Vulnerabilites related to amd - ryzen_3_pro_4350g_firmware
Vulnerability from fkie_nvd
Published
2023-07-24 20:15
Modified
2024-11-21 07:41
Severity ?
Summary
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:xen:xen:4.14.0:*:*:*:*:*:x86:*", matchCriteriaId: "68DF2F8C-12AA-477E-A803-CBFBB151138C", vulnerable: true, }, { criteria: "cpe:2.3:o:xen:xen:4.15.0:*:*:*:*:*:x86:*", matchCriteriaId: "C3BFD203-8E25-46AF-AF43-DAFB86BDFE0D", vulnerable: true, }, { criteria: "cpe:2.3:o:xen:xen:4.16.0:*:*:*:*:*:x86:*", matchCriteriaId: "141FB3BC-DDC0-4E57-B1B3-0FF42B0F99B4", vulnerable: true, }, { criteria: "cpe:2.3:o:xen:xen:4.17.0:*:*:*:*:*:x86:*", matchCriteriaId: "EBC05EF9-E4DE-45AA-873E-F91A3530FA4E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", matchCriteriaId: "46D69DCC-AE4D-4EA5-861C-D60951444C6C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F0E87F5-65BA-477D-9679-907FD2906298", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", matchCriteriaId: "51A56423-3DDE-451B-AC47-51715AC74F41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "927B2661-8988-484F-965C-D94AA9D52911", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", matchCriteriaId: "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3D814C2A-D794-46A8-9A06-CC4DB387176F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", matchCriteriaId: "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4350ADE3-9A31-4A23-9B15-7A44E8F29E90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", matchCriteriaId: "7E52108F-FAAE-4075-8F87-239008E77009", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_3900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4DB7AC6-B12B-4951-A916-F04443676521", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_3900:-:*:*:*:*:*:*:*", matchCriteriaId: "1C86CD4F-AE07-47E2-ADD0-43C796709AFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2F0D63B0-369D-4337-AC25-F0851C0C15C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D14B4470-CF19-40F0-A765-08BA391F0E45", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD852DB5-720F-473E-99EB-F037E81AA567", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30F5D1C5-6AAE-4226-A627-9F37D7131102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "755801C1-7058-4584-BB7B-BE2BF9D5B78B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "59172BDD-6177-4E6E-B9D7-C453EB1D651A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_4450u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE0A1A5-299E-4120-A98E-8D0F77D809E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_4450u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEB23725-CE72-431F-9339-A03D2C858CB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_4350ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C867D306-DE0B-445E-8649-609D88C59735", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_4350ge:-:*:*:*:*:*:*:*", matchCriteriaId: "A626B29D-571B-4B92-9526-41AED1883C52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_4350g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E36BC40A-40EE-4AEE-BFCA-B32CAC9CCE51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_4350g:-:*:*:*:*:*:*:*", matchCriteriaId: "B522666B-DCE3-465D-8B15-87FCD1F8F491", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_4200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "258877EE-6437-431B-AB94-C62793501AD6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_4200g:-:*:*:*:*:*:*:*", matchCriteriaId: "62148F9D-66A9-4501-83D8-523FB9E88276", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_4650ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5C51C696-4DC3-47AD-92F9-CDC83992DCBE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_4650ge:-:*:*:*:*:*:*:*", matchCriteriaId: "B9DF7BC4-C310-4A90-B838-954192B74546", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_4650g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2B6664F8-CEDB-4EC7-9AA8-98FD5F1F74BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_4650g:-:*:*:*:*:*:*:*", matchCriteriaId: "72FA89F8-EB76-4647-8CD1-B624CE01B656", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_4400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F01010C7-2428-415D-A210-6D2802D112DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_4400g:-:*:*:*:*:*:*:*", matchCriteriaId: "B24DBAE9-6E68-464E-BA55-0CE14ED3A177", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_4750u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28E39E6E-173A-46D0-8EE3-2DA1625C0719", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_4750u:-:*:*:*:*:*:*:*", matchCriteriaId: "9217C213-F7BB-4E3F-A4FE-A67A8411E964", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_4750ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B64C298-F2F1-4D3B-B0A9-0992BF8E7D82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_4750ge:-:*:*:*:*:*:*:*", matchCriteriaId: "126DC252-6395-48DF-86FD-8D5FA3B9F536", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_4750g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C8EAC71F-E8F3-45A0-87AE-0FE16084A9B0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_4750g:-:*:*:*:*:*:*:*", matchCriteriaId: "6BCE44B9-90E0-4BE5-97CA-6B9E8BA4DD11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7520u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6DDD082-BAA1-415A-8E2A-AF8F5F27BDC2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", matchCriteriaId: "0870FBE4-92B4-4717-88B0-EC1094268034", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_7320u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33BCC8C4-3F88-4D2B-BBDD-860619B3E15C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", matchCriteriaId: "48F04B9F-8C65-476B-B5D8-18CC96E3B712", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_7220u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "51AE02B6-08DF-42C1-9C0F-4BC20A2B0F7A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_7220u:-:*:*:*:*:*:*:*", matchCriteriaId: "F6FD18F2-168F-49D1-9363-80BDB0D0215E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1527680F-0762-4E3E-BB6D-09866A1C610D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", matchCriteriaId: "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D964031-15E2-461B-BC1B-213EF720E720", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", matchCriteriaId: "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", matchCriteriaId: "563708A3-7C51-4693-B02D-9A25A639FE42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "02C8C50D-2994-4AB7-AD1C-31560608D007", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", matchCriteriaId: "72C86198-0BD4-42E1-974B-70A49F82C411", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "73789139-3498-4ED8-A80C-A8794BC176A7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", matchCriteriaId: "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AE409172-E478-4557-977E-8EDF016F061D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", matchCriteriaId: "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "99075640-17C5-47EA-B9B5-FE72BA9C62C9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", matchCriteriaId: "8F187412-26C2-4D8C-9199-D7CCF49D6520", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D489967C-CD37-44C3-B8DB-7B813562909F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", matchCriteriaId: "26FC5683-F612-4586-8BA3-FB1F66D8868B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB83D414-FD6D-4502-B487-F0D00DAD3972", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", matchCriteriaId: "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77566843-4A30-441F-8FBA-7D3C76907BB1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", matchCriteriaId: "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", matchCriteriaId: "430C9955-0090-4166-8E90-D81C2AA7DE0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9921332-9BAE-4D93-A2FD-576D9BA72408", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", matchCriteriaId: "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", matchCriteriaId: "49BBC687-5C3C-4843-A028-B8BE29D1E302", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BBC3B4-BD63-4895-AE29-E59396806AA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDABE45-F529-453C-92DC-BF7747CEEC0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", matchCriteriaId: "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", matchCriteriaId: "7A6C7497-1B63-490F-B8EA-D9F3CB790952", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A82315CD-2E07-4BDE-9A9F-D06640680D76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", matchCriteriaId: "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "08A14E26-5950-4B06-8AEE-5FF03415F4DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", matchCriteriaId: "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "955DF45C-0F81-4EE8-B7E2-0687122253AD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", matchCriteriaId: "8AC99346-DBF1-4060-8E6B-35D315944ADA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "00715133-F99C-49F2-9B0B-16D2F15E4D49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", matchCriteriaId: "88F4A126-B4A6-480A-9DD7-7F68714DFB49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", matchCriteriaId: "89FAAD8C-6DD1-408D-849B-0CE707321B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", matchCriteriaId: "E25652AB-E243-4C40-BE12-AB53AF52CD61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", matchCriteriaId: "87543FB4-658A-4300-9DC9-836AC1D4BCFB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B71C2E30-E155-49B8-B90F-F9844A25C155", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", matchCriteriaId: "07B3C659-C31A-4F82-9587-9F8A943F637D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "\nAn issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", }, ], id: "CVE-2023-20593", lastModified: "2024-11-21T07:41:11.193", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-07-24T20:15:10.237", references: [ { source: "psirt@amd.com", tags: [ "Not Applicable", ], url: "http://seclists.org/fulldisclosure/2023/Jul/43", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/24/3", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/1", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/12", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/13", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/14", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/15", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/16", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/17", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/5", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/6", }, { source: "psirt@amd.com", tags: [ "Mailing List", "Mitigation", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/26/1", }, { source: "psirt@amd.com", tags: [ "Mailing List", "Mitigation", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/31/2", }, { source: "psirt@amd.com", url: "http://www.openwall.com/lists/oss-security/2023/08/08/6", }, { source: "psirt@amd.com", url: "http://www.openwall.com/lists/oss-security/2023/08/08/7", }, { source: "psirt@amd.com", url: "http://www.openwall.com/lists/oss-security/2023/08/08/8", }, { source: "psirt@amd.com", url: "http://www.openwall.com/lists/oss-security/2023/08/16/4", }, { source: "psirt@amd.com", url: "http://www.openwall.com/lists/oss-security/2023/08/16/5", }, { source: "psirt@amd.com", url: "http://www.openwall.com/lists/oss-security/2023/09/22/11", }, { source: "psirt@amd.com", url: "http://www.openwall.com/lists/oss-security/2023/09/22/9", }, { source: "psirt@amd.com", url: "http://www.openwall.com/lists/oss-security/2023/09/25/4", }, { source: "psirt@amd.com", url: "http://www.openwall.com/lists/oss-security/2023/09/25/7", }, { source: "psirt@amd.com", tags: [ "Mitigation", "Patch", "Vendor Advisory", ], url: "http://xenbits.xen.org/xsa/advisory-433.html", }, { source: "psirt@amd.com", tags: [ "Exploit", ], url: "https://cmpxchg8b.com/zenbleed.html", }, { source: "psirt@amd.com", tags: [ "Mailing List", ], url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", }, { source: "psirt@amd.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html", }, { source: "psirt@amd.com", url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html", }, { source: "psirt@amd.com", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/", }, { source: "psirt@amd.com", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/", }, { source: "psirt@amd.com", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/", }, { source: "psirt@amd.com", url: "https://security.netapp.com/advisory/ntap-20240531-0004/", }, { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008", }, { source: "psirt@amd.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5459", }, { source: "psirt@amd.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5461", }, { source: "psirt@amd.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5462", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "http://seclists.org/fulldisclosure/2023/Jul/43", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/24/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/13", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/14", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/15", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/16", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/17", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Mitigation", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/26/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Mitigation", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/31/2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2023/08/08/6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2023/08/08/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2023/08/08/8", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2023/08/16/4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2023/08/16/5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2023/09/22/11", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2023/09/22/9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2023/09/25/4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2023/09/25/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Patch", "Vendor Advisory", ], url: "http://xenbits.xen.org/xsa/advisory-433.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "https://cmpxchg8b.com/zenbleed.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20240531-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5459", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5461", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5462", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-209", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
cve-2023-20593
Vulnerability from cvelistv5
Published
2023-07-24 19:38
Modified
2024-11-19 16:08
Severity ?
EPSS score ?
Summary
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 3000 Series Desktop Processors “Matisse” AM4 |
Version: various |
||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:45.858Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008", }, { tags: [ "x_transferred", ], url: "http://xenbits.xen.org/xsa/advisory-433.html", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/24/3", }, { tags: [ "x_transferred", ], url: "http://seclists.org/fulldisclosure/2023/Jul/43", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/5", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/6", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/1", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/13", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/17", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/12", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/16", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/14", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/15", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/26/1", }, { tags: [ "x_transferred", ], url: "https://cmpxchg8b.com/zenbleed.html", }, { tags: [ "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5459", }, { tags: [ "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", }, { tags: [ "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5462", }, { tags: [ "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5461", }, { tags: [ "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/31/2", }, { tags: [ "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html", }, { tags: [ "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/08/08/7", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/08/08/8", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/08/08/6", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/08/16/4", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/08/16/5", }, { tags: [ "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/", }, { tags: [ "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/09/22/9", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/09/22/11", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/09/25/4", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/09/25/7", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20240531-0004/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-20593", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T16:07:50.725588Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-209", description: "CWE-209 Generation of Error Message Containing Sensitive Information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-19T16:08:15.479Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", packageName: "AGESA", platforms: [ "x86", ], product: "Ryzen™ 3000 Series Desktop Processors “Matisse” AM4", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: "AGESA", platforms: [ "x86", ], product: "AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: "AGESA", platforms: [ "x86", ], product: "3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "affected", packageName: "AGESA", platforms: [ "x86", ], product: "Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: "AGESA", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Lucienne”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: "AGESA", platforms: [ "x86", ], product: "Ryzen™ 4000 Series Mobile processors with Radeon™ Graphics “Renoir”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: "AGESA", platforms: [ "x86", ], product: "Ryzen™ 7020 Series processors “Mendocino” FT6", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", packageName: "µcode / AGESA™ firmware", platforms: [ "x86", ], product: "2nd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-07-24T19:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "\n\n<span style=\"background-color: rgb(248, 249, 250);\">An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.</span>\n\n\n\n\n\n<br>", }, ], value: "\nAn issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-07-24T19:39:41.259Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008", }, { url: "http://xenbits.xen.org/xsa/advisory-433.html", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/24/3", }, { url: "http://seclists.org/fulldisclosure/2023/Jul/43", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/5", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/6", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/1", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/13", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/17", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/12", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/16", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/14", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/15", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/26/1", }, { url: "https://cmpxchg8b.com/zenbleed.html", }, { url: "https://www.debian.org/security/2023/dsa-5459", }, { url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", }, { url: "https://www.debian.org/security/2023/dsa-5462", }, { url: "https://www.debian.org/security/2023/dsa-5461", }, { url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/31/2", }, { url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html", }, { url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/", }, { url: "http://www.openwall.com/lists/oss-security/2023/08/08/7", }, { url: "http://www.openwall.com/lists/oss-security/2023/08/08/8", }, { url: "http://www.openwall.com/lists/oss-security/2023/08/08/6", }, { url: "http://www.openwall.com/lists/oss-security/2023/08/16/4", }, { url: "http://www.openwall.com/lists/oss-security/2023/08/16/5", }, { url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/", }, { url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/", }, { url: "http://www.openwall.com/lists/oss-security/2023/09/22/9", }, { url: "http://www.openwall.com/lists/oss-security/2023/09/22/11", }, { url: "http://www.openwall.com/lists/oss-security/2023/09/25/4", }, { url: "http://www.openwall.com/lists/oss-security/2023/09/25/7", }, { url: "https://security.netapp.com/advisory/ntap-20240531-0004/", }, ], source: { advisory: "AMD-SB-7008", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20593", datePublished: "2023-07-24T19:38:43.385Z", dateReserved: "2022-10-27T18:53:39.762Z", dateUpdated: "2024-11-19T16:08:15.479Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }