All the vulnerabilites related to amd - ryzen_3_pro_4200g
Vulnerability from fkie_nvd
Published
2023-07-24 20:15
Modified
2024-11-21 07:41
Summary
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
References
psirt@amd.comhttp://seclists.org/fulldisclosure/2023/Jul/43Not Applicable
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/24/3Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/25/1Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/25/12Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/25/13Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/25/14Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/25/15Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/25/16Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/25/17Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/25/5Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/25/6Mailing List
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/26/1Mailing List, Mitigation, Patch, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/07/31/2Mailing List, Mitigation, Patch, Third Party Advisory
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/08/08/6
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/08/08/7
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/08/08/8
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/08/16/4
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/08/16/5
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/22/11
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/22/9
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/25/4
psirt@amd.comhttp://www.openwall.com/lists/oss-security/2023/09/25/7
psirt@amd.comhttp://xenbits.xen.org/xsa/advisory-433.htmlMitigation, Patch, Vendor Advisory
psirt@amd.comhttps://cmpxchg8b.com/zenbleed.htmlExploit
psirt@amd.comhttps://lists.debian.org/debian-lts-announce/2023/07/msg00030.htmlMailing List
psirt@amd.comhttps://lists.debian.org/debian-lts-announce/2023/07/msg00033.htmlMailing List, Third Party Advisory
psirt@amd.comhttps://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
psirt@amd.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
psirt@amd.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
psirt@amd.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
psirt@amd.comhttps://security.netapp.com/advisory/ntap-20240531-0004/
psirt@amd.comhttps://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008Vendor Advisory
psirt@amd.comhttps://www.debian.org/security/2023/dsa-5459Third Party Advisory
psirt@amd.comhttps://www.debian.org/security/2023/dsa-5461Third Party Advisory
psirt@amd.comhttps://www.debian.org/security/2023/dsa-5462Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2023/Jul/43Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/24/3Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/25/1Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/25/12Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/25/13Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/25/14Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/25/15Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/25/16Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/25/17Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/25/5Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/25/6Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/26/1Mailing List, Mitigation, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/31/2Mailing List, Mitigation, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/08/08/6
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/08/08/7
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/08/08/8
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/08/16/4
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/08/16/5
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/22/11
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/22/9
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/25/4
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/25/7
af854a3a-2127-422b-91ae-364da2661108http://xenbits.xen.org/xsa/advisory-433.htmlMitigation, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://cmpxchg8b.com/zenbleed.htmlExploit
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/07/msg00030.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/07/msg00033.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240531-0004/
af854a3a-2127-422b-91ae-364da2661108https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5459Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5461Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5462Third Party Advisory
Impacted products
Vendor Product Version
xen xen 4.14.0
xen xen 4.15.0
xen xen 4.16.0
xen xen 4.17.0
debian debian_linux 10.0
debian debian_linux 11.0
debian debian_linux 12.0
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3900xt_firmware -
amd ryzen_9_3900xt -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_pro_3900_firmware -
amd ryzen_9_pro_3900 -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_7_4700g_firmware -
amd ryzen_7_4700g -
amd ryzen_7_4700ge_firmware -
amd ryzen_7_4700ge -
amd ryzen_5_4600g_firmware -
amd ryzen_5_4600g -
amd ryzen_5_4600ge_firmware -
amd ryzen_5_4600ge -
amd ryzen_3_4300g_firmware -
amd ryzen_3_4300g -
amd ryzen_3_4300ge_firmware -
amd ryzen_3_4300ge -
amd ryzen_3_pro_4450u_firmware -
amd ryzen_3_pro_4450u -
amd ryzen_3_pro_4350ge_firmware -
amd ryzen_3_pro_4350ge -
amd ryzen_3_pro_4350g_firmware -
amd ryzen_3_pro_4350g -
amd ryzen_3_pro_4200g_firmware -
amd ryzen_3_pro_4200g -
amd ryzen_5_pro_4650ge_firmware -
amd ryzen_5_pro_4650ge -
amd ryzen_5_pro_4650g_firmware -
amd ryzen_5_pro_4650g -
amd ryzen_5_pro_4400g_firmware -
amd ryzen_5_pro_4400g -
amd ryzen_7_pro_4750u_firmware -
amd ryzen_7_pro_4750u -
amd ryzen_7_pro_4750ge_firmware -
amd ryzen_7_pro_4750ge -
amd ryzen_7_pro_4750g_firmware -
amd ryzen_7_pro_4750g -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_7520u_firmware -
amd ryzen_5_7520u -
amd ryzen_3_7320u_firmware -
amd ryzen_3_7320u -
amd athlon_gold_7220u_firmware -
amd athlon_gold_7220u -
amd epyc_7232p_firmware -
amd epyc_7232p -
amd epyc_7302p_firmware -
amd epyc_7302p -
amd epyc_7402p_firmware -
amd epyc_7402p -
amd epyc_7502p_firmware -
amd epyc_7502p -
amd epyc_7702p_firmware -
amd epyc_7702p -
amd epyc_7252_firmware -
amd epyc_7252 -
amd epyc_7262_firmware -
amd epyc_7262 -
amd epyc_7272_firmware -
amd epyc_7272 -
amd epyc_7282_firmware -
amd epyc_7282 -
amd epyc_7302_firmware -
amd epyc_7302 -
amd epyc_7352_firmware -
amd epyc_7352 -
amd epyc_7402_firmware -
amd epyc_7402 -
amd epyc_7452_firmware -
amd epyc_7452 -
amd epyc_7502_firmware -
amd epyc_7502 -
amd epyc_7532_firmware -
amd epyc_7532 -
amd epyc_7542_firmware -
amd epyc_7542 -
amd epyc_7552_firmware -
amd epyc_7552 -
amd epyc_7642_firmware -
amd epyc_7642 -
amd epyc_7662_firmware -
amd epyc_7662 -
amd epyc_7702_firmware -
amd epyc_7702 -
amd epyc_7742_firmware -
amd epyc_7742 -
amd epyc_7h12_firmware -
amd epyc_7h12 -
amd epyc_7f32_firmware -
amd epyc_7f32 -
amd epyc_7f52_firmware -
amd epyc_7f52 -
amd epyc_7f72_firmware -
amd epyc_7f72 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:xen:xen:4.14.0:*:*:*:*:*:x86:*",
              "matchCriteriaId": "68DF2F8C-12AA-477E-A803-CBFBB151138C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:xen:xen:4.15.0:*:*:*:*:*:x86:*",
              "matchCriteriaId": "C3BFD203-8E25-46AF-AF43-DAFB86BDFE0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:xen:xen:4.16.0:*:*:*:*:*:x86:*",
              "matchCriteriaId": "141FB3BC-DDC0-4E57-B1B3-0FF42B0F99B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:xen:xen:4.17.0:*:*:*:*:*:x86:*",
              "matchCriteriaId": "EBC05EF9-E4DE-45AA-873E-F91A3530FA4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_pro_3900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4DB7AC6-B12B-4951-A916-F04443676521",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_pro_3900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C86CD4F-AE07-47E2-ADD0-43C796709AFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_4450u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE0A1A5-299E-4120-A98E-8D0F77D809E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_4450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEB23725-CE72-431F-9339-A03D2C858CB1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_4350ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C867D306-DE0B-445E-8649-609D88C59735",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_4350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A626B29D-571B-4B92-9526-41AED1883C52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_4350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E36BC40A-40EE-4AEE-BFCA-B32CAC9CCE51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_4350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B522666B-DCE3-465D-8B15-87FCD1F8F491",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_4200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "258877EE-6437-431B-AB94-C62793501AD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_4200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62148F9D-66A9-4501-83D8-523FB9E88276",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_4650ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C51C696-4DC3-47AD-92F9-CDC83992DCBE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_4650ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9DF7BC4-C310-4A90-B838-954192B74546",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_4650g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6664F8-CEDB-4EC7-9AA8-98FD5F1F74BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_4650g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72FA89F8-EB76-4647-8CD1-B624CE01B656",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_4400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01010C7-2428-415D-A210-6D2802D112DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_4400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B24DBAE9-6E68-464E-BA55-0CE14ED3A177",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_pro_4750u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E39E6E-173A-46D0-8EE3-2DA1625C0719",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_4750u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9217C213-F7BB-4E3F-A4FE-A67A8411E964",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_pro_4750ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B64C298-F2F1-4D3B-B0A9-0992BF8E7D82",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_4750ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "126DC252-6395-48DF-86FD-8D5FA3B9F536",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_pro_4750g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EAC71F-E8F3-45A0-87AE-0FE16084A9B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_4750g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BCE44B9-90E0-4BE5-97CA-6B9E8BA4DD11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_7520u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6DDD082-BAA1-415A-8E2A-AF8F5F27BDC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0870FBE4-92B4-4717-88B0-EC1094268034",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_7320u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCC8C4-3F88-4D2B-BBDD-860619B3E15C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F04B9F-8C65-476B-B5D8-18CC96E3B712",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_7220u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51AE02B6-08DF-42C1-9C0F-4BC20A2B0F7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_7220u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6FD18F2-168F-49D1-9363-80BDB0D0215E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nAn issue in \u201cZen 2\u201d CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n"
    }
  ],
  "id": "CVE-2023-20593",
  "lastModified": "2024-11-21T07:41:11.193",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-24T20:15:10.237",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://seclists.org/fulldisclosure/2023/Jul/43"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/24/3"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/1"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/12"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/13"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/14"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/15"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/16"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/17"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/5"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/6"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Mitigation",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/26/1"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Mitigation",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/31/2"
    },
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/08/6"
    },
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/08/7"
    },
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/08/8"
    },
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/16/4"
    },
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/16/5"
    },
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11"
    },
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9"
    },
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
    },
    {
      "source": "psirt@amd.com",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mitigation",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://xenbits.xen.org/xsa/advisory-433.html"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://cmpxchg8b.com/zenbleed.html"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://security.netapp.com/advisory/ntap-20240531-0004/"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5459"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5461"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5462"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://seclists.org/fulldisclosure/2023/Jul/43"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/24/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/16"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/17"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/25/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Mitigation",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/26/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Mitigation",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/07/31/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/08/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/08/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/08/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/16/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/08/16/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://xenbits.xen.org/xsa/advisory-433.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://cmpxchg8b.com/zenbleed.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20240531-0004/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5462"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-209"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

cve-2023-20593
Vulnerability from cvelistv5
Published
2023-07-24 19:38
Modified
2024-11-19 16:08
Severity ?
Summary
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
References
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008vendor-advisory
http://xenbits.xen.org/xsa/advisory-433.html
http://www.openwall.com/lists/oss-security/2023/07/24/3
http://seclists.org/fulldisclosure/2023/Jul/43
http://www.openwall.com/lists/oss-security/2023/07/25/5
http://www.openwall.com/lists/oss-security/2023/07/25/6
http://www.openwall.com/lists/oss-security/2023/07/25/1
http://www.openwall.com/lists/oss-security/2023/07/25/13
http://www.openwall.com/lists/oss-security/2023/07/25/17
http://www.openwall.com/lists/oss-security/2023/07/25/12
http://www.openwall.com/lists/oss-security/2023/07/25/16
http://www.openwall.com/lists/oss-security/2023/07/25/14
http://www.openwall.com/lists/oss-security/2023/07/25/15
http://www.openwall.com/lists/oss-security/2023/07/26/1
https://cmpxchg8b.com/zenbleed.html
https://www.debian.org/security/2023/dsa-5459
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://www.debian.org/security/2023/dsa-5462
https://www.debian.org/security/2023/dsa-5461
https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html
http://www.openwall.com/lists/oss-security/2023/07/31/2
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
http://www.openwall.com/lists/oss-security/2023/08/08/7
http://www.openwall.com/lists/oss-security/2023/08/08/8
http://www.openwall.com/lists/oss-security/2023/08/08/6
http://www.openwall.com/lists/oss-security/2023/08/16/4
http://www.openwall.com/lists/oss-security/2023/08/16/5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
http://www.openwall.com/lists/oss-security/2023/09/22/9
http://www.openwall.com/lists/oss-security/2023/09/22/11
http://www.openwall.com/lists/oss-security/2023/09/25/4
http://www.openwall.com/lists/oss-security/2023/09/25/7
https://security.netapp.com/advisory/ntap-20240531-0004/
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:45.858Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://xenbits.xen.org/xsa/advisory-433.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/24/3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2023/Jul/43"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/25/5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/25/6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/25/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/25/13"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/25/17"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/25/12"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/25/16"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/25/14"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/25/15"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/26/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cmpxchg8b.com/zenbleed.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5459"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5462"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5461"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/07/31/2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/08/08/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/08/08/8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/08/08/6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/08/16/4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/08/16/5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240531-0004/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20593",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T16:07:50.725588Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-209",
                "description": "CWE-209 Generation of Error Message Containing Sensitive Information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-19T16:08:15.479Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics \u201cRenoir\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile processors with Radeon\u2122 Graphics \u201cLucienne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Mobile processors with Radeon\u2122 Graphics \u201cRenoir\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7020 Series processors \u201cMendocino\u201d FT6",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "\u00b5code / AGESA\u2122 firmware",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-07-24T19:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eAn issue in \u201cZen 2\u201d CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\u003c/span\u003e\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nAn issue in \u201cZen 2\u201d CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-24T19:39:41.259Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008"
        },
        {
          "url": "http://xenbits.xen.org/xsa/advisory-433.html"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/24/3"
        },
        {
          "url": "http://seclists.org/fulldisclosure/2023/Jul/43"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/5"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/6"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/1"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/13"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/17"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/12"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/16"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/14"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/15"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/26/1"
        },
        {
          "url": "https://cmpxchg8b.com/zenbleed.html"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5459"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5462"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5461"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/07/31/2"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/08/08/7"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/08/08/8"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/08/08/6"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/08/16/4"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/08/16/5"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240531-0004/"
        }
      ],
      "source": {
        "advisory": "AMD-SB-7008",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20593",
    "datePublished": "2023-07-24T19:38:43.385Z",
    "dateReserved": "2022-10-27T18:53:39.762Z",
    "dateUpdated": "2024-11-19T16:08:15.479Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}