266DE6A4A3", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C462E4FF-2285-46E1-927B-C8FFB018BF35", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44C45AEA-6436-4012-9A0D-C591A64444A9", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4FDB30FD-24BF-4597-97B5-7A3732673DD1", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27A4A53B-F26C-44DF-BABB-C17357A7B549", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F405F5CD-1255-4FD9-902C-45EF0D5C657A", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D65F2DB9-51C0-40CA-B5C9-A85CF43A593D", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2432608F-0E9E-49D5-9A22-2A2A6E89489F", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9403D7F-0349-4CC8-B566-5054E4A96D83", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F512316F-131F-4EAD-A7FA-CFE172AD4FA5", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9DF39DE-83FC-4DD2-812A-F2D50AA85ADF", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5DC68072-5AEA-4768-9CDB-57303996CA17", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8F396A75-7B5E-4544-92B9-7D4EFCD375B9", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FED2F309-48ED-4556-B562-3F01D7FB4141", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B79FF23A-6660-4513-A633-535B7543C8C9", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D6FFB29-9DFD-44FE-8AB5-32D8F765164F", versionEndExcluding: "milanpi_1.0.0.d", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "482B19D4-3695-45A2-9CC7-1C0962414117", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A8ACBF4D-E173-477F-8E7C-33DA3C034AF0", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "486F652A-8DDA-4C01-B2DB-A4F981F56016", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C5C40AD4-5F07-4F57-89DE-A0658464E4A1", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2602C520-8244-4BAA-A483-BC31A5305942", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5088B73-27FC-4AA8-AB57-21EC0E0E7425", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD662D4-8D44-42FE-971C-C501574F6744", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3AD7201-E73D-48FE-87F1-B62715700A70", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BAEB0D25-E423-45EF-9E52-57DA7E594429", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "648F291B-0CE4-4D1D-8A5F-7DF66703C3B8", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E1BBA30-F9D1-4AD9-BAF7-F4D40D356C15", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43DCB063-0676-4615-93FC-64D98ACAAD57", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "492476F9-F8E1-47AB-AAF7-67AADA160678", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A89F3343-7DAC-4662-987E-7629610D3C32", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "714CC372-0E0D-4075-94CD-4723BE694D2D", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CB2C6A30-90B5-4E74-A4CA-C69FCB4E1E99", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B07058C5-3EDC-4615-B447-2438C534B0E0", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E71A9FF8-E8A4-40C4-8DB1-D28AE4136988", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "489653B2-F305-46B6-A4D6-DFE5DCC855C8", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "47A571CB-8C43-4AFB-8115-29FDED7C5EEA", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FF3AE7A-A653-444F-9CAF-DEF8C3F25F36", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD8E48F9-DEF9-43D4-8643-C1CC4D2EB3D1", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E40AC063-BC83-49B5-81E9-56835D0B72D1", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8A154914-D1C7-4549-815D-F1F693EE2B8F", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79F0A749-9F6F-4D92-81A6-48C30F59A0EB", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7A0D8BC-00E2-48EA-8F2D-C23968326032", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67A78FCF-5F78-41C5-B5D4-32815B76288E", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D51EFBB-2509-47C2-BA48-0FE151B993D0", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F9DF0D18-EC29-4E7F-8970-9D0355D0EDD5", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A172EB43-4526-4A3E-881D-0B6CC72EEA34", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "429B298B-C825-43F0-86CF-30385D4C56CD", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C4179752-A4AC-45DA-8A40-89217197D323", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4EFA7374-ED9E-4B25-B600-C34F02AFFCF9", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCF05F1E-CF13-47BF-B7D7-2FD13E2A4E46", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AC9DE15-B2E8-4D9E-BC6D-1007C083D0B7", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADE721FF-4323-4C32-91D6-AC085779E411", versionEndExcluding: "genoapi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F46B6E3-779A-48D3-9D66-9CC19B1C5060", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "E5FCA13D-409D-4E0B-9CB1-72C6F255C145", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "849D773E-AB8F-4044-B791-C886662D8BBF", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "375FC62D-D5B4-4698-A9E8-0AF00FEBBDE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C34A942-5EA7-4CEA-A7CA-C0ADBCC65046", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4B2FBA-2F9E-44CF-A75A-9BCB30964153", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30A546D8-3E31-4D4C-BAAC-607EAC46A4CC", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "A273285D-0615-479C-BE60-D2A73532B39A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D56DA98D-95C5-49E5-9174-DAE1ACEF706F", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "92BF19E2-C264-48C3-BB38-A23C7DD67BB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8379370-5081-4FB3-890C-2BF2D602095A", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "93995EDA-88C5-41AE-8A56-08728027F2AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DF60A69F-21ED-441C-823C-291026E00715", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "4F04B63D-AF86-466A-B74D-B1C9B2682DCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "552AAF13-377F-4A95-A580-7D906C6CB6A2", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "0A737AAD-AA75-41F7-B6A6-1B17D984CED5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFE3AC64-538A-4E18-85CF-063F984D735E", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "81287880-A2F0-4260-AA49-489DC2475118", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C559424-D75D-440E-8F92-C1AD1B66421B", versionEndExcluding: "embmilanpi-sp3_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "07B6488C-8707-40B8-A867-87DDDE1B5625", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7525E902-27DA-4A53-A018-53AF96AA73DB", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8820F4-879C-4B9A-B10C-756DC6F35317", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68E124D1-686C-416C-B9DD-B6380C355D92", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "FB7E7CEC-B263-4020-90E6-C0B77D8036D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E78BCF22-DC43-4A07-971B-CA6A76B23EEF", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7CE47EE2-06B8-434F-BEC4-D2EB5B79AFB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7F6F068-1F61-4EBB-A465-381D4EA696EF", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "26C81497-519E-46A2-9F64-E80C82920E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04591375-2E1D-4DBC-8C9B-2E4D4435F8ED", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "CFBD9E1E-437B-44E7-B148-88513DA7D50A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57BE0E04-FC43-4437-B35F-F94DC8CC9EA6", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "A68F57A9-15AB-459C-8ACC-0BE565D230FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "36D36B6C-DC77-4E12-AF09-180ACB86551A", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "8F6DCA27-D098-40B7-9778-B284044CA34B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE6BAF58-5538-43A9-A5A9-9C1CD420F6E2", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "9737ACC0-18DB-4061-A259-D32C16BDA238", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0B68719-100F-402A-B409-DDE9811B2359", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "AE1C35D8-0C2A-4A63-9D1B-0983E0FDB7E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4CD6C041-14A7-459B-A3C9-1A6AB55F6006", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "30C72561-B0CE-4E51-AC5F-CD7EFDBCC5EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3BAFE92-C577-4558-AE15-F3E6524701A4", versionEndExcluding: "embgenoapi-sp5_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "F27175DE-83A5-42DB-8F8A-886B1D886277", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.", }, { lang: "es", value: "Una restricción inadecuada de las operaciones de escritura en el firmware SNP podría permitir que un hipervisor malicioso sobrescriba la semilla UMC de un invitado, lo que podría permitir la lectura de la memoria de un invitado fuera de servicio.", }, ], id: "CVE-2023-31355", lastModified: "2024-11-26T19:10:21.797", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 4, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-05T16:15:34.510", references: [ { source: "psirt@amd.com", tags: [ "Broken Link", ], url: "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "psirt@amd.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-08-08 18:15
Modified
2024-11-21 07:41
Severity ?
Summary
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", matchCriteriaId: "46D69DCC-AE4D-4EA5-861C-D60951444C6C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DA80E2CA-F643-4181-B64C-BFD012DE1EEC", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", matchCriteriaId: "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "59044C37-26AE-4F1E-922A-E220CE4884BB", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5BD9C12-1B7B-4213-906C-0F20EE02686C", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", matchCriteriaId: "34045719-7683-4621-929B-5F6B16B6A580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E0FC666B-47C6-4EAD-8399-5DE3469D5157", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD7AE84-3299-4C99-97A2-4159086FBC61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9B633C0D-5FB9-48AD-A512-FF65477B3135", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "487D6661-ECA7-44C0-BD46-FC8C03187B85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB4906EF-7250-43D4-A3BB-E7025179BF04", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", matchCriteriaId: "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "50117943-6DEA-41DE-9695-A45BBFB99D8E", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", matchCriteriaId: "F4E68C36-118D-41F9-900E-9F38F585A34D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A8F12A2D-4CFF-4AAD-B6A8-54585F2B9043", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "E309B1D5-E232-4F26-BF35-25A1542A5E10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8BDF36B9-B57F-44FE-BEE7-43069B2D2CD7", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*", matchCriteriaId: "342D9BCB-5C64-426E-8546-7D38C4DE6288", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68406DC8-5B8D-4A89-9B4D-F3CB9E25B032", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "5423F6D1-DA8B-4960-B87B-FA03C3539EDD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23CD69BD-F783-4151-9B03-A62E9400D116", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "75A74A3D-FC39-46B9-A544-1E5A51B05351", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D58647F0-4E83-4857-A49A-E1CC1450BEB8", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*", matchCriteriaId: "EE0D0239-0550-4B9C-9342-916B5462F791", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C94E09E7-7699-47D0-814B-E01D7FEABCF5", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB1E8B8A-649C-4C2F-A8E1-C39815512F2B", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E04578E-7580-463F-BAB0-49A9ECF048C7", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*", matchCriteriaId: "8576A19F-AC8F-457B-8EA5-651B552ED0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E77C9FB-419C-4AFB-83C0-D3BEE8C372D6", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "10F0BE72-B95C-45FA-92CF-7976B96A31F4", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "491AF1F4-1807-4536-ABC3-FD2F9FB94C70", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "89B72122-7F69-4541-831D-17360565E6B9", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DACCE645-BF3D-45CF-A1F7-7157CCA4FFD9", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4027487A-01D9-47D1-8467-B8390B95935D", versionEndExcluding: "comboam4v2pi_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "773D55A1-8EB8-4C16-91F9-6EB953AD5952", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "F05C8669-6348-4A1B-B1D4-D22022E1F67E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4D5BE0C1-1ACC-4CEF-849A-5916B2AE2B1F", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", matchCriteriaId: "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ECFFC31E-CD28-42E6-8FAD-F6349D6EF9A0", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "86CAA682-9666-4929-B1AC-D9DB3109DB1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FCB0B5D-5D10-4AA0-AB8E-EB10D2590C3B", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", matchCriteriaId: "AA666DF3-C5F3-4127-A8EE-B784DD41F642", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E2A5832B-E4EF-439B-999B-28F9EB1500D1", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", matchCriteriaId: "5602B902-9FDB-4946-BE4C-236262285F2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "24FC993D-CBBE-424D-92FB-5F8BE029EF85", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", matchCriteriaId: "B3DE32CA-168F-4812-AEAE-D771EB01E15D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C67DA4B-EFFA-4C1C-AA92-6942D963A9B7", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6CD984-A8C7-4B23-8FF9-896C503EBA37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83012AC9-9A24-469C-8B7E-741B14D7379D", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", matchCriteriaId: "225E8405-04FF-4885-92C8-8581ACC66E06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B92B0C31-572D-4FE0-AA5C-5E40ABC9CA45", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", matchCriteriaId: "76121981-8DC2-4779-833E-4B15CFCF7FC3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87ECCD10-31FB-45BB-AED9-9C94E714B799", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", matchCriteriaId: "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "895B3038-56A8-4E59-BC9D-E8568B2FF4BC", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6C05D51F-469D-487D-9FC8-E1AD699A6F74", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5C9554CF-9FAE-4F4B-AD61-7AC50A289B5A", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "6740A06F-4512-427D-9CB9-A4A6DB046BA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BAE63027-A73F-43E6-B667-44F3B8D120B2", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*", matchCriteriaId: "D2787C72-42D5-42B0-BE5B-E548B319BCF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FACBACEC-0BD8-4E74-93E4-4AC4CF193290", versionEndExcluding: "comboam5_1.0.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", matchCriteriaId: "1232B034-1214-4F9A-823D-DC76D5C5956B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E47DE060-45D0-4703-B9FD-D45E90276B66", versionEndExcluding: "chagallwspi-swrx8_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "815DEC82-52E2-4CAB-88E3-FF00E35D0A20", versionEndExcluding: "chagallwspi-swrx8_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E576F58F-4E66-4EF4-8E69-71F94D34955C", versionEndExcluding: "chagallwspi-swrx8_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B0FA0121-4245-483C-AEDE-4F3EDFD49E52", versionEndExcluding: "chagallwspi-swrx8_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A57E99DA-DFB6-4D64-AA53-28209E47039B", versionEndExcluding: "chagallwspi-swrx8_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45AB5F8E-1357-498B-B86C-676E7E8D1D60", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "24A0A2C9-8B74-4AEF-8BC7-157B1BEF4B8A", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B6405E0B-FC0A-440E-B59A-8234883C1BA1", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44A1DB8C-EEE4-40E6-A5F1-B0969DCEFC70", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35954F0F-8BCF-4070-B89F-CD96993909C2", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF79D918-2FFD-4ABA-AF94-57338B9C742C", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0A2C3D9A-4DD0-4538-B248-CD2A90FC0198", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "075717AC-01F7-4FF2-94CA-C49EEA15ACA9", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E24CD07-3BD0-45EA-BEC7-1FD74914DB67", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D2BD1F51-6D87-4D1E-A67A-09E42185B108", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A75B064-737F-4750-817B-A46244C60EF0", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1638CF0C-047A-45D0-B522-E022055A5C1B", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35D5BE39-5678-4742-8545-4B77F638933A", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FCD9CE1-26B7-4589-93C8-800543FCCA1D", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B2E0FA6-17D1-4F31-8BBA-D799B6193A72", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "691CF38C-BE0A-41B6-B0D9-555C3889F375", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2DBA2870-E8E3-40E8-9CE3-2D4E0AA7689D", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5E06C18-3F26-4FBB-929E-CC3FC5E430BC", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "367AB427-A2E0-4AAA-898D-051E37021A33", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDFD9B8E-8321-443D-9887-E79D5F5DF25C", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "3674D656-9623-4B39-AADE-158FE70FF29F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "17D72983-2F49-4B46-8627-129823FBF0FA", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "B21FB338-F944-40F9-8F0C-99B471AAD51E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1DA08DC-16C4-490B-9041-748328303C92", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D1C64DE1-DEAB-49AB-9586-705C8789F898", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A1638E21-FA6B-43BB-A852-745B7E3E2D57", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", matchCriteriaId: "09B085FF-EAEA-42BC-BA60-3AA9B76141B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE87BC83-9726-48D6-9B3F-3907D0A85D58", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "760F20CC-9034-462C-A25E-C009E2218C38", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F740D54E-289F-4812-9BDC-88F0EC73EBB4", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", matchCriteriaId: "1D2CBCEA-AB4F-444C-9CCD-A976003F796C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3470DDF-5647-48B8-9576-41DEC0793377", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", matchCriteriaId: "7D260012-5D8F-4B36-8B88-82DB0291EE9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "381CDFB7-F091-4EA8-8850-71BE1387F246", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "179F30A4-958B-4857-B11D-6FD0A2F6D1BC", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", matchCriteriaId: "025E494E-953E-426E-BE89-6F2360A3AAC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8383A5AC-6870-4DC4-BE3E-39298B5972C3", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", matchCriteriaId: "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7736u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "70EB1DB9-C6DB-40B4-BC68-087A90D7EBB8", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", matchCriteriaId: "5D50E8EA-ECB2-463D-BA51-D13CF5A02266", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7735u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32E4310D-A980-465C-9DF2-2EE5D93FEDA3", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1893BB4F-77A6-4048-AEAA-61C92958C32B", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", matchCriteriaId: "EE36D471-57BF-4385-A825-029F7313E4DB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7535u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A9C8A16-B6D4-4F6D-AB3E-C1EBE4F56512", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", matchCriteriaId: "082BE536-F29C-4A73-B030-A19DD3A448B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_7335u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "24D61C84-9AEC-400B-AAA5-C8F5AF5D021C", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", matchCriteriaId: "495E436C-B0EE-4B72-AB49-332F4752C140", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "50ED8913-F725-4A67-84B6-9F0F0B636F5E", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", matchCriteriaId: "29805A0A-1E52-4545-9D41-B9A1EE571778", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8D5FD5DB-D500-442B-B1AF-BCB88F3FF978", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*", matchCriteriaId: "C822A153-C32B-423B-8660-EAE0A1DEB4EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "31A63A5D-1495-404D-820A-D16CB89A63CE", versionEndExcluding: "cezannepi-fp6_1.0.0.fa", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*", matchCriteriaId: "86704116-43D0-47FD-8896-AB00C265AAE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_7640hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E339576E-062A-4C93-AA5D-1F8E0E2ED693", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7640hs:-:*:*:*:*:*:*:*", matchCriteriaId: "D306FF3F-87D0-48BF-93EA-733896DBB8A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7940h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76F008FC-D32F-4923-93FA-23B00E2E88BE", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*", matchCriteriaId: "5A7E6806-A7AC-4C96-960B-B8934CEA2439", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E28301E7-9423-4E2B-8E8F-FE05B760F35A", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8480A7E0-882C-4B03-ADBC-697304B0B7C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7840h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9F55A6F8-E8C1-4DEE-BCCA-BC86748409C9", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", matchCriteriaId: "D2D0429F-F186-4F78-9AE0-574E3A39926D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7840u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3EC28C1E-9EA4-40E5-9493-620277FB6B40", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*", matchCriteriaId: "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53225D2B-EAE1-4772-A8FC-2AE107B20836", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0E3657C6-1047-4CA9-8D44-C7143F7D877D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7640h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7030541-E143-4885-B24D-ECE18FBC2B16", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", matchCriteriaId: "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7640u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "877037A7-FDA1-4147-BAEC-228E25A177DD", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*", matchCriteriaId: "9BC5E111-A7AA-4A45-A2E3-47013F9135D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7540u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "532D67C0-B127-4F99-9D0C-8F7CDD71FEA0", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*", matchCriteriaId: "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_7440u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "584DA20B-8E0B-4572-9134-5F7E47D99190", versionEndExcluding: "phoenixpi-fp8-fp7_1.0.0.2a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", matchCriteriaId: "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7945hx3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4862DE44-922F-4983-B7BE-6CB80B7CD0A8", versionEndExcluding: "dragonrangefl1pi_1.0.0.3b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", matchCriteriaId: "82CCEE11-392D-4486-A6AD-CB64FB8B7081", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7945hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B152085B-B26F-4A19-A450-85E15781FBED", versionEndExcluding: "dragonrangefl1pi_1.0.0.3b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", matchCriteriaId: "74DD4A40-B712-4B54-9CC7-0BFD79E917BA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7845hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "312F52E6-0224-4B9A-BAF2-047F7230B871", versionEndExcluding: "dragonrangefl1pi_1.0.0.3b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", matchCriteriaId: "BD27234D-ACFC-4144-8980-2B706822C579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7745hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6506B081-C9F6-4C13-85D0-341B5E6C35C3", versionEndExcluding: "dragonrangefl1pi_1.0.0.3b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", matchCriteriaId: "69289284-2ED2-4D8B-8AE2-B835AAF31EAD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7645hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "717556C1-D45C-4C71-B5C8-6D90CF9A8432", versionEndExcluding: "dragonrangefl1pi_1.0.0.3b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5D5B25-F32A-493E-BD54-57098981E15A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DC71137-5861-4413-AE37-FBA5EA15CD84", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB947EC3-B3CF-4E35-86C1-DDD831D4518D", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FB9F211-8998-44FF-91FE-723BA6315B85", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3A4256B-4211-4A15-B33C-743A4898CB76", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4DCADA15-DE56-4993-977D-5BE701476D46", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FF7D4F3A-CE7A-4C84-B872-E1206912AD62", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFEA67F1-83B8-461D-8066-91BBD3FD9E24", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B86A8C8F-BEFC-439B-A712-E931CC229708", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6651DED0-FD67-406B-845A-553ABBBCCB02", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "025B7A4B-0CF9-401E-AF18-3581CD04BDB5", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F64D3037-AC84-411D-AF23-2B6E49C26896", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FBC1FE8-F91B-407A-B4DC-C3EE38676828", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00B84AD1-3F32-46B5-88D1-50CE43844977", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "10654574-BACF-41D7-8B2D-73E2E0CBFBFB", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CCC29525-306B-4E29-A846-8439487042D6", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6EC6AF23-8DE0-4402-B707-F9DC3E83B906", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C45FD0CE-4B69-4C95-9EA1-575736A55045", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AEDA7A65-34F0-454C-9040-A7024DB82D6C", versionEndExcluding: "milanpi_1.0.0.c", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "46DA46A4-B52A-4DE2-9D15-A6CFA8100626", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B65F0EE-B8BD-47C1-B018-40304328111E", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38872F0B-9FEC-4FFF-B23A-0363563B363D", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CCB8097F-A467-4F0F-A4A9-DBDC1A8D64E4", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "763B1559-1F1F-499E-AA99-3D985FE29B30", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C0552FCA-39A4-440C-974D-58DA3B7DA1A4", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22CAB170-3ED4-4D5E-8B3B-CE8D4BA9B3D5", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B66B44E-2DEC-46C1-9083-C0E27FCE9B7F", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "59B9F850-7916-4CBE-B823-9933A726B345", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7B16A0E-1188-4FD9-9E69-B8F4DD33ED3D", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71545221-A01F-4C17-A3FA-C124137212AB", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C3CEB6D-0B14-44AA-87B5-1FDFDEC1F8A2", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D1F9F957-1FA8-41D5-B9BC-429B217DCBBF", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CBBA0738-1981-4E82-90C8-676C50404E21", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3AA7824A-CDDF-49FC-8982-86BD72EBF93E", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7634433-80B0-4007-A968-FE6210F13981", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D2A24DF-73EB-47DA-AE17-727743CF1F77", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0DAD9B0E-BFA4-447F-B24C-A0BA9325F20C", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DADD9549-3769-4F4A-A898-9BDFF892A8F5", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40A82ECB-1839-4DD5-AC35-E0D598790900", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ABA02A3E-81B9-4A81-BE29-C4A829B13BC3", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D548FCE5-7B25-490C-B777-1202EA6F18E2", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "742306EC-A9CB-43C4-BC82-4E657FB38623", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C0060C2B-DD7A-4886-859A-5A6FCEA9A758", versionEndExcluding: "genoapi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", matchCriteriaId: "0B6341EE-9F08-41F4-AAC9-69FCFD57AA29", versionEndExcluding: "10.0.10240.20107", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", matchCriteriaId: "27D3DBDC-310E-41F1-A2B2-F0D3B09E1C25", versionEndExcluding: "10.0.14393.6167", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", matchCriteriaId: "412DCA62-8009-40C3-B76C-F3791104F0C8", versionEndExcluding: "10.0.17763.5206", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", matchCriteriaId: "B6873B3B-E106-4E56-B8EC-5D5A6EEEA5B5", versionEndExcluding: "10.0.19044.3324", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", matchCriteriaId: "72882593-8B44-4DF3-A6A1-8EFE2D7BBCF6", versionEndExcluding: "10.0.19045.3324", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", matchCriteriaId: "32AAA0B2-DF17-4CFA-851E-6B31C11DD38C", versionEndExcluding: "10.0.22000.2295", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", matchCriteriaId: "478EF06F-1EF8-45B5-981F-79159BFD709F", versionEndExcluding: "10.0.22621.2134", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", matchCriteriaId: "A6C6551D-670F-4EA1-84B5-70BEE90A0C46", versionEndExcluding: "10.0.14393.6167", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", matchCriteriaId: "812E15CB-8BBE-47D6-9837-E3144A5F5485", versionEndExcluding: "10.0.17763.4737", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", matchCriteriaId: "A975F8A8-D539-4F16-8185-328703B8120F", versionEndExcluding: "10.0.20348.1906", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", }, { lang: "es", value: "Una vulnerabilidad de canal lateral en algunas de las CPU de AMD puede permitir que un atacante influya en la predicción de la dirección de retorno. Esto puede dar lugar a una ejecución especulativa en una dirección controlada por el atacante, lo que podría conducir a la divulgación de información.", }, ], id: "CVE-2023-20569", lastModified: "2024-11-21T07:41:08.533", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-08-08T18:15:11.530", references: [ { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/08/08/4", }, { source: "psirt@amd.com", tags: [ "Third Party Advisory", ], url: "http://xenbits.xen.org/xsa/advisory-434.html", }, { source: "psirt@amd.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://comsec.ethz.ch/research/microarch/inception/", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html", }, { source: "psirt@amd.com", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/", }, { source: "psirt@amd.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/", }, { source: "psirt@amd.com", url: "https://security.netapp.com/advisory/ntap-20240605-0006/", }, { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005", }, { source: "psirt@amd.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5475", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/08/08/4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://xenbits.xen.org/xsa/advisory-434.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://comsec.ethz.ch/research/microarch/inception/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20240605-0006/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5475", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-203", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-01-11 14:15
Modified
2024-11-21 07:41
Severity ?
Summary
A privileged attacker
can prevent delivery of debug exceptions to SEV-SNP guests potentially
resulting in guests not receiving expected debug information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "929A1953-903C-4B1D-B148-88E5A2F500BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "849E6D95-C3A8-457E-90D9-34ECAE5D1519", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFD3E8F9-8EE0-44F7-8065-C7B631BDA485", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CEC0B5B-B5F6-4CB3-937A-F1F091E399A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EDC216C0-16D7-4DF0-A5C4-A952E4916925", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22D58FB5-0093-4487-8506-8430ED650258", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD0100D1-E4CF-4062-A260-D707845BF81A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B016179A-6567-497E-9756-3B8EEC7FC1EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "52535E49-B319-448C-B189-72DFF244E50F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0546350C-6DF6-43AC-8439-578D2D292C09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "74293FA6-D960-451F-A071-68F2E2AE86CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AA4E052F-4883-4F6B-87B8-CFC432525948", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F0A90AA1-346D-40F3-8408-A47D9334CA11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8505FAC6-A96D-4788-B23F-960D5AB533C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "83955DFE-A91C-424A-AA6D-785964C97C09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9E1E4DA9-9D03-470B-B314-DDC2248B1C52", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA9A188F-6E38-41D5-83FF-0389E2E07A44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8502D97B-8208-431B-B350-32504B904816", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "857CC046-3CB1-425E-B7A2-1CD2C1B79949", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D045B33D-897C-4EBF-B2FF-7C3B9A69377E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7D70506-EDBC-4ED9-9AD3-925610C03D7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F50338E3-725A-455F-9680-F700F5690057", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37E9F62C-4DF2-45A6-BDC1-20AA24E85BF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D43773D-4565-4273-A719-ACEAEBD679D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB9F36AB-0E6D-4854-A86B-3DE9AD084879", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED7A173-AAB9-4EEF-957F-7940EB22F4A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C5F0F8E5-32F2-40C9-814A-663A19B37D1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5BC4AC-09CF-456A-8021-E931D61B09DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E61EB9F-8AF9-49FC-B142-B109DA826E66", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "26DC4D67-1C38-4118-BED6-71E5727CA55A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3E56DB5A-965B-4448-86C8-2E417665E4F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "00E06330-E43A-4A35-AE5D-FCC7E792C514", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "947EE825-C45D-4090-9855-260AA9903E5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DC521A8E-84A4-4831-8433-3CA909226FE5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E5F12-4818-4D67-B27C-36744D5F9B71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "35151FC3-1B84-4BD5-8B99-EAFD3BAFCC9C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "379AAAA6-F0BA-43AA-AFC6-CC1F4FACBEF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2EA7278D-8165-4E5C-A9ED-F465B2A2D2E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8B1A2179-8415-460D-959B-1917AA2FCED7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "421268E7-3C0D-42FB-90A8-6BA8E4A29F9C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7889643-98F3-49E8-BD57-2DE56CC72B95", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40D4BC04-155E-4A68-BFBD-9F7D81DB3B6C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3A52919-B5ED-41F6-9CC6-C8468812322F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8916EDB2-B9BA-4FA7-9591-DFB2E00DDC96", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "08C7B98D-B612-4D50-9BAF-1C92FC7939A2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91763C36-8C02-4F4C-A544-9AC43F1A0CCA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "46C1DD8B-5C64-4CB8-9C79-3A567920AC3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30D362F8-2685-4D66-BDC1-4D6CD0D9B8AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "976E774E-C87E-402A-9528-C8F1456720CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23BF0DBE-5649-4A00-998A-83EE9EB9EC7F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F8F83F3A-A712-4144-9EF7-DA1DFFA75E7A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FDA370-1E31-4D68-A532-ECADEB579D16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3D9FD90-C289-4AD1-B52E-6943ADAFB681", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6758649E-A61D-40D7-82F0-C4F5BC2B3D85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3B1412B1-093D-4063-B55D-F258A2FE66DF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22E0EE5E-5F74-4A75-8401-2F1A8CB17138", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n", }, { lang: "es", value: "Un atacante con privilegios puede impedir la entrega de excepciones de depuración a invitados SEV-SNP, lo que podría provocar que los invitados no reciban la información de depuración esperada.", }, ], id: "CVE-2023-20573", lastModified: "2024-11-21T07:41:09.177", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.2, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-01-11T14:15:43.963", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-07-11 19:15
Modified
2024-11-27 16:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5B92B63F-3C30-4C00-9734-37CCA865FED9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", matchCriteriaId: "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", matchCriteriaId: "805B4FEA-CFB2-429C-818B-9277B6D546C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE35B376-F439-428B-A299-CBEEE0BEFF3E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", matchCriteriaId: "F65FC5B9-0803-4D7F-8EF6-7B6681418596", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", matchCriteriaId: "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB78361-9AAD-44BD-8B30-65715FEA4C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", matchCriteriaId: "C05F1EF0-3576-4D47-8704-36E9FAB1D432", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23D64F03-2F90-490B-844B-5F0F08B49294", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9C952A84-3DA2-448F-85AC-573C270C312D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", matchCriteriaId: "51C8CF00-8FC8-4206-9028-6F104699DE76", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", matchCriteriaId: "4E8BAB73-6F45-49AB-8F00-49A488006F3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAB403A-5A36-4DC3-A187-99127CF77BA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED76988B-0245-4C25-876C-CACC57B04B8D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", matchCriteriaId: "01BE5D42-1C62-4381-89E0-8F3264F696EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8480358-5313-4308-90F7-F93D9B11C66C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", matchCriteriaId: "168076CD-1E6D-4328-AB59-4C1A90735AC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "907ABA86-2313-4D2F-832A-5F48E928553F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*", matchCriteriaId: "839C6991-D387-471D-9112-C79677D5A5AB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*", matchCriteriaId: "3480338B-290F-4E9C-88F9-A4160853B9BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68041D51-331A-4716-AF30-3B37C07F851C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*", matchCriteriaId: "6943C2EC-1555-40B8-9533-BBB6572E9073", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A518D997-F2ED-4489-AB69-871799C80DA4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*", matchCriteriaId: "44A54822-42B0-47B4-A080-416D5C8AC20C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFF9B650-F6D9-463E-8107-33C540A6E093", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8DDDB3-E4B0-4354-955F-E2196E404970", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81333440-CC8B-4261-B9CC-ECA0A71BA7BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*", matchCriteriaId: "C38BB8F3-11AD-48C3-B751-AF93E3EA6138", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1527680F-0762-4E3E-BB6D-09866A1C610D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", matchCriteriaId: "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "73789139-3498-4ED8-A80C-A8794BC176A7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", matchCriteriaId: "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AE409172-E478-4557-977E-8EDF016F061D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", matchCriteriaId: "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "99075640-17C5-47EA-B9B5-FE72BA9C62C9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", matchCriteriaId: "8F187412-26C2-4D8C-9199-D7CCF49D6520", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB83D414-FD6D-4502-B487-F0D00DAD3972", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", matchCriteriaId: "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D964031-15E2-461B-BC1B-213EF720E720", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77566843-4A30-441F-8FBA-7D3C76907BB1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", matchCriteriaId: "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", matchCriteriaId: "430C9955-0090-4166-8E90-D81C2AA7DE0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", matchCriteriaId: "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9921332-9BAE-4D93-A2FD-576D9BA72408", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", matchCriteriaId: "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", matchCriteriaId: "49BBC687-5C3C-4843-A028-B8BE29D1E302", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", matchCriteriaId: "563708A3-7C51-4693-B02D-9A25A639FE42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BBC3B4-BD63-4895-AE29-E59396806AA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDABE45-F529-453C-92DC-BF7747CEEC0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", matchCriteriaId: "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_5552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA4DD36F-5A92-4D89-9FFA-580C30A5036C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_5552:-:*:*:*:*:*:*:*", matchCriteriaId: "EEFF9571-88E1-4BF1-B576-06AE45D58E91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A82315CD-2E07-4BDE-9A9F-D06640680D76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "08A14E26-5950-4B06-8AEE-5FF03415F4DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", matchCriteriaId: "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "955DF45C-0F81-4EE8-B7E2-0687122253AD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", matchCriteriaId: "8AC99346-DBF1-4060-8E6B-35D315944ADA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "02C8C50D-2994-4AB7-AD1C-31560608D007", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", matchCriteriaId: "72C86198-0BD4-42E1-974B-70A49F82C411", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "00715133-F99C-49F2-9B0B-16D2F15E4D49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", matchCriteriaId: "88F4A126-B4A6-480A-9DD7-7F68714DFB49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", matchCriteriaId: "E25652AB-E243-4C40-BE12-AB53AF52CD61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", matchCriteriaId: "87543FB4-658A-4300-9DC9-836AC1D4BCFB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B71C2E30-E155-49B8-B90F-F9844A25C155", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", matchCriteriaId: "07B3C659-C31A-4F82-9587-9F8A943F637D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8502D97B-8208-431B-B350-32504B904816", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "83955DFE-A91C-424A-AA6D-785964C97C09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8505FAC6-A96D-4788-B23F-960D5AB533C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AA4E052F-4883-4F6B-87B8-CFC432525948", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F0A90AA1-346D-40F3-8408-A47D9334CA11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "74293FA6-D960-451F-A071-68F2E2AE86CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "52535E49-B319-448C-B189-72DFF244E50F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B016179A-6567-497E-9756-3B8EEC7FC1EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0546350C-6DF6-43AC-8439-578D2D292C09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD0100D1-E4CF-4062-A260-D707845BF81A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22D58FB5-0093-4487-8506-8430ED650258", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "849E6D95-C3A8-457E-90D9-34ECAE5D1519", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "929A1953-903C-4B1D-B148-88E5A2F500BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EDC216C0-16D7-4DF0-A5C4-A952E4916925", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2EA7278D-8165-4E5C-A9ED-F465B2A2D2E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "379AAAA6-F0BA-43AA-AFC6-CC1F4FACBEF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7889643-98F3-49E8-BD57-2DE56CC72B95", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "35151FC3-1B84-4BD5-8B99-EAFD3BAFCC9C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E5F12-4818-4D67-B27C-36744D5F9B71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DC521A8E-84A4-4831-8433-3CA909226FE5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "947EE825-C45D-4090-9855-260AA9903E5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "00E06330-E43A-4A35-AE5D-FCC7E792C514", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3E56DB5A-965B-4448-86C8-2E417665E4F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "26DC4D67-1C38-4118-BED6-71E5727CA55A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "421268E7-3C0D-42FB-90A8-6BA8E4A29F9C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E61EB9F-8AF9-49FC-B142-B109DA826E66", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5BC4AC-09CF-456A-8021-E931D61B09DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C5F0F8E5-32F2-40C9-814A-663A19B37D1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED7A173-AAB9-4EEF-957F-7940EB22F4A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D43773D-4565-4273-A719-ACEAEBD679D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB9F36AB-0E6D-4854-A86B-3DE9AD084879", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37E9F62C-4DF2-45A6-BDC1-20AA24E85BF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F50338E3-725A-455F-9680-F700F5690057", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7D70506-EDBC-4ED9-9AD3-925610C03D7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8B1A2179-8415-460D-959B-1917AA2FCED7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8916EDB2-B9BA-4FA7-9591-DFB2E00DDC96", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40D4BC04-155E-4A68-BFBD-9F7D81DB3B6C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3A52919-B5ED-41F6-9CC6-C8468812322F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "\nA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\n\n\n\n\n\n\n\n\n\n", }, ], id: "CVE-2023-20575", lastModified: "2024-11-27T16:15:08.010", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-07-11T19:15:09.547", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-203", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-203", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:34
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5871DB40-AF57-4031-990E-E99902CAF8FC", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", matchCriteriaId: "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1661DEF6-006B-4C14-953A-5322141B4CF0", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", matchCriteriaId: "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "99C92284-DD9E-4B5D-81D7-67990905C2EE", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", matchCriteriaId: "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E90EDBC7-C8C6-4DF1-BF23-C883611DD4FC", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", matchCriteriaId: "805B4FEA-CFB2-429C-818B-9277B6D546C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C459B1FE-D8ED-4483-8780-9134C3246B5E", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", matchCriteriaId: "F65FC5B9-0803-4D7F-8EF6-7B6681418596", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1855549F-70B0-4670-BF61-C0DD02525C45", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", matchCriteriaId: "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "70A4946C-DF6C-4CD8-9842-E5027FFAA078", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB78361-9AAD-44BD-8B30-65715FEA4C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A0DC6B5-3851-40B2-B959-524A6116A6DC", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", matchCriteriaId: "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EDCBAB98-1683-47C3-8DDB-BF39F6286B34", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", matchCriteriaId: "C05F1EF0-3576-4D47-8704-36E9FAB1D432", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F606E5D6-0113-4908-900D-E94F87E6481A", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DFACA3C3-7481-45DF-9870-7761CB858B2D", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", matchCriteriaId: "51C8CF00-8FC8-4206-9028-6F104699DE76", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "149DCFDB-8062-4376-A7F7-645A8D40AC84", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", matchCriteriaId: "4E8BAB73-6F45-49AB-8F00-49A488006F3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C28F9044-4D6D-421D-8F8E-9A35DE6DA79E", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAB403A-5A36-4DC3-A187-99127CF77BA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07526B36-A301-49B4-A1B4-86D182D3BFD4", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", matchCriteriaId: "01BE5D42-1C62-4381-89E0-8F3264F696EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "724E131E-E678-4AD7-B521-5E68882AF4BD", versionEndExcluding: "naplespi_1.0.0.k", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", matchCriteriaId: "168076CD-1E6D-4328-AB59-4C1A90735AC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D30A454D-0B71-4651-AFEB-E915BCB8AC9F", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", matchCriteriaId: "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "555BC41D-3E8E-49FE-BDF3-0D496B8A9147", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", matchCriteriaId: "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "99144DDA-F3EA-45E2-B470-ACD1652194F1", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", matchCriteriaId: "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C40C74D-A6F9-4428-89E4-2201DD9E9919", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", matchCriteriaId: "8F187412-26C2-4D8C-9199-D7CCF49D6520", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "09606942-FF1B-46A1-890D-65BDA7624704", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", matchCriteriaId: "26FC5683-F612-4586-8BA3-FB1F66D8868B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FBA9BBB-0FF7-4D15-8AD3-BF591D136B5F", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", matchCriteriaId: "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8964660C-AB5C-4932-942E-B2C6F223B097", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7C790F3-E6D1-4E00-9E48-C4FA4DB2A6B6", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", matchCriteriaId: "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "877949F7-C06F-4804-97BB-4147F348F7A0", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", matchCriteriaId: "430C9955-0090-4166-8E90-D81C2AA7DE0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA520E42-E231-456B-AC4A-CBF7B42D1F4D", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", matchCriteriaId: "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D6DC9C5-2804-4320-8FA4-76A8F4665C73", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", matchCriteriaId: "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C812730D-D41C-4606-81E3-AB0A0389354D", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", matchCriteriaId: "49BBC687-5C3C-4843-A028-B8BE29D1E302", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C4E7658B-5AE0-451A-8EAA-0713FA20C2C9", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", matchCriteriaId: "563708A3-7C51-4693-B02D-9A25A639FE42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "938BE7DE-6094-4E7B-BC42-88EC0E037C8A", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDABE45-F529-453C-92DC-BF7747CEEC0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42707648-1703-4FA0-8D64-2149DA2C7C49", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", matchCriteriaId: "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A30368D7-2E1D-41D5-9E72-FB2D156C1AAF", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", matchCriteriaId: "7A6C7497-1B63-490F-B8EA-D9F3CB790952", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0D7C415-6952-4DCC-9EAE-50BD5DD8A226", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "956D2603-DB21-4349-BA0A-3DDD3AD8177A", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", matchCriteriaId: "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4613AA4-BE67-46B5-875C-A5D5CDEADB62", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", matchCriteriaId: "8AC99346-DBF1-4060-8E6B-35D315944ADA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9E7E49B-F739-4B9F-94AA-64041A3E38F8", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", matchCriteriaId: "72C86198-0BD4-42E1-974B-70A49F82C411", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D6FC45BE-C55D-4FB4-A10E-89A80477251C", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", matchCriteriaId: "88F4A126-B4A6-480A-9DD7-7F68714DFB49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40F03482-025B-4323-831B-B0F985083CD8", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", matchCriteriaId: "E25652AB-E243-4C40-BE12-AB53AF52CD61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E51DCE34-419F-4645-899F-A02B352BDCA9", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", matchCriteriaId: "87543FB4-658A-4300-9DC9-836AC1D4BCFB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F683539A-0D2B-4FE8-823C-01439E74CF3C", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", matchCriteriaId: "07B3C659-C31A-4F82-9587-9F8A943F637D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9E27FD9-3F54-48A2-AA2E-EE797D264757", versionEndExcluding: "romepi_1.0.0.g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", matchCriteriaId: "89FAAD8C-6DD1-408D-849B-0CE707321B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C5E0C31-BF05-4B92-ACA1-84071764E077", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3BEE89-7D49-44C1-B608-940C453AC6A8", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A499E19-B92C-4B89-84C5-8C66B42077E9", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13E4D0A9-CF7D-41B0-B024-7D6726481280", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "25CCA953-04A4-4698-9985-FB97DA3EB536", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5427628C-6F24-4615-BD65-263EC4001E4A", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "14FE1816-DFCE-442B-9AF1-132F7E909445", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76ED00CB-FAEC-401F-BCE6-7505FC79052D", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0F7E9590-2921-4539-A88A-9031256141B8", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "095CA571-847E-47F2-AD91-DFD2B1DE99FF", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0A0BC87-4F31-487E-8142-8B55F67D2261", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D71E8010-E3AE-4847-B20D-D4A94FE2E982", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C647A92B-882A-432A-9CC3-7BFDCFF20F07", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "62A5CA50-BFAB-4470-98CB-1478DD281960", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B3B6C95-72E5-4364-930B-75DE7011C9D1", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83DD388C-713A-4790-8C28-F33DA972B559", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F1B97E1-0559-44E0-B2D9-A03354700E9A", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3AB732A-0FAD-46FB-994C-38A951F6F186", versionEndExcluding: "milanpi_1.0.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A826E63-E26F-4932-9BD3-03CC801BD9E0", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CCD54CF8-FE6F-4003-B9AF-D246928D4F22", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B8BC8D8-B48F-4378-8146-3B74EDE84238", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03191635-46A1-48F5-BA2A-63A338B6ECC2", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51E7C98D-017B-4692-B3F0-1FAC416F23ED", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39854CE5-EDBC-4B85-8CEC-5403BD7CD87F", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E9AC77DD-429D-481A-A113-95D26F8CC537", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9C88FCC-891E-40A2-B038-3D913EDB9ED0", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BAD836DD-4A8B-43CC-8B2B-31ECD7297714", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F5B8D399-2ACC-4D39-B3D0-AF8CF9F1318E", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCF3664E-44B5-4FF6-AD64-97F1CF387E88", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A941CDD6-443D-4E9A-8D6F-EF2FAF09804D", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CCE4C50-17A5-4601-B673-45A67F36580A", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3765BA20-BE1E-49FB-BDFB-4880F5AFC564", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F0F89354-0DF7-41DA-AAB0-8E1C7B3CE4A6", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "912F08B6-ED19-4302-AC99-293373CF217B", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FECF09F-6B7B-461A-9657-6327D68ACA9D", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C392C9F-A86C-485C-BF76-CF1E088041AE", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35A303BC-4BB5-446A-9D29-0AEFF0E8EF16", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E3EB55FE-81B4-445D-80B3-FA75F977B741", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79F7E918-47C3-4772-A048-6E8EA363D6BD", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "89E1C09E-A174-4279-BA21-15571BB90A7D", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42E14FC6-B6BB-42A5-8805-AF6065557EEE", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1CEDE31C-0AD0-4103-A4B1-10F898F61017", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD7D2FFF-E1B8-4B46-996B-94365ECA78A9", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F03231CC-4F68-4602-9F1F-C0BA96C74AA8", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1530CEE-B546-4FE5-93A2-2AEFDCD0F1F3", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BC954B29-33C0-4167-8B24-62F78C6B1AE5", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A6A5F753-93BE-4568-8487-39F65F90A8E3", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33A763A2-B6FD-4544-B051-60A43C716BEE", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23BD0E26-B0B8-4613-8DD8-988AA6F33C36", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4276F58E-86C9-422D-A318-D3C809B53963", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A01E67D-A30F-46FA-B7ED-8ABF713694FA", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB2E339F-8B74-4FC2-BF6C-40DBB4E67AA8", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "434D661B-CC93-45AF-81DD-56D1224742DC", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3CAE0DC7-E2B7-41BF-ACE6-0C6A0D256269", versionEndExcluding: "genoapi_1.0.0.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72FBF8C2-C17C-4688-AF07-CBCF22A86879", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950xt:-:*:*:*:*:*:*:*", matchCriteriaId: "578B531F-3884-4F0A-AE99-9F5F3D3267A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", matchCriteriaId: "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3D814C2A-D794-46A8-9A06-CC4DB387176F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A630AE54-9E40-4ABB-81DC-35D423785C44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700xt:-:*:*:*:*:*:*:*", matchCriteriaId: "E772D4F6-B0AD-490F-BAF0-DADD3C8F5295", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "927B2661-8988-484F-965C-D94AA9D52911", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", matchCriteriaId: "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F0E87F5-65BA-477D-9679-907FD2906298", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", matchCriteriaId: "51A56423-3DDE-451B-AC47-51715AC74F41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8EB03625-1A44-46CF-BEE4-B9753A2067AD", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", matchCriteriaId: "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4DDE971D-6762-4D3F-B574-6839D195BB6B", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7B018068-116B-4662-AB36-849F934F1AE7", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", matchCriteriaId: "34045719-7683-4621-929B-5F6B16B6A580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83E392A7-AEC8-4F8C-8761-1247CB1A0B23", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "487D6661-ECA7-44C0-BD46-FC8C03187B85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8985C782-787C-4B7E-8C0F-033654D84764", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", matchCriteriaId: "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4012629D-3D3F-48ED-88A5-9F2CB44914F9", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", matchCriteriaId: "F4E68C36-118D-41F9-900E-9F38F585A34D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CD8CE65-F4DB-4D0B-8A49-6161E201F791", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "E309B1D5-E232-4F26-BF35-25A1542A5E10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65DE69E3-AE8A-42F9-897D-0950E7D074D0", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE7618FD-A6A5-4DA6-93AE-253C8162F97F", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C98A4202-BDB2-4ED4-97AD-9048F3B8B08E", versionEndExcluding: "comboam4_v2_pi_1.2.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F94DE3D-D26D-4B40-BF1B-E8269BEEA817", versionEndExcluding: "castlepeakpi-sp3r3_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27B3BE05-DBBC-471B-9052-D6FEAC051033", versionEndExcluding: "castlepeakpi-sp3r3_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27705130-C969-416F-94DF-4ACF94AEBE6F", versionEndExcluding: "castlepeakpi-sp3r3_1.0.0.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4366EF8-3B28-4433-8265-D2760120B2FD", versionEndExcluding: "chagallwspi-swrx8_1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", matchCriteriaId: "FE43349A-246E-45E9-8CD5-E417DB270445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service.", }, { lang: "es", value: "Una validación de dirección DRAM insuficiente en System Management Unit (SMU) puede permitir que un atacante lea/escriba desde/hacia una dirección DRAM no válida, lo que podría provocar una denegación de servicio.", }, ], id: "CVE-2021-46774", lastModified: "2024-11-21T06:34:41.667", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.3, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:10.407", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2023-31347
Vulnerability from cvelistv5
Published
2024-02-13 19:18
Modified
2024-08-16 19:51
Severity ?
EPSS score ?
Summary
Due to a code bug in
Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a
guest to observe an incorrect TSC when Secure TSC is enabled potentially
resulting in a loss of guest integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T14:53:31.084Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-31347", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-16T19:50:42.676211Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-16T19:51:32.151Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", packageName: "PI", platforms: [ "x86", ], product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: "PI", platforms: [ "x86", ], product: "4th Gen AMD EPYC™ Processors ", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2024-02-14T17:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \n\n\n\n<br>", }, ], value: "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2024-02-13T19:18:51.045Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007", }, ], source: { advisory: "AMD-SB-3007", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-31347", datePublished: "2024-02-13T19:18:51.045Z", dateReserved: "2023-04-27T15:25:41.427Z", dateUpdated: "2024-08-16T19:51:32.151Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20566
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-12-03 14:26
Severity ?
EPSS score ?
Summary
Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:36.943Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-20566", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2023-11-27T20:58:09.078592Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-03T14:26:45.381Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 9003", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n<br>", }, ], value: "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-18T18:36:52.542Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, ], source: { advisory: "AMD-SB-3002", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20566", datePublished: "2023-11-14T18:54:00.908Z", dateReserved: "2022-10-27T18:53:39.753Z", dateUpdated: "2024-12-03T14:26:45.381Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20569
Vulnerability from cvelistv5
Published
2023-08-08 17:02
Modified
2024-09-23 03:18
Severity ?
EPSS score ?
Summary
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-09-23T03:18:32.598Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html", }, { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005", }, { tags: [ "x_transferred", ], url: "http://xenbits.xen.org/xsa/advisory-434.html", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/08/08/4", }, { tags: [ "x_transferred", ], url: "https://comsec.ethz.ch/research/microarch/inception/", }, { tags: [ "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/", }, { tags: [ "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/", }, { tags: [ "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html", }, { tags: [ "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5475", }, { tags: [ "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/", }, { tags: [ "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20240605-0006/", }, ], title: "CVE Program Container", x_generator: { engine: "ADPogram 0.0.1", }, }, ], cna: { affected: [ { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ 3000 Series Desktop Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ PRO 3000 Series Desktop Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ 3000 Series Desktop Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ PRO 3000 Series Processors with Radeon™ Vega Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Athlon™ 3000 Series Processors with Radeon™ Graphics ", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Athlon™ PRO 3000 Series Processors with Radeon™ Vega Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ PRO 4000 Series Desktop Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Desktop Processors ", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: "AGESA", platforms: [ "x86", ], product: "Ryzen™ PRO 5000 Series Desktop Processors", vendor: " ", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ Threadripper™ 2000 Series Processors ", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: " Ryzen™ Threadripper™ 5000 Series Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ Threadripper™ 3000 Series Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ PRO 5000 Series Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ 6000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ PRO 6000 Series Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "Ryzen™ 7040 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "Ryzen™ 7000 Series Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "Ryzen™ 7000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: " 1st Gen AMD EPYC™ Processors", vendor: "AMD ", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "2nd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-08-08T16:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "\n\n\n\n<span style=\"background-color: rgb(255, 255, 255);\">A side channel vulnerability on some </span><span style=\"background-color: rgb(255, 255, 255);\">of the </span><span style=\"background-color: rgb(255, 255, 255);\">AMD CPUs may allow an attacker to influence </span><span style=\"background-color: rgb(255, 255, 255);\">the </span><span style=\"background-color: rgb(255, 255, 255);\">return address prediction</span><span style=\"background-color: rgb(255, 255, 255);\">. This may</span><span style=\"background-color: rgb(255, 255, 255);\"> result in speculative execution at an attacker-controlled </span><span style=\"background-color: rgb(255, 255, 255);\">address</span><span style=\"background-color: rgb(255, 255, 255);\">, potentially leading to information disclosure.</span>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", }, ], value: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-08-08T17:02:11.318Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005", }, { url: "http://xenbits.xen.org/xsa/advisory-434.html", }, { url: "http://www.openwall.com/lists/oss-security/2023/08/08/4", }, { url: "https://comsec.ethz.ch/research/microarch/inception/", }, { url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/", }, { url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/", }, { url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html", }, { url: "https://www.debian.org/security/2023/dsa-5475", }, { url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/", }, { url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/", }, { url: "https://security.netapp.com/advisory/ntap-20240605-0006/", }, ], source: { advisory: "AMD-SB-7005", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20569", datePublished: "2023-08-08T17:02:11.318Z", dateReserved: "2022-10-27T18:53:39.754Z", dateUpdated: "2024-09-23T03:18:32.598Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20573
Vulnerability from cvelistv5
Published
2024-01-11 13:53
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A privileged attacker
can prevent delivery of debug exceptions to SEV-SNP guests potentially
resulting in guests not receiving expected debug information.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:36.236Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "Various ", }, ], }, ], datePublic: "2024-01-09T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n", }, ], value: "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2024-01-11T13:53:52.581Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006", }, ], source: { advisory: "AMD-SB-3004", discovery: "UNKNOWN", }, title: "Debug Exception Delivery in Secure Nested Paging", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20573", datePublished: "2024-01-11T13:53:52.581Z", dateReserved: "2022-10-27T18:53:39.755Z", dateUpdated: "2024-08-02T09:05:36.236Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26345
Vulnerability from cvelistv5
Published
2023-11-14 18:53
Modified
2024-08-03 20:26
Severity ?
EPSS score ?
Summary
Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:24.909Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "2nd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7002", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7002", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n<br>", }, ], value: "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 1.9, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-18T18:38:22.990Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], source: { advisory: "AMD-SB-3002, AMD-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26345", datePublished: "2023-11-14T18:53:20.979Z", dateReserved: "2021-01-29T21:24:26.145Z", dateUpdated: "2024-08-03T20:26:24.909Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20575
Vulnerability from cvelistv5
Published
2023-07-11 18:29
Modified
2024-11-27 16:01
Severity ?
EPSS score ?
Summary
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:36.892Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-20575", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-27T15:57:15.725721Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-203", description: "CWE-203 Observable Discrepancy", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-27T16:01:14.610Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "1st Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "2nd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: " ", platforms: [ "x86", ], product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", platforms: [ "x86", ], product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "Various ", }, ], }, ], datePublic: "2023-07-11T16:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "\n\n<span style=\"background-color: rgb(248, 249, 250);\">A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.</span>\n\n\n\n\n\n\n\n\n\n", }, ], value: "\nA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\n\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-07-11T18:29:02.607Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004", }, ], source: { advisory: "AMD-SB-3004", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20575", datePublished: "2023-07-11T18:29:02.607Z", dateReserved: "2022-10-27T18:53:39.756Z", dateUpdated: "2024-11-27T16:01:14.610Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-21978
Vulnerability from cvelistv5
Published
2024-08-05 16:05
Modified
2024-08-05 17:36
Severity ?
EPSS score ?
Summary
Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
References
▼ | URL | Tags |
---|---|---|
https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_7003_firmware", vendor: "amd", versions: [ { lessThan: "milanpi_1.0.0.9_sp3", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_9003_firmware", vendor: "amd", versions: [ { lessThan: "genoapi_1.0.0.7_sp5", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_7773x_firmware", vendor: "amd", versions: [ { lessThan: "milanpi_1.0.0.d", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_9754s_firmware", vendor: "amd", versions: [ { lessThan: "genoapi_1.0.0.c", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-21978", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-08-05T17:01:18.171419Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-05T17:36:02.731Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { lessThan: "MilanPI 1.0.0.D", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, { defaultStatus: "affected", product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { lessThan: "GenoaPI 1.0.0.C", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { lessThan: "EmbMilanPI-SP3 1.0.0.9", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 9003", vendor: "AMD", versions: [ { lessThan: "EmbGenoaPI-SP5 1.0.0.7", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, ], datePublic: "2024-08-05T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.</span>\n\n</span>\n\n</span>", }, ], value: "Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-05T16:05:34.019Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2024-21978", datePublished: "2024-08-05T16:05:34.019Z", dateReserved: "2024-01-03T16:43:30.197Z", dateUpdated: "2024-08-05T17:36:02.731Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-21980
Vulnerability from cvelistv5
Published
2024-08-05 16:06
Modified
2024-08-05 21:00
Severity ?
EPSS score ?
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
References
▼ | URL | Tags |
---|---|---|
https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_7003_firmware", vendor: "amd", versions: [ { lessThan: "milanpi_1.0.0.9_sp3", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_9003_firmware", vendor: "amd", versions: [ { lessThan: "genoapi_1.0.0.7_sp5", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_7773x_firmware", vendor: "amd", versions: [ { lessThan: "milanpi_1.0.0.d", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_9754s_firmware", vendor: "amd", versions: [ { lessThan: "genoapi_1.0.0.c", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-21980", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-08-05T20:52:33.557459Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-05T21:00:57.665Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { lessThan: "MilanPI 1.0.0.D", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, { defaultStatus: "affected", product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { lessThan: "GenoaPI 1.0.0.C", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { lessThan: "EmbMilanPI-SP3 1.0.0.9", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 9003", vendor: "AMD", versions: [ { lessThan: "EmbGenoaPI-SP5 1.0.0.7", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, ], datePublic: "2024-08-05T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.</span>\n\n</span>", }, ], value: "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.9, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-05T16:06:36.216Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2024-21980", datePublished: "2024-08-05T16:06:36.216Z", dateReserved: "2024-01-03T16:43:30.197Z", dateUpdated: "2024-08-05T21:00:57.665Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20591
Vulnerability from cvelistv5
Published
2024-08-13 16:53
Modified
2024-08-14 13:14
Severity ?
EPSS score ?
Summary
Improper re-initialization of IOMMU during the DRTM event
may permit an untrusted platform configuration to persist, allowing an attacker
to read or modify hypervisor memory, potentially resulting in loss of
confidentiality, integrity, and availability.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | vendor-advisory |
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_7003_firmware", vendor: "amd", versions: [ { lessThan: "milanpi_1.0.0.b", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_9003_firmware", vendor: "amd", versions: [ { lessThan: "genoapi_1.0.0.8", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_7773x_firmware", vendor: "amd", versions: [ { lessThan: "milanpi_1.0.0.b", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_9754s_firmware", vendor: "amd", versions: [ { lessThan: "genoapi_1.0.0.8", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-20591", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-14T13:13:17.696799Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-14T13:14:56.158Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "AMD EPYC™ 7003 Series Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "MilanPI 1.0.0.B", versionType: "PI", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ 9004 Series Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "Genoa 1.0.0.8", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 7003 Series Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbMilanPI-SP3 1.0.0.7", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 9003 Series Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbGenoaPI-SP5 1.0.0.3", }, ], }, ], datePublic: "2024-08-13T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Improper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability.\n\n\n\n\n\n\n\n<div><div><div>\n\n</div>\n\n</div>\n\n</div>\n\n\n\n\n\n</span>", }, ], value: "Improper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-13T16:53:23.681Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20591", datePublished: "2024-08-13T16:53:23.681Z", dateReserved: "2022-10-27T18:53:39.761Z", dateUpdated: "2024-08-14T13:14:56.158Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-46766
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS |
Version: various |
||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T05:17:42.287Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 9003", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.<br>", }, ], value: "Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 2.5, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-18T18:40:54.027Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-46766", datePublished: "2023-11-14T18:51:58.036Z", dateReserved: "2022-03-31T16:50:27.871Z", dateUpdated: "2024-08-04T05:17:42.287Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20584
Vulnerability from cvelistv5
Published
2024-08-13 16:53
Modified
2024-11-05 21:40
Severity ?
EPSS score ?
Summary
IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD EPYC™ 7003 Processors | |||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2023-20584", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-13T17:31:27.946120Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-05T21:40:37.392Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "AMD EPYC™ 7003 Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "MilanPI 1.0.0.C", versionType: "PI", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ 9004 Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "GenoaPI 1.0.0.B", }, ], }, ], datePublic: "2024-08-13T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised <a target=\"_blank\" rel=\"nofollow\">Hypervisor </a>to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity.<div><div><div>\n\n</div>\n\n</div>\n\n</div>\n\n\n\n\n\n\n\n<div>\n\n\n\n\n\n<div>\n\n<div><a target=\"_blank\" rel=\"nofollow\"></a>\n\n<p><br></p></div></div><div><div>\n\n</div>\n\n</div>\n\n</div>\n\n\n\n\n\n<div><div><div>\n\n</div>\n\n</div>\n\n</div>\n\n\n\n\n\n</span>", }, ], value: "IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised Hypervisor to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-13T16:53:18.373Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20584", datePublished: "2024-08-13T16:53:18.373Z", dateReserved: "2022-10-27T18:53:39.759Z", dateUpdated: "2024-11-05T21:40:37.392Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-46774
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-10-11 18:07
Severity ?
EPSS score ?
Summary
Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 3000 series Desktop Processors “Matisse" |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T05:17:42.622Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-46774", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-11T17:51:52.542045Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-11T18:07:59.642Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 3000 series Desktop Processors “Matisse\"", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 5000 Series Desktop Processors “Vermeer”", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "1st Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "2nd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 3000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7002", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded 5000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7002", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 3000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service.\n\n\n\n\n\n\n\n\n\n\n\n<br>", }, ], value: "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-18T18:31:43.449Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-46774", datePublished: "2023-11-14T18:52:11.012Z", dateReserved: "2022-03-31T16:50:27.874Z", dateUpdated: "2024-10-11T18:07:59.642Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20578
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2024-08-15 18:08
Severity ?
EPSS score ?
Summary
A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow
an attacker with ring0 privileges and access to the
BIOS menu or UEFI shell to modify the communications buffer potentially
resulting in arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD EPYC™ 7001 Processors | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_7001", vendor: "amd", versions: [ { status: "unaffected", version: "1.0.0.k", }, ], }, { cpes: [ "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_7002", vendor: "amd", versions: [ { status: "unaffected", version: "1.0.0.g", }, ], }, { cpes: [ "cpe:2.3:a:amd:epyc_9004:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_9004", vendor: "amd", versions: [ { status: "unaffected", version: "1.0.0.2", }, ], }, { cpes: [ "cpe:2.3:a:amd:epyc_embedded_3000:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_embedded_3000", vendor: "amd", versions: [ { status: "unaffected", version: "1.1.0.a", }, ], }, { cpes: [ "cpe:2.3:a:amd:epyc_embedded_7002:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_embedded_7002", vendor: "amd", versions: [ { status: "unaffected", version: "1.0.0.a", }, ], }, { cpes: [ "cpe:2.3:a:amd:epyc_embedded_7003:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_embedded_7003", vendor: "amd", versions: [ { status: "unaffected", version: "1.0.0.7", }, ], }, { cpes: [ "cpe:2.3:a:amd:epyc_embedded_9003:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "epyc_embedded_9003", vendor: "amd", versions: [ { status: "unaffected", version: "1.0.0.0", }, ], }, { cpes: [ "cpe:2.3:a:amd:ryzen_embedded_7000:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_embedded_7000", vendor: "amd", versions: [ { status: "unaffected", version: "1.0.0.0", }, ], }, { cpes: [ "cpe:2.3:a:amd:ryzen_embedded_v3000:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_embedded_v3000", vendor: "amd", versions: [ { status: "unaffected", version: "1.0.0.8", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-20578", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-08-15T15:56:35.845479Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-15T18:08:38.953Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", packageName: "PI", product: "AMD EPYC™ 7001 Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "NaplesPI 1.0.0.K", versionType: "PI", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ 7002 Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "RomePI 1.0.0.G", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ 7003 Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "MilanPI 1.0.0.B", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ 9004 Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "GenoaPI 1.0.0.2", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 7000 Series Desktop Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "ComboAM5 1.0.0.1", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Threadripper™ PRO 5000WX Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "ChagallWSPI-sWRX8 1.0.0.7", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "MendocinoPI-FT6 1.0.0.0", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "RembrandtPI-FP7 1.0.0.9b", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "RembrandtPI-FP7 1.0.0.9b", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 3000", vendor: "AMD", versions: [ { status: "unaffected", version: "SnowyOwl PI 1.1.0.A", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 7002", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbRomePI-SP3 1.0.0.A", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbMilanPI-SP3 1.0.0.7", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 9003", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbGenoaPI-SP5 1.0.0.0", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ Embedded 7000", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbeddedAM5PI 1.0.0.0", }, ], }, { defaultStatus: "affected", product: "AMD RyzenTM Embedded V3000", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbeddedPI-FP7r2 1.0.0.8", }, ], }, ], datePublic: "2024-08-13T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\"> A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications <a target=\"_blank\" rel=\"nofollow\"></a><a target=\"_blank\" rel=\"nofollow\"></a><a target=\"_blank\" rel=\"nofollow\">buffer </a>potentially\nresulting in arbitrary code execution.<div><div><div>\n\n</div>\n\n</div>\n\n</div>\n\n\n\n\n\n</span>", }, ], value: "A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications buffer potentially\nresulting in arbitrary code execution.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-13T16:52:58.457Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20578", datePublished: "2024-08-13T16:52:58.457Z", dateReserved: "2022-10-27T18:53:39.757Z", dateUpdated: "2024-08-15T18:08:38.953Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-31355
Vulnerability from cvelistv5
Published
2024-08-05 16:04
Modified
2024-08-06 14:58
Severity ?
EPSS score ?
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.
References
▼ | URL | Tags |
---|---|---|
https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2023-31355", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-06T14:07:12.426239Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-06T14:58:40.899Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { lessThan: "MilanPI 1.0.0.D", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, { defaultStatus: "affected", product: "4th Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { lessThan: "GenoaPI 1.0.0.C", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { lessThan: "EmbMilanPI-SP3 1.0.0.9", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, { defaultStatus: "affected", product: "AMD EPYC™ Embedded 9003", vendor: "AMD", versions: [ { lessThan: "EmbGenoaPI-SP5 1.0.0.7", status: "affected", version: "various", versionType: "Platform Initialization", }, ], }, ], datePublic: "2024-08-05T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.</span>\n\n</span>\n\n</span>\n\n</span>", }, ], value: "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-05T16:04:24.813Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-31355", datePublished: "2024-08-05T16:04:24.813Z", dateReserved: "2023-04-27T15:25:41.428Z", dateUpdated: "2024-08-06T14:58:40.899Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-31346
Vulnerability from cvelistv5
Published
2024-02-13 19:18
Modified
2024-08-02 14:53
Severity ?
EPSS score ?
Summary
Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2023-31346", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-02-21T20:06:47.743045Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T17:19:15.832Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T14:53:30.943Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "affected", packageName: "PI", platforms: [ "x86", ], product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: "PI", platforms: [ "x86", ], product: "4th Gen AMD EPYC™ Processors ", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2024-02-13T17:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n<br>", }, ], value: "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2024-02-13T19:18:21.462Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007", }, ], source: { advisory: "AMD-SB-3007", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-31346", datePublished: "2024-02-13T19:18:19.089Z", dateReserved: "2023-04-27T15:25:41.427Z", dateUpdated: "2024-08-02T14:53:30.943Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-23830
Vulnerability from cvelistv5
Published
2023-11-14 18:53
Modified
2024-08-03 03:51
Severity ?
EPSS score ?
Summary
SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T03:51:45.987Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "3rd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "4th Gen AMD EPY™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD EPYC™ Embedded 7003", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n<br>", }, ], value: "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 1.9, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-18T18:41:52.383Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], source: { advisory: "AMD-SB-3002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2022-23830", datePublished: "2023-11-14T18:53:28.408Z", dateReserved: "2022-01-21T17:20:55.781Z", dateUpdated: "2024-08-03T03:51:45.987Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }